Last updated November 16, 2015
This Bitnami Customer Agreement (this “Agreement“), as it may be modified from time to time, governs your use of the Services as defined below. It is an agreement between BitRock Inc, (“Bitnami,” “we,” “us,” or “our,”) and you or the entity you represent (“you“). This Agreement takes effect when you click an “I Accept” button or check box presented with these terms or, if earlier, when you use any of the Services (the “Effective Date“). You represent to us that you are lawfully able to enter into this contract. If you are entering into this Agreement on behalf of a company or other legal entity, you represent that you have the authority to bind such entity, its affiliates and all users who access our Services through your account to these terms and conditions, in which case the terms “you” or “your” shall refer to such entity, its affiliates and users associated with it. If you do not have such authority, or if you do not agree with these terms and conditions, you must not accept this agreement and may not use the Services.
You may not access the Services if You are Our direct competitor, except with Our prior written consent. In addition, You may not access the Services for purposes of monitoring their availability, performance or functionality, or for any other benchmarking or competitive purposes without prior written consent from Us.
Please see Section 16 for definitions of certain capitalized terms used in this Agreement.
Software Downloads. In addition to our Services, we also provide Software for use with the Services, which we make available to you for use with Cloud Provider Accounts or with the Services. Subject to your compliance with the terms and conditions of this Agreement, we grant you a non-exclusive and non-transferable license to download and Execute the executable form of the Software on a computer or Cloud Provider Account which you are authorized to access and use, solely for your operation and use. You may make copies of the Software for backup purposes, provided that you reproduce on it all copyright and other proprietary notices that are on the original copy of the Software. We reserve all rights in the Software not expressly granted to you in this Agreement or by the licenses of any open source software components included within the Software.
Except as expressly specified in this Agreement, you may not: (a) copy (except in the course of loading or installing) or modify the Software, including but not limited to adding new features or otherwise making adaptations that alter the functioning of the Software; or (b) transfer, sublicense, lease, lend, rent or otherwise distribute the Software to any third party. You acknowledge and agree that portions of the Software, including but not limited to the source code and the specific design and structure of individual modules or programs, constitute or contain trade secrets of Bitnami and its licensors. Accordingly, you agree not to disassemble, decompile or reverse engineer the Software, in whole or in part, or permit or authorize a third party to do so, except to the extent such activities are expressly permitted by law notwithstanding this prohibition or by the licenses of any open source software components included within the Software. You may not download or use the Software or Services to build a competitive product or service to the Software or Services.
The Software is protected by United States copyright law and international treaties. You will not delete or in any manner alter the copyright, trademark, and other proprietary rights notices or markings appearing on the Software as delivered to you.
llegal or Harmful Content and Activities. You may not use, or instruct, encourage or enable others to use, the Services or the BitNami Site for any illegal, harmful or offensive use or to transmit, store, display, distribute or otherwise make available any content that is illegal, harmful or offensive. Prohibited activities and content include: any illegal activities, such as advertising or making available gambling sites or services or facilitating or disseminating child pornography; activities that may menace, harass or be harmful to others, including offering or disseminating fraudulent goods, services, schemes, or promotions or engaging in other deceptive practices; posting content that infringes or misappropriates the intellectual property or proprietary rights of others or that is false, defamatory, obscene, abusive, promotes bigotry, racism, hatred or harm, or is invasive of privacy, or otherwise objectionable, including content that constitutes child pornography, relates to bestiality, or depicts non-consensual sex acts; and posting content or other computer technology that may damage, interfere with, surreptitiously intercept, or expropriate any system, program, or data, including viruses, Trojan horses, worms, time bombs, or cancelbots.
Security Violations. You may not use the Services to violate the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a “System”). Prohibited activities include: accessing or using any System without permission, including attempting to probe, scan, or test the vulnerability of a System or to breach any security or authentication measures used by a System, monitoring of data or traffic on a System without permission and forging TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route.
Network Abuse. You may not make network connections to any users, hosts, or networks unless you have permission to communicate with them. Prohibited activities include: monitoring or crawling of a System that impairs or disrupts the System being monitored or crawled; inundating a target with communications requests so the target either cannot respond to legitimate traffic or responds so slowly that it becomes ineffective; interfering with the proper functioning of any System, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, or flooding techniques’ operating network services like open proxies; and using manual or electronic means to avoid any use limitations placed on a System, such as access and storage restrictions.
Email Abuse. You will not distribute, publish, send, or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations (like “spam,” “junk mail,” or “chain letters”), including commercial advertising and informational announcements. You will not alter or obscure mail headers or assume a sender’s identity without the sender’s explicit permission. You will not collect replies to messages sent from another internet service provider if those messages violate this Policy or the acceptable use policy of that provider.
Reporting. We may report any activity that we suspect violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. Our reporting may include disclosing appropriate customer information.
THE SERVICES ARE PROVIDED “AS IS.” WE AND OUR AFFILIATES AND LICENSORS MAKE NO REPRESENTATIONS OR WARRANTIES OF ANY KIND, WHETHER EXPRESS, IMPLIED, STATUTORY OR OTHERWISE REGARDING THE SERVICES OR THE THIRD PARTY CONTENT, INCLUDING ANY WARRANTY THAT THE SERVICES OR THIRD PARTY CONTENT WILL BE UNINTERRUPTED, ERROR FREE OR FREE OF HARMFUL COMPONENTS, OR THAT ANY CONTENT, INCLUDING YOUR CONTENT OR THE THIRD PARTY CONTENT, WILL BE SECURE OR NOT OTHERWISE LOST OR DAMAGED. EXCEPT TO THE EXTENT PROHIBITED BY LAW, WE AND OUR AFFILIATES AND LICENSORS DISCLAIM ALL WARRANTIES, INCLUDING ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, AND ANY WARRANTIES ARISING OUT OF ANY COURSE OF DEALING OR USAGE OF TRADE.