Acceptable Use Policy
English | español

ACCEPTABLE USE POLICY (“AUP”)

Your services may be suspended or terminated for violation of this AUP in accordance with the use of AUTOMOTIVE INDUSTRY ACTION GROUP’s Core Tools Support Software.

Capitalized terms used in this AUP shall have the meaning given in the Core Tools Support (CTS) Software Terms of Service. Inquiries regarding this policy should be directed to ctsinquiry@aiag.org

  1. ABUSE
  2. You may not use AIAG’s CTS Software or Services to engage in, foster, or promote illegal, abusive, or irresponsible behavior, including:

    • Unauthorized access to or use of data, systems, or networks, including any attempt to probe, scan, or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network;
    • Monitoring data or traffic on any network or system without the express authorization of the owner of the system or network;
    • Interference with service to any user of AIAG CTS Software or other network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system, and broadcast attacks;
    • Use of an Internet account or computer without the owner’s authorization;
    • Collecting or using e-mail addresses, screen names, or other identifiers without the consent of the person identified (including, without limitation, phishing, Internet scamming, password robbery, spidering, and harvesting);
    • Collecting or using information without the consent of the owner of the information;
    • Use of any false, misleading, or deceptive TCP-IP packet header information in an e-mail.
    • Use of the service to distribute software that covertly gathers information about a user or covertly transmits information about the user;
    • Use of the service for distribution of advertisement delivery software unless: (i) the user affirmatively consents to the download and installation of such software based on a clear and conspicuous notice of the nature of the software, and (ii) the software is easily removable by use of standard tools for such purpose included on major operating systems; or
    • Any conduct that is likely to result in retaliation against AIAG network or Web site, or AIAG’s employees, officers, or other agents, including engaging in behavior that results in any server being the target of a denial of service attack (DoS).
  3. EXCESSIVE USE OF SYSTEM RESOURCES
  4. You may not use your Service in a way that unnecessarily interferes with the normal operation of AIAG CTS Software or of the Services generally. In such circumstances, we may require you to repair abnormalities in your code if the operation of the code unnecessary conflicts with other customers’ use of the Services.

  5. VULNERABILITY TESTING
  6. You may not attempt to probe, scan, penetrate, or test the vulnerability of the AIAG CTS Software system or network or to breach AIAG CTS Software’s security or authentication measures, whether by passive or intrusive techniques, without AIAG’s express written consent.

  7. OFFENSIVE CONTENT
  8. You may not publish, transmit, or store on or via AIAG CTS Software’s network and equipment any content or links to any content that AIAG reasonably believes:

    • Constitutes, depicts, fosters, promotes, or relates in any manner to pornography;
    • Is excessively violent, incites violence, threatens violence, or contains harassing content or hate speech;
    • Is unfair or deceptive under the consumer protection laws of any jurisdiction, including chain letters and pyramid schemes;
    • Is defamatory or violates a person’s privacy;
    • Creates a risk to a person’s safety or health, creates a risk to public safety or health, compromises national security, or interferes with an investigation by law enforcement;
    • Improperly exposes trade secrets or other confidential or proprietary information of another person or entity;
    • Is intended to assist others in defeating technical copyright protections;
    • Infringes on another person’s or entity’s copyright, trade or service mark, patent, or other property right;
    • Promotes illegal drugs, violates export control laws, relates to illegal gambling or illegal arms trafficking;
    • Is otherwise illegal or solicits conduct that is illegal under laws applicable to you or to AIAG; or
    • Is otherwise malicious, is otherwise fraudulent, or may result in retaliation against AIAG by offended viewers.
    • Content “published or transmitted” via AIAG CTS Software’s network or equipment includes web content, e-mail, bulletin board postings, chat, and any other type of posting or transmission that relies on the Internet.

  9. COPYRIGHTED MATERIAL
  10. You may not use AIAG CTS Software’s network or Services to download, publish, distribute, or otherwise copy or use in any manner any text, music, software, art, image, or other work protected by copyright law unless:

    • you have been expressly authorized by the owner of the copyright for the work to copy the work in that manner; or
    • you are otherwise permitted by established copyright law to copy the work in that manner.

    It is AIAG’s policy to terminate in appropriate circumstances the services of customers who are repeat infringers.

  11. OTHER
    • You agree that we may quarantine or delete any data stored on a shared system if the data are infected with a virus, or are otherwise corrupted, and have the potential to infect or corrupt the system or other customers’ data that are stored on the same system.
    • We reserve the right, but do not assume the obligation, to investigate any violation of this Policy or misuse of the Service. We may:
      • Investigate violations of this Policy or misuse of the Service.
      • Remove, disable access to, or modify any content or resource that violates this Policy or any other agreement we have with you for use of the Service.
      • Suspend or terminate your Account.
      • Report any activity that we suspect violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. Our reporting may include disclosing appropriate customer information. We also may cooperate with appropriate law enforcement agencies, regulators, or other appropriate third parties to help with the investigation and prosecution of illegal conduct by providing network and systems information related to alleged violations of this Policy.