1.1 This acceptable use policy (the “Policy“) sets out the rules governing:
(a) the use of A Tasteful Garden at http://www.atastefulgarden.com (the “Services“); and
(b) the transmission, storage and processing of content by you, or by any person on your behalf, using the Services (“Content“).
1.2 References in this Policy to “you” are to any customer for the Services and any individual user of the Services (and “your” should be construed accordingly); and references in this Policy to “us” are to A Tasteful Garden (and “we” and “our” should be construed accordingly).
1.3 By using the Services, you agree to the rules set out in this Policy.
1.4 We will ask for your express agreement to the terms of this Policy before [you upload or submit any Content or otherwise use the Services].
- General usage rules
2.1 You must not use the Services in any way that causes, or may cause, damage to the Services or impairment of the availability or accessibility of the Services.
2.2 You must not use the Services:
(a) in any way that is unlawful, illegal, fraudulent or harmful; or
(b) in connection with any unlawful, illegal, fraudulent or harmful purpose or activity.
2.3 You must ensure that all Content complies with the provisions of this Policy.
- Unlawful Content
3.1 Content must not be illegal or unlawful, must not infringe any person’s legal rights, and must not be capable of giving rise to legal action against any person (in each case in any jurisdiction and under any applicable law).
3.2 Content[, and the use of Content by us in any manner licensed or otherwise authorised by you,] must not:
(a) [be libellous or maliciously false];
(b) [be obscene or indecent];
(c) [infringe any copyright, moral right, database right, trade mark right, design right, right in passing off, or other intellectual property right];
(d) [infringe any right of confidence, right of privacy or right under data protection legislation];
(e) [constitute negligent advice or contain any negligent statement];
(f) [constitute an incitement to commit a crime, instructions for the commission of a crime or the promotion of criminal activity];
(g) [be in contempt of any court, or in breach of any court order];
(h) [constitute a breach of racial or religious hatred or discrimination legislation];
(i) [be blasphemous];
(j) [constitute a breach of official secrets legislation]; or
(k) [constitute a breach of any contractual obligation owed to any person].
3.3 You must ensure that Content is not and has never been the subject of any threatened or actual legal proceedings or other similar complaint.
- Graphic material
4.1 Content must be appropriate for all persons who have access to or are likely to access the Content in question[, and in particular for children[ over 12 years of age]].
4.2 Content must not depict violence[ in an explicit, graphic or gratuitous manner].
4.3 Content must not be pornographic[ or sexually explicit].
- Negligent advice
6.1 Content must not consist of or contain any [legal, financial, investment, taxation, accountancy, medical or other professional] advice, and you must not use the Services to provide any [legal, financial, investment, taxation, accountancy, medical or other professional] advisory services.
6.2 Content must not consist of or contain any advice, instructions or other information that may be acted upon and could, if acted upon, cause death, illness or personal injury, damage to property, or any other loss or damage.
7.1 Content must be appropriate, civil and tasteful, and accord with generally accepted standards of etiquette and behaviour on the internet.
7.4 You must not use the Services to send any hostile communication or any communication intended to insult, including such communications directed at a particular person or group of people.
7.5 You must not use the Services for the purpose of deliberately upsetting or offending others.
7.6 You must not unnecessarily flood the Services with material relating to a particular subject or subject area, whether alone or in conjunction with others.
7.7 You must ensure that Content does not duplicate other content available through the Services.
7.8 You must ensure that Content is appropriately categorised.
7.9 You should use appropriate and informative titles for all Content.
7.10 You must at all times be courteous and polite to other users of the Services.
- Marketing and spam
8.1 You must not[ without our written permission] use the Services for any purpose relating to [the marketing, advertising, promotion, sale or supply of any product, service or commercial offering].
8.2 Content must not constitute or contain spam, and you must not use the Services to store or transmit spam – which for these purposes shall include [all unlawful marketing communications and unsolicited commercial communications].
8.3 You must not send any spam[ or other marketing communications] to any person using any email address[ or other contact details] made available through the Services or that you find using the Services.
8.4 You must not use the Services to promote or operate any chain letters, Ponzi schemes, pyramid schemes, matrix programs, “get rich quick” schemes or similar letters, schemes or programs.
- Data mining
11.1 You must not conduct any systematic or automated data scraping, data mining, data extraction or data harvesting, or other systematic or automated data collection activity, by means of or in relation to the Services.
12.1 You must not link to any material using or by means of the Services that would, if it were made available through the Services, breach the provisions of this Policy.
- Harmful software
13.1 The Content must not contain or consist of, and you must not promote or distribute by means of the Services, any viruses, worms, spyware, adware or other harmful or malicious software, programs, routines, applications or technologies.
13.2 The Content must not contain or consist of, and you must not promote or distribute by means of the Services, any software, programs, routines, applications or technologies that will or may have a material negative effect upon the performance of a computer or introduce material security risks to a computer.