top of page

ACCEPTABLE USE POLICY 

Last updated 06/27/2024

​

This Acceptable Use Policy ("Policy") is part of our Terms of Use (Terms & Conditions) ("Legal Terms") and should therefore be read alongside our main Legal Terms: Terms & Conditions Policy. If you do not agree with these Legal Terms, please refrain from using our Services. Your continued use of our Services implies acceptance of these Legal Terms.

 

Please carefully review this Policy which applies to any and all:

 

  1. uses of our Services (as defined in "Legal Terms")

  2. forms, materials, consent tools, comments, post, and all other content available on the Services ("Content")

 

 

WHO WE ARE

 

We are Aimfluance LLC ("Company," "we," "us," or "our") a company registered in Austin, Texas. We operate aimfluance.com as well as any other related products and services that refer to or link to this Policy (collectively, the "Services").

 

 

USE OF THE SERVICES

 

When you use the Services, you warrant that you will comply with this Policy and all applicable laws. You agree to use the Services only for lawful purposes in accordance with this Policy, as well as any other terms, licenses, or policies governing the specific services. Prohibited activities include misrepresenting your identity or authority, using services for illegitimate personal gain, unauthorized disclosure of confidential information, and any activities that could create legal liability for the Company.

 

You also acknowledge that you may not:

  • Systematically retrieve, scrap, or mine data or other content from the Services to create or compile, directly or indirectly, a collection, compilation, database, or directory without written permission from us.

  • Make any unauthorized use of the Services, including collecting user information such as usernames and/or email addresses by electronic or other means for the purpose of sending unsolicited communications or creating accounts by automated means or under false pretenses.

  • Circumvent, disable, or interfere with security features of the Services, including features that prevent or restrict the use or copying of Content, or enforce limitations on the use of the Services and/or the Content contained therein.

  • Engage in unauthorized framing of or linking to the Services.

  • Trick, defraud, or mislead us or other users, especially attempts to obtain sensitive account information such as user passwords.

  • Improperly use our Services, including our support services, or submit false reports of abuse or misconduct.

  • Use the Services in any situation where failure or fault could lead to personal injury, death, property damage, or environmental damage.

  • Engage in automated use of the Services, such as using scripts to send comments or messages, or using data mining, robots, or similar data gathering and extraction tools.

  • Interfere with, disrupt, or unduly burden the Services or connected networks.

  • Attempt to impersonate another user or person or use another user’s username.

  • Use any information obtained from the Services to harass, abuse, or harm others.

  • Use the Services as part of any effort to compete with us or otherwise use the Services and/or the Content for any revenue-generating endeavor or commercial enterprise.

  • Decipher, decompile, disassemble, or reverse engineer any of the software comprising or in any way making up a part of the Services, except as expressly permitted by applicable law.

  • Attempt to bypass any measures of the Services designed to prevent or restrict access to the Services, or any portion of the Services.

  • Use any unauthorized means to access, monitor, copy, distribute or circumvent the Services, systems, or data, including through scraping, data mining, harvesting, robots, spiders, or similar automated means.

  • Attempt to probe, scan, compromise or test the vulnerability of the Services, systems or network, unless explicitly authorized by us.

  • Engage in any security testing or vulnerability research on the Services, except pursuant to formal, written permission and scope from the Company, such as through an authorized bug bounty program.

  • Harass, annoy, intimidate, or threaten any of our employees or agents engaged in providing any portion of the Services to you.

  • Remove copyright, proprietary rights notices, or other legal notices from Content.

  • Copy, adapt, or reverse engineer the Services' software or code, including but not limited to Flash, PHP, HTML, and JavaScript.

  • Upload or transmit (or attempt to upload or to transmit) viruses, malwares including Trojan horses, or any other material, including excessive use of capital letters and spamming (continuous posting of repetitive text), that interferes with any party’s uninterrupted use and enjoyment of the Services or modifies, impairs, disrupts, alters, or interferes with the use, features, functions, operation, or maintenance of the Services.

  • Upload or transmit (or attempt to upload or to transmit) any material that acts as a passive or active information collection or transmission mechanism, including without limitation, clear graphics interchange formats ("gifs") or web beacons, tracking pixels or 1×1 pixels, web bugs, cookies, or other similar mechanisms (sometimes referred to as "spyware" or "passive collection mechanisms" or "pcms").   

  • Except as may be the result of standard search engine or Internet browser usage, use, launch, develop, or distribute any automated system, including without limitation, any spider, robot, cheat utility, scraper, or offline reader that accesses the Services, or using or launching any unauthorized script or other software.

  • Disparage, tarnish, or otherwise harm, in our opinion, us, the Company, and/or the Services.

  • Use the Services in a manner inconsistent with any applicable laws or regulations.

  • Upload or transmit any unlawful, defamatory, harassing, abusive, fraudulent, obscene, or otherwise objectionable content.

  • Use any content from the Services in violation of any third-party intellectual property or proprietary rights, including copyrights, patents, trademarks, trade secrets, and confidential information.

 

 

CONSEQUENCES OF BREACHING THIS POLICY

 

The consequences for violating our Policy will vary depending on the severity of the breach and the user's history with the Services. The consequences will be proportional to the nature and severity of the violation. For example:

 

  • We may issue a warning for some violations.

  • For serious or continued breaches of our Legal Terms and this Policy, we reserve the right to suspend or terminate your access to our Services and disable your account if applicable. Users will be notified of any violations and given an opportunity to rectify the issue before consequential actions are taken, unless the situation constitutes an emergency case requiring immediate enforcement action.

  • We may consider factors such as intent, negligence, and previous violations when determining appropriate consequences.

  • We may notify law enforcement or pursue legal action against you if we believe there is a risk to individuals or public safety. 

  • Depending on the violation, we may seek available legal remedies, including monetary damages, court costs, and attorneys' fees.

  • We may report any illegal or unauthorized activities to appropriate authorities.

 

For termination of access/accounts, users will be given 30 days' notice unless prohibited by law. Users may request an internal review of any enforcement actions taken against their accounts within those 30 days.

 

We exclude liability for actions taken in response to your Policy breaches.

​

 

MONITORING AND ENFORCEMENT

 

We may monitor use of the Services to detect and prevent Policy violations through technical measures, including traffic monitoring and automated scanning. We may investigate any reported or suspected violations or prohibited activities.

 

 

HOW CAN YOU CONTACT US ABOUT THIS POLICY?

 

If you have any further questions or comments, you may contact us at contact@aimfluance.com.

bottom of page