Acceptable Use Policy
This Acceptable Use Policy sets out a list of acceptable and unacceptable actions connected to the use of “HyMate” application (hereinafter referred to as “the Application”). This document contains a set of examples of prohibited actions, but it does not contain all possible cases, therefore, when using the Application, current and applicable legal regulations must be complied with. If we consider that the violation of our rules and current and applicable law is deliberate, repetitive, or it constitutes a plausible risk for other users or third parties, we can take control or legal steps. Those rules can be changed and updated, as the Application develops. Therefore, you should regularly check updates and changes. We allow you to access the current policy and we will send you an appropriate notification and/or request to consent, if it will be required by the provisions of law.
When using „HyMate” application you are obliged especially to:
II Comply with all applicable laws and legal regulations, with particular regard to the Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (hereinafter referred to as: “the Regulation”), the Polish Act of 10 May 2018 on the Protection of Personal Data, as well as legal provisions concerning confidentiality of personal data and law concerning intellectual property.
III Use the Application only for the purpose described in the License Agreement and related documents.
IV Undertake appropriate actions and security means to prevent unauthorized access to the Application or use of it.
V Monitor and control all activities conducted via the Application.
VI Immediately notify us if you suspect illegal or unauthorized activity or violation of security during the use of the Application.
During the use of the „HyMate” application, it is prohibited especially to:
I Allow unauthorized third parties to access or use the Application.
II Share, transfer, sublicense or in any other way to provide access to the license to any other person/organization.
III Use the Application in order to store or transfer any data of users in an illegal way.
IV Act against the Regulation.
V Send through the Application any data, files, software or links which contain or redirect to a virus, trojan horse, worm or any other malicious software.
VI Send any data, files, links or other sources which contain forbidden or illegal content via the Application.
VIII Attempt reverse engineering, decompiling, hacking or any other actions interfering with the source code of the Application.
IX Attempt to obtain unauthorized access to services or systems related to the Application.
X Obtain the access to the Application in order to create a similar or competitive product or service or copying all functionalities on the basis of the Application.
XI Impersonate any person or entity, including, but not limited to employees of our organization, for instance for phishing.
XII Place advertisements which are not covered by the license agreement.
XIII Provide false information when concluding a license agreement.