Acceptable Use
Introduction
The Short version: We host a wide variety of collaborative projects from all over the world, and that collaboration only works when our users are able to work together in good faith. While using the Service, you must comply with our Acceptable Use Policies, which include some restrictions on content and conduct on HASH related to user safety, intellectual property, privacy, authenticity, and other limitations. In short, be excellent to each other.
Capitalized terms used but not defined in these Acceptable Use Policies have the meanings assigned to them in our General Terms of Service, Corporate Terms of Service, Additional Product and Feature Terms and Privacy Statement. For customers subject to the Corporate Terms of Service, "you" and "your" refer to "Customer" or "Users". "We", "us", and "our" refer to "HASH".
1. Compliance with Laws and Regulations
You are responsible for using the Service in compliance with all applicable laws, regulations, and all of our Acceptable Use Policies. These policies may be updated from time to time and are provided below, as well as in our General Terms of Service and Corporate Terms of Service.
2. User Safety
We do not allow content or activity on HASH that:
→
is unlawful or promotes unlawful activities;→
is obscene or relates to sexual exploitation or abuse, including of minors;→
is discriminatory or abusive toward any individual or group;→
harasses or abuses another individual or group, including our employees, officers, and agents, or other users;→
threatens or incites violence toward any individual or group, especially on the basis of who they are;→
gratuitously depicts or glorifies violence, including violent images; or→
is false, inaccurate, or intentionally deceptive information and likely to adversely affect the public interest (including health, safety, election integrity, and civic participation);→
is libelous, defamatory, or fraudulent;→
purports to originate from a specific individual, organization or group other than its actual source (i.e. false personation);→
exposes the personal information of users without their consent (i.e. doxxing);→
exposes users or their devices to technical exploitation (i.e. malware);→
is off-topic, or interacts with platform features in a way that significantly or repeatedly disrupts the experience of other users.
3. Intellectual Property, Authenticity, and Private Information
We do not allow content or activity on HASH that:
→
infringes any proprietary right of any party, including patent, trademark, trade secret, copyright, right of publicity, or other right;→
enables the unlawful bypassing of intellectual property rights, including sharing unauthorized product licensing keys, software for generating unauthorized product licensing keys, or software for bypassing checks for product licensing keys, including extension of a free license beyond its trial period;→
impersonates any person or entity, including any of our employees or representatives, including through false association with HASH, or by fraudulently misrepresenting your identity or site's purpose; or→
violates the privacy of any third party such as by posting another person's personal information without consent.
However, to the maximum extent allowed legally in the jurisdictions we operate within, we support the right of users to backup content they legally own (privately and securely) to their own HASH accounts and instances, while respecting the original creator's intellectual property rights. For example, removing Digital Rights Management (DRM) restrictions placed on a piece of a content (or distributing software that allows others to achieve the same) may be allowable under our terms, depending on the region a user is located in, and provided that the resulting asset is then kept private within the user's web. Circumvention of DRM may be allowed in the following cases:
→
to support continued access to information in cases where the original DRM activation/validation server is no longer available→
to enable external interoperability with copyrighted material (e.g. allowing playback of a DRM-protected multimedia file)→
to disable or prevent access to private, sensitive or illegal information→
with written permission of the rightsholder→
as part of research into encryption technologies, methods or practices→
as part of security testing→
as a matter of national security or in the fulfilment of law enforcement obligations→
as otherwise may be required by law
4. Spam and Inauthentic Activity on HASH
We do not allow content or activity on HASH that is:
→
automated excessive bulk activity and coordinated inauthentic activity, such as→
spamming→
cryptocurrency mining;
→
bulk distribution of promotions and advertising prohibited by HASH terms and policies;→
inauthentic interactions, such as fake accounts and automated inauthentic activity;→
rank abuse, such as automated starring or following;→
creation of or participation in secondary markets for the purpose of the proliferation of inauthentic activity;→
propagating abuse on other platforms through the HASH platform in any way;→
phishing or attempted phishing;→
using our servers for any form of excessive automated bulk activity, to place undue burden on our servers through automated means, or to relay any form of unsolicited advertising or solicitation through our servers, such as get-rich-quick schemes; or→
incentivized by (or incentivizes inauthentic engagement with) rewards such as cryptocurrency airdrops, tokens, credits, gifts or other give-aways.
5. Site Access and Safety
We do not allow content or activity on HASH that:
→
directly supports unlawful active attack or malware campaigns that are causing technical harms — such as using our platform to deliver malicious executables or as attack infrastructure, for example by organizing denial of service attacks or managing command and control servers — with no implicit or explicit dual-use purpose prior to the abuse occurring; or→
uses our servers to disrupt or to attempt to disrupt, or to gain or to attempt to gain unauthorized access to, any service, device, data, account or network. Please note, activities permitted under bug bounty programs, such as the HASH Bug Bounty program, are not considered “unauthorized,” but must only affect the organization whose bug bounty program authorized the activity.
6. Services Usage Limits
You will not reproduce, duplicate, copy, sell, resell or exploit any portion of the Service, use of the Service, or access to the Service without our express written permission.
7. Information Usage Restrictions
You may use information from our Service for the following reasons, regardless of whether the information was scraped, collected through our API, or obtained otherwise:
→
Researchers may use public, non-personal information from the Service for research purposes, only if any publications resulting from that research are open access.→
Archivists may use public information from the Service for archival purposes.
Scraping refers to extracting information from our Service via an automated process, such as a bot or webcrawler. Scraping does not refer to the collection of information through our API. Please see Section H of our General Terms of Service for our API Terms.
You may not use information from the Service (whether scraped, collected through our API, or obtained otherwise) for spamming purposes, including for the purposes of sending unsolicited emails to users or selling personal information, such as to recruiters, headhunters, and job boards.
Your use of information from the Service must comply with the HASH Privacy Statement.
8. Privacy
Misuse of personal information is prohibited.
Any person, entity, or service collecting data from the Service must comply with the HASH Privacy Statement, particularly in regards to the collection of personal information. If you collect any personal information from the Service, you agree that you will only use that personal information for the purpose for which that User has authorized it. You agree that you will reasonably secure any personal information you have gathered from the Service, and you will respond promptly to complaints, removal requests, and "do not contact" requests from us or other users.
9. Excessive Bandwidth Use
The Service's bandwidth limitations vary based on the features you use. If we determine your bandwidth usage to be significantly excessive in relation to other users of similar features, we reserve the right to suspend your Account, throttle your file hosting, or otherwise limit your activity until you can reduce your bandwidth consumption. We also reserve the right—after providing advance notice—to delete repositories that we determine to be placing undue strain on our infrastructure. For more details on specific features' bandwidth limitations, see the HASH Additional Product Terms.
10. Advertising on HASH
Short version: We do not generally prohibit use of HASH for advertising. However, we expect our users to follow certain limitations, so HASH does not become a spam haven. No one wants that.
While we understand that you may want to promote your Content by posting supporters' names or logos in your Account, the primary focus of the Content posted in or through your Account to the Service should not be advertising or promotional marketing. This includes Content posted in or through Blocks, Types, Services, Pages, Packages, Projects, repositories, and all other parts of the Service. You may include static images, links, and promotional text in the README documents or project description sections associated with your Account, but they must be related to the project you are hosting on HASH. You may not advertise in other Users' Accounts, such as by posting monetized or excessive bulk content in issues.
You may not promote or distribute content or activity that is illegal or otherwise prohibited by our General Terms of Service or Acceptable Use Policies, including excessive automated bulk activity (for example, spamming), get-rich-quick schemes, and misrepresentation or deception related to your promotion.
If you decide to post any promotional materials in your Account, you are solely responsible for complying with all applicable laws and regulations, including without limitation the U.S. Federal Trade Commission's Guidelines on Endorsements and Testimonials. We reserve the right to remove any promotional materials or advertisements that, in our sole discretion, violate any HASH terms or policies.
11. User Protection
You must not engage in activity that significantly harms other users.
We will interpret our policies and resolve disputes in favor of protecting users as a whole.
Enforcement. HASH retains full discretion to take action in response to a violation of these policies, including account suspension, account termination, or removal of content. Please also see our Community Guidelines for actions you can take if something or someone offends you.
Reinstatement and appeal. If your content or account has been disabled or restricted and you seek reinstatement or wish to appeal, please see our Appeals Policy for information about the process and use our contact form to submit a request.
Create a free account
Sign up to try HASH out for yourself, and see what all the fuss is about
By signing up you agree to our terms and conditions and privacy policy