Acceptable Use Policy

a) Innovation 360 Pty Ltd's (i360) Clients must act appropriately in all respects when using our services.Therefore, users must not send or access or make available communications or content that infringes on the privacy rights or other rights of others. Users must not view, download, copy, send, post or access information that is illegal. Users must not use i360's in any way prohibited by this Acceptable Use Policy or which would otherwise cause i360 loss and/or damage.

​b) Without limiting the above provisions of this policy, in the course of you using i360's services, the following is prohibited:

  • using i360's services to violate all or any legal rights of any person or company or other entity in any jurisdiction is strictly prohibited;

  • using i360's services in breach of the Privacy Act 1988 (Cth), the EU General Data Protection Law (GDPR) or any other applicable data protection laws;

  • using i360's services in relation to crimes such as theft and fraud is strictly prohibited;

  • using i360's services in breach of any laws, including but not limited to, laws relating to the protection of copyright, trade secrets, patents or other intellectual property and laws relating to spam or privacy and whether such violation is by way of the installation or distribution of "pirated" software or otherwise, is strictly prohibited;

  • unauthorised copying of copyrighted material including, but not limited to, digitization and distribution of photographs from magazines, books or other copyrighted sources, copyrighted music or video and the installation of any copyrighted software for which you do not have an active licence is strictly prohibited;

  • exporting software, technical information, encryption software or technology, in violation of domestic export control laws, is strictly prohibited;

  • introduction of malicious programs into i360's cloud services (e.g., viruses, worms, Trojan horses, e-mail bombs) is strictly prohibited;

  • revealing your account password to others or allowing use of i360's services by others is strictly prohibited;

  • using i360's services to actively engage in procuring or transmitting material that is in violation of sexual harassment or workplace relations laws is strictly prohibited;

  • using i360's servicess to make fraudulent offers of goods or services is strictly prohibited;

  • using i360's services to carry out security breaches or disruptions of network communication is strictly prohibited. Security breaches include, but are not limited to, accessing data of which you are not an intended recipient or logging into a server or account that you are not expressly authorized to access or corrupting any data. For the purposes of this paragraph, "security breaches" includes, but is not limited to, network sniffing, pinged floods, packet spoofing, denial of service, and forged routing information for malicious purposes;

  • using Hi360's services to execute any form of network monitoring which will intercept data not intended for you is strictly prohibited;

  • using i360's services to circumvent user authentication or security of any of our hosts, networks or accounts or those of our customers or suppliers is strictly prohibited;

  • using i360's services to interfere with or denying service to anyone is strictly prohibited;

  • using any program/script/command, or sending messages of any kind, with the intent to interfere with, or disable, any persons' use of i360's services is strictly prohibited;

  • sending unsolicited email messages through or to users of i360's services in breach of the Spam Act 2003 (Cth) is strictly prohibited;

  • using i360's services to send email to any email address, with the intent to spam or harass is strictly prohibited;

  • use of i360's services in breach of any person's privacy (such as by way of identity theft or "phishing") is strictly prohibited.