The proper functioning of the Services, including open publication spaces such as forums or help centers, implies that the Customer makes responsible and reasonable use of them. In particular, the right of access to a Shadow® remote computer offered by SHADOW, as well as to any other Service in the Shadow Business Solutions range is a right reserved exclusively to the Customer, for his sole use and within the strict framework of the rules use specific to the Service concerned, excluding in particular any marketing activity or resale of the Service to third parties.
Therefore, it is forbidden for the Customer to misuse the Services , orto instruct a third party to do so, and in particular, in the context of his use of the Services:
- to violate any applicable law or regulation or any charter of use or ethics, national or international, in any way whatsoever, in particular by storing, publishing or sharing content that is fraudulent, defamatory or misleading, or aimed at inciting crimes and misdemeanours, inciting racial hatred or suicide, glorifying crimes against humanity, or containing elements of child pornography, or any content of a violent or pornographic nature as long as such content would be likely to be accessible to minors;
- to infringe the privacy or rights of third parties, in particular by reproducing, representing, making available or communicating to the public data, images or sounds that may constitute defamation, insult, denigration or infringe privacy, the right to the image, morality or public order, or by the dissemination of tangible or immaterial property protected by an intellectual, literary, artistic or industrial property right that may constitute an infringement;
- to carry out intrusions or attempted intrusions into third-party computer systems or "hacking", host aggressive botnet-type services, spread viruses, worms, spyware, time bombs, attacks (DDoS, DoS, scanning, spamming, brute force, etc. ), or any other computer programs whose object or effect is to restrict, disrupt or impair the proper functioning of any computer equipment or programs;
- to probe, analyze or test the vulnerability of any computerized system or network (for example by performing so-called "pentesting" tests), unless this is done in accordance with a vulnerability research and vulnerability detection program (known as "Bug Bounty") expressly authorized by SHADOW ; violate, circumvent or otherwise force any security or authentication measures;
- access, use or modify non-public areas or parts, or shared areas or parts, of any computerized system or network, or any service, including the Services, to which the Customer is not invited to access;
- disrupt or interrupt the access of a third party or other Customer, host or network, including, by other means, by sending a virus, overloading, flooding data, sending spam, or sending a large number of emails or requests, to any part of the Services or any part of the services of third parties;
- to consult or attempt to consult accounts giving access to the Services other than that of the Customer, to perform actions or to create them by means other than our public interfaces made available for this purpose (for example, creation of bulk accounts or implementation of so-called "scraping" techniques);
- to mine cryptocurrencies or to use the computing power of the Shadow® to break encryption keys;
- to send unsolicited communications, promotions or advertisements, or spam, or altered, misleading or false information identifying the source, including via spoofing methods or so-called "phishing" methods, and generally to impersonate any person;
- to re-market the Services in any way, directly or indirectly, or more generally, without the prior authorization of SHADOW, to use the remote computer made available by SHADOW in the context of commercial services, or in such a way that it has as its object or effect the making available all or part of the Servicesto third parties, free of charge or for a fee; or, unless expressly authorized by the Service concerned, to use Shadow® as a server or with software having a server function;
- disrupt or attempt to disrupt in any way the proper functioning of the Services, including disabling, altering, violating or circumventing, or attempting to disable, alter, violate or circumvent, in any way, any device or functionality of the Services, including but not limited to any security or authentication features, access restrictions, storage limits, or any mechanism to pause or disable, or to provide SHADOW with false or inaccurate information, or to access, modify or use non-public areas or parts of the Services or shared areas of the Services that you are not invited to access;
- to hack, copy or reverse compile any code or equipment of SHADOW, including the Software, or more generally to take any action that is detrimental to SHADOW;
- probe, scan or test the vulnerability of any system or network.
For greater certainty, the above list is not exhaustive. The applicable laws and regulations may be understood in particular as those applicable to the geographical location of the servers, those applicable to the geographical location of the Customer when using the Services, as well as those of the country in which the Customer has subscribed to the Services.
SHADOW reserves, in particular, the right to suspend or terminate any use of the Services that would disrupt the proper functioning of SHADOW's computer equipment or the general proper functioning of the Services, or in the event of use of the Services contrary to the Code of Conduct.
With regard to the shadow remote workstation access service, reasonable use means use similar to that of a local work machine, by the Customer's employees (or by the Customer's teachers, pupils or students, in the case of an Education-type offer), and during their normal working hours or courses. Regular intensive use or over longer time slots may be the subject of Services expressly dedicated to such uses. It is understood that the Customer is fully responsible for the use of the Service by its employees, pupils or students, and that it is committed to their compliance with these Conditions.
In addition, SHADOW reserves the right to monitor, moderate and/or remove any content posted on the Sites and on open publishing spaces such as forums or help centers. However, SHADOW will in no way be responsible for the content posted by Customers and has no obligation to carry out such monitoring, moderation and/or deletion. SHADOW reserves the right to refuse to post, edit or remove content for any reason. In addition, in the event that SHADOW agrees to publish, modify or delete content, it will not be responsible for failures and/or delays in this procedure. If Customer publishes content on the open publishing spaces, it grants SHADOW a free, transferable and sublicensable license to use, reproduce, modify, adapt, publish, translate, create a derivative work from, distribute and display such content worldwide, for a period of ten (10) years.