GPs, authorized users of GPs, users and other parties must not access or use the Software except as permitted by GP Ratings Ltd, if applicable. Without limiting the foregoing, mentioned parties must not and must not permit any other person to:
(a) use the Software in any way which is in breach of any applicable Laws or which infringes any person's rights, including Intellectual Property Rights and privacy rights;
(b) use the Software to transmit, publish or communicate material that is defamatory, offensive, abusive, indecent, menacing or unwanted;
(c) use the Software in any way that damages, interferes with or interrupts the supply of the Software;
(d) introduce malicious programs into our hardware and software or Systems, including any viruses or malware through any channel;
(e) compromise the physical and administrative security of the Software, including by allowing others to access your/their account, password or authentication details;
(f) use the Software to carry out security breaches or disruptions of a network. Security breaches include accessing data where you are not the intended recipient or logging into a server or account that you are not expressly authorised to access or corrupting any data (including network sniffing/monitoring, pinged floods, packet spoofing, denial of service and forged routing information for malicious purposes);
(g) use any program/script/command, or send messages of any kind, with the intent to interfere with, or disable, any person’s use of the Software;
(h) use the Software to circumvent user authentication or security of any of your networks, accounts or hosts or those of any other third party;
(i) decompile, disassemble, reverse engineer, attempt to derive the source code for, modify, adapt, translate or copy the Software;
(j) provide, disclose, divulge, make available to or permit use of any part of the Software by any third party;
(k) write or develop any software or create derivative works based upon the Software, or our confidential information;
(l) remove, tamper with, seek to override or otherwise interfere with any security or technological protection measure forming part of the Software; or
(m) remove, obliterate, or obscure from view any branding, copyright, trade mark or confidentiality notice or legend appearing on or within the Software.
Last Update: 11/05/2023 13:05