Treasury Curve Acceptable Use Policy
This Acceptable Use Policy describes the proper kinds of conduct and prohibited uses of services (“Services”) provided by Treasury Brokerage, LLC, d/b/a “Treasury Curve,” and Treasury Technologies, LLC (together with Treasury Brokerage, LLC, “Treasury Curve”). This Acceptable Use Policy is not exhaustive and Treasury Curve reserves the right to modify this Acceptable Use Policy at any time, effective upon posting of the modified Acceptable Use Policy to https://www.treasurycurve.com/acceptableusepolicy/. Changes to this Acceptable Use Policy are deemed to be communicated to customers, resellers, employees and other users (each, a “User”) upon their posting on this website.
Treasury Curve expects all Users of the Services, to take responsibility in using the Internet with courtesy and responsibility and be familiar with and practice good Internet etiquette.
Any violation of this Acceptable Use Policy may result in the suspension or cancellation of a Service or Services or termination of the Services Agreement or Reseller Agreement, as applicable, or such other action as Treasury Curve deems appropriate. Treasury Curve will not be held liable for the suspension or cancellation of a Service if, in Treasury Curve’s sole discretion, this Acceptable Use Policy has been violated.
The User shall remain solely liable and responsible for its use of the Services and any and all content that the User may display, upload, download or transmit through the use of the Services, as applicable.
The Services may be used only for lawful purposes. The transmission, distribution or storage of any material in violation of any applicable law or regulation is prohibited, including, without limitation:
i. Infringement of intellectual property rights or other proprietary rights material protected by patent, copyright, trademark, service mark, trade secret or other intellectual property rights used without proper authorization; or
ii. site content, or the transmission of data that contains illegal or obscene material or fosters or promotes illegal activity.
The following non-exhaustive list details the kinds of illegal or harmful conduct that are prohibited:
- Infringement may result from, among other activities, the unauthorized copying and posting of pictures, logos, software, articles, musical works, and videos.
- Transmission or dissemination of, sale, storage or hosting of material that is unlawful, libelous, defamatory, obscene, pornographic, indecent, lewd, harassing, threatening, harmful, invasive of privacy or publicity rights, abusive, inflammatory or otherwise objectionable.
- Posting or sending of software or technical information in violation of applicable laws.
- Disseminating or hosting harmful content including, without limitation, viruses, Trojan horses, worms, time bombs or any other computer programming routines that may damage, interfere with, surreptitiously intercept or expropriate any system, program, data or personal information.
- Offering or disseminating fraudulent goods, services, schemes, or promotions (i.e., make money fast schemes, chain letters, pyramid schemes), or furnishing false data on any sign-up form, contract or online application or registration, or the fraudulent use of any information obtained through the use of the Services, including without limitation use of false or stolen credit card numbers.
Whether lawful or unlawful, Treasury Curve reserves the right to restrict or prohibit any and all uses of the Services or data on its systems and to remove such materials from its systems that Treasury Curve determines, in its sole discretion, is harmful to its systems, network, reputation, goodwill, other customers of Treasury Curve, or any third party, and may take any action it deems fit to resolve the situation.
Access and Interference
Violations or attempts to violate Treasury Curve’s systems or to interrupt Treasury Curve’s Services are strictly prohibited and may result in criminal and civil liability. Treasury Curve may investigate incidents involving such violations and will involve and will co-operate with law enforcement agencies if a criminal violation is suspected.
Examples of system violations include, without limitation, the following:
- Unauthorized access to or use of the Services, data, or the systems, including any attempt to probe, scan or overload a Company system or Service, or to breach security or authentication measures without express authorization.
- Unauthorized monitoring of data or traffic on any system without express authorization.
- Interference with Service to any User, host or system including, without limitation, mail-bombing, flooding, deliberate attempts to overload a system and broadcast attacks.
- Any action that imposes an unreasonable or disproportionately large load on Treasury Curve’s infrastructure.
- Intentional interference also means the use of any kind of program/script/command, or sent messages of any kind, designed to interfere with a User’s terminal session, via any means, locally or by the Internet.
- Using manual or electronic means to avoid any use limitations placed on the Services such as timing out.
- Any attempt to decompile, disassemble, decrypt, extract, reverse engineer or otherwise attempt to derive the source code (including the methods, processes, and infrastructure) underlying the Services or any other software in connection with the Services.
If approached with complaints relating to any of the above violations, Treasury Curve will cooperate and assist the police and law enforcement bodies with their investigations in order to bring such misuse and violations to an end.
Treasury Curve considers that any application that overloads Treasury Curve’s system by whatever means will be considered as making reckless use of Treasury Curve’s system and as such is not allowed. Treasury Curve may prohibit the running of any such application which, in its sole judgment, endangers the stability or performance of Treasury Curve’s systems. Use of IP multicast other than by means provided and coordinated by Treasury Curve is likewise prohibited.
INDIRECT OR ATTEMPTED VIOLATIONS OF THIS POLICY, AND ACTUAL OR ATTEMPTED VIOLATIONS BY A THIRD PARTY ON BEHALF OF A USER OR A CUSTOMER’S OR RESELLER’S END USER, SHALL BE CONSIDERED VIOLATIONS OF THIS POLICY BY SUCH CUSTOMER, RESELLER OR END USER.
To report of any alleged infringements of this Acceptable Use Policy or any alleged abuse of the Services, including spamming, mailbombing, and trolling to Treasury Curve, please email: firstname.lastname@example.org
Questions or Comments
If there are any questions or concerns about this Acceptable Use Policy, please contact us at email@example.com
Effective Date: This document was last revised November 20, 2020