1. Introduction
This Acceptable Use Policy ("AUP") applies to all Customers, Authorized
Users, and any third parties using or accessing KorGrid, LLC's Services, as defined in our Terms
of Service (“Terms”). By using our Services, Customer agrees to comply with this AUP. Failure to
comply may result in suspension or termination of your account or Services. Undefined capitalized
terms herein have the same meaning as in our Terms.
2. Purpose
This AUP outlines acceptable and prohibited behaviors in connection with the
use of the Services. The intent is to maintain a secure, reliable, and lawful computing
environment for all users.
3. General Obligations
This AUP supplements the Limitations of Liability section of our
Terms. The Customer, its Authorized Users, affiliates, sub-processors, employees, and agents must
use the Services only for lawful purposes and in a manner consistent with this Agreement, the
Terms, and the DPA. The Customer is responsible for the actions of its users, employees,
contractors, or third parties operating under its account. KorGrid is not responsible for any
losses or damages resulting from your violation of this AUP or the actions taken to enforce it.
4. Prohibited Conduct
You may not use the Services, directly, or indirectly, to engage in any of the following activities:
- Engaging in or facilitating any illegal activity.
- Hosting, transmitting, or distributing content that is fraudulent, defamatory, obscene, or
violates intellectual property or privacy rights.
- Deploying or distributing malware, ransomware, or other harmful code.
- Conducting or participating in denial-of-service attacks, network scanning, or unauthorized
intrusion attempts.
- Sending unsolicited or deceptive communications ("spam").
- Using the Services for cryptocurrency mining without prior written consent.
- Interfering with, or degrading, the performance of the Company's systems or the use of the
Services by others.
- Attempting to gain unauthorized access to any account, system, or data not belonging to the Customer.
- Infringing on intellectual property or privacy rights of others.
- Disrupting, hindering, or overloading our systems, including any activity that interferes with
the security, integrity, or availability of the Services, network, or systems.
5. Enforcement
Violations of this policy may result in suspension or termination of access to
the Services without notice. The Company reserves the right to investigate suspected violations and to
cooperate with law enforcement agencies or regulators as required by law. You will remain responsible
for all charges and expenses incurred for the Services prior to termination, unless otherwise required by law.
6. Reporting Abuse
Incidents or suspected abuse must be reported to
[email protected]. Reports should include relevant details such as
timestamps, source IP addresses, and a description of the activity in question.