Acceptable Use Policy
Last Updated October 11th, 2023
The following Acceptable Use Policy applies to all uses of Gitloc Services and Website:

  1. Users may not send unsolicited messages or use Gitloc Services or Website to send unsolicited messages (also known as junk mail or SPAM).
  2. Users must not rent, lease, loan, or sell access to, or otherwise attempt to transfer any right in Gitloc's website (which includes its software and documentation) to a third party, through framing or any other method.
  3. Users must not reverse engineer, reverse assemble, or otherwise attempt to discover any programming code used in or with the Gitloc Services or Website. Where reverse engineering is permitted by applicable law obtaining such information as is necessary to achieve interoperability with Gitloc Services, users agree to first request such information from Gitloc.
  4. Users must not modify, create derivative works based on or in any manner commercially exploit the Gitloc Services or Website, in whole or in part.
  5. Users must not interfere with or disrupt the Gitloc Services or Website or any part thereof, or create an undue burden on the website or the networks or services connected to the website.
  6. Users must not introduce software or automated agents or scripts into the Gtiloc website in order to produce multiple accounts, generate automated searches, requests or queries, or to strip or mine content or data from the website.
  7. Users must not perform any benchmark tests or analyses relating to Gitloc Services or Website without express permission of Gitloc.
  8. Except for permitted use of Gitloc's API, users must not access the website through automated methods, and any other use of robots or other computer code which calls the website is forbidden.
  9. The network resources of Gitloc may not be used to impersonate another person or misrepresent authorization to act on behalf of others or Gitloc. All messages transmitted via Gitloc should correctly identify the sender. Users must not alter the attribution of origin in electronic mail messages or postings.
  10. Users must not attempt to undermine the security or integrity of computing systems or networks of Gitloc, its partners, or any other person, and must not attempt to gain unauthorized access.
  11. The Gitloc Services and Website may only be used for lawful purposes.
Made on