RPM Software, LLC ("RPM"). Acceptable Use Policy

Effective November 4, 2013

This Policy outlines acceptable use of RPM's Software as a Service offerings Lighthouse HSE Management System, Cube Data Management System, Quartz QMS and RPM Telco (each offering is the “Service”). This Policy prohibits uses and activities involving the Service that are illegal, infringe the rights of others, or interfere with or diminish the use and enjoyment of the Service by others. For example, these prohibited uses and activities include using the Service to:

Conduct and Information Restrictions

    • Undertake or accomplish any unlawful purpose. This includes, but is not limited to, posting, storing, transmitting or disseminating information, data or material which is libellous, obscene, unlawful, threatening or defamatory, or which infringes the intellectual property rights of any person or entity, or which in any way constitutes or encourages conduct that would constitute a criminal offense, or otherwise violate any local, provincial, federal, or non-Canadian law, order, or regulation;

    • Upload, post, publish, transmit, reproduce, create derivative works of, or distribute in any way information, software or other material obtained through the Service or otherwise that is protected by copyright or other proprietary right, without obtaining any required permission of the owner;

    • Accessing or attempting to access illegally or without authorization computers, accounts, servers or networks belonging to another party, or attempting to penetrate security measures of another individual's system (often known as "hacking"). Also, any activity that might be used as a precursor to an attempted system penetration (i.e. port scan, stealth scan, or other information gathering activity). A client is also prohibited from attempting any action designed to circumvent or alter any method of measuring or billing for RPM's Services. Violations of system or network security may result in civil or criminal liability;

    • Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail bombing, or denial of service attacks. Also, activities that harm, disrupt the use of, or interfere with the ability of others to effectively use RPM products or any other connected network, system, service, or equipment;

    • Participate in the collection of very large numbers of e-mail addresses, screen names, or other identifiers of others (without their prior consent), a practice sometimes known as spidering or harvesting, or participate in the use of software (including “spyware”) designed to facilitate this activity;

    • Impersonate any person or entity, engage in sender address falsification, forge anyone else's digital or manual signature, or perform any other similar fraudulent activity (for example, “phishing”).

Technical Restrictions

    • Accessing any other person's user account without his or her knowledge and consent; breaching the security of another user or system; or attempting to circumvent the user’s authentication or security of their user account will be considered a violation of the acceptable use policy, and may result in suspension of that person’s access to our software system. This includes, but is not limited to, accessing data not intended for you, logging into or making use of an account you are not expressly authorized to access, or probing the security of other accounts without express permission to do so;

    • Use or distributing tools or devices designed or used for compromising security or whose use is otherwise unauthorized, such as password guessing programs, decoders, password gatherers, keystroke loggers, analyzers, cracking tools, packet sniffers, encryption circumvention devices, or Trojan Horse programs. Unauthorized port scanning is strictly prohibited;

    • Copy, distribute, or sublicense any proprietary software provided in connection with the Service by RPM;

    • Distribute programs that make unauthorized changes to software (cracks);

    • Service, alter, modify, or tamper with the Service or permit any other person to do the same who is not authorized by RPM are prohibited.