Terms of service

These Acceptable Use Guidelines (“Guidelines”) describe prohibited uses on Safe withyou using a non-exhaustive list of examples. Tech against Violence reserves the right to change this policy at any time. The version of the policy provided on the website applies. By using Safe withyou, you agree to the latest version of this policy. If you violate the policy or encourage or help others to do so, we may block or suspend your access to and use of Safe withyou.

1. No unlawful, harmful or offensive use or content

You may not distribute, make available, or store any illegal, harmful, fraudulent, infringing, or offensive content via Safe withyou, nor may you enable or encourage third parties to do so. Prohibited activities and content include:

  • Illegal, harmful, or fraudulent content. Any content that is illegal, that infringes the rights of others or that may be harmful to others or to the operation or reputation of Tech against Violence.
  • Offensive content. Content that infringes the intellectual property or property rights of others.
  • Insulting content. Content that is defamatory, obscene, offensive, invasive of privacy, or otherwise objectionable.
  • Harmful content. Content or other computer technology that may damage, interfere with, surreptitiously intercept, or expropriate any system, program, or data, including viruses, Trojan horses, worms, time bombs, or cancelbots.

Excluded are any types of evidence that are in line with the purpose of Safe withyou and related to domestic violence and stalking.

2. No security breaches

You may not use Safe withyou to violate the security or integrity of any network, computer or communications system, software application, or network or computer device (each, a “System”). Prohibited activities include:

  • Unauthorized access. Unauthorized access to or use of a system, including any attempt to probe, scan, or test the vulnerability of a system or to breach the security or authentication measures used by a system.
  • Interception. Monitoring of data or data traffic on a system without permission.

3. No network abuse

You may not establish a network connection to users, hosts, or networks if you do not have permission to communicate with them. Prohibited activities include:

  • Monitoring or crawling. Monitoring or crawling of a system that interferes with or disrupts the monitored or crawled system.
  • Denial of Service (DoS). Flooding a target with communication requests so that the target either cannot respond to legitimate traffic or responds so slowly that it becomes ineffective.
  • Intentional interference. Interfering with the proper functioning of a system, including deliberately attempting to overload a system through mailbombing, newsbombing, or flooding techniques.
  • Operation of certain network services. Operation of network services such as open proxies, open mail relays, or open recursive domain name servers.
  • Circumvention of system restrictions. Use of manual or electronic means to circumvent usage restrictions imposed on a system, such as access and storage restrictions.