5.1 For purposes of these Terms of Use, “Content” means information, text, graphics, logos, photographs, images, moving images, sound, illustrations and other materials made available, displayed or transmitted over, by, or in connection with the Services (including information made available by means of an Internet “hyperlink”, a third party Web posting or similar means), including all trademarks, trade names service marks and domain names contained therein.
5.2 With regard to the use of the Services, including any and all Content that you upload, send, post, e-mail, or otherwise transmit while using the Services, you represent that (i) you are the true owner of or have and will have at all times sufficient rights, without limitation, to upload the Content, (ii) the Content does not and will not violate (a) the copyrights, patents, trade secrets, trademarks, service marks or other intellectual property rights, (b) other property rights, (c) privacy rights or (d) any other proprietary rights of any other person, business, or entity, and (iii) transmission of the content does not and will not violate any laws or breach any licenses or other agreements to which you are a party. Except as specifically permitted by law, you may not post, modify, distribute, or reproduce in any way copyrighted or other proprietary materials without obtaining the prior written consent of the copyright owner of such materials.
You acknowledge that all Content, whether posted publicly or transmitted privately over, by, or in connection with the Services are the sole responsibility of the person from whom such Content originated. We do not control or endorse the Content and cannot guarantee the accuracy, integrity or quality of such Content and you acknowledge that by using the Services you may be exposed to Content that is inaccurate, offensive or indecent. We will not be liable in any way for any Content or for any loss or damage of any kind resulting from the use of or reliance on any Content transmitted via the Services and you agree to bear all risks associated with the use of any Content, including any reliance on the accuracy or completeness of such Content.
5.3 In using the Services you agree not to:
5.3.1 post, publish, distribute or disseminate material or information that is tortious, libelous, defamatory, infringing, obscene, indecent, threatening, abusive, harassing or unlawful;
5.3.2 threaten, abuse, disrupt, stalk or otherwise violate the legal rights (including rights of privacy and publicity) of others;
5.3.3 make available or upload files that contain a virus, worm, trojan, corrupt data, or other code that damages, destroys or interferes with (or is intended to damage, destroy, or interfere with) the operation of the Services or with any computer or property of another;
5.3.4 advertise or offer to buy or sell goods or services for any commercial purpose, unless such communication facility specifically allows such messages; or
5.3.5 post, publish, distribute or disseminate material or information that you do not have a right to transmit under any law or under contractual or fiduciary relationships (such as inside information or confidential information disclosed in the course of employment or under a confidentiality agreement).
5.4 We shall be entitled, at our sole discretion, to remove any material that breaches these Terms and Conditions or is otherwise objectionable.
5.5 You may not use the Services to interfere with, gain unauthorized access to, or otherwise violate the security of our (or another party’s) network, servers, computers, other control devices, software, or data, or to attempt to do any of the foregoing. Examples of system or network security violations include but are not limited to:
Unauthorized monitoring, scanning or probing of networks or systems or any other action aimed at the unauthorized interception of data or the harvesting of e-mail addresses;
Use any forged, false or misleading number identity, email header, invalid or non-existent domain names in email or postings nor employ techniques to hide, obscure or counterfeit the source of e-mail or other posting;
Hacking, attacking, gaining access to, breaching, circumventing or testing the vulnerability of the user authentication or security of any host, network, server, personal computer, network access and control devices, software or data without express authorization of the owner of the system or network;
Impersonating others or secretly or deceptively obtaining personal information of third parties (phishing, etc.);
Using any program, file, script, command or transmission of any message or content of any kind, designed to interfere with a terminal session, the access to or use of the Internet or any other means of communication; except in the case of authorized legitimate network security operations, distributing or using tools designed to compromise security (including but not limited to SNMP tools), including cracking tools, password guessing programs, packet sniffers or network probing tools; or programs that may damage the operation of another’s network, system, computer or other property.