Request a Demo

Acceptable Use Policy

Updated: January 18, 2019

This Acceptable Use Policy (“AUP”) describes actions that Slate (the “Company”) prohibits when you (the “Customer”) use Supporting Cast (the “Services”). BY USING THE SERVICES, YOU CONSENT TO THE TERMS AND CONDITIONS OF THIS ACCEPTABLE USE POLICY. YOU ALSO CONSENT TO ALL OTHER AGREEMENTS CONCERNING USE OF THE SERVICES AND THE COMPANY’S OTHER SERVICES, INCLUDING THE COMPANY’S USER AGREEMENT AND PRIVACY POLICY. IF YOU DO NOT AGREE TO THESE POLICIES, PLEASE DO NOT USE THE SERVICES.  

Customer agrees not to use, and not to encourage or allow any other person or entity to use, the Services in prohibited manners, including but not limited to the following:

  • Creating or transmitting any material that infringes the intellectual property rights or other rights of third parties, including but not limited to trademarks, copyrights, or rights of publicity, or otherwise violating, infringing or misappropriating the rights of any third party.
  • Creating or transmitting any material that contains viruses, trojan horses, worms or any other malicious, harmful, or deleterious programs or code.
  • Engaging in activities that are, or transmitting through the Services any information that is, libelous, slanderous, or otherwise defamatory; discriminatory based on race, ethnicity, sex, gender identity, religion, nationality, disability, sexual orientation, or age; or otherwise malicious, abusive, harassing, threatening, or harmful to any person or entity.
  • Adversely impacting the availability, reliability, or stability of any Services or component thereof.
  • Launching or facilitating, whether intentionally or unintentionally, a denial of service attack on any Services or on any third party.
  • Attempting to bypass or break any security mechanism on any of the Services or using the Services in any other manner that poses a security or service risk to the Services, to the Company, to any of Customer’s members or any other user of the Services, to any of the Company’s respective customers, or to their customers.
  • Attempting to bypass account parameters and restrictions.
  • Testing or reverse-engineering the Services in order to find limitations or vulnerabilities, or evade filtering capabilities.
  • Using the Services in any manner that may subject the Company or any third party to liability, damages or danger.
  • Using the Services in any manner that violates any applicable third party policies or requirements that the Company has communicated to Customer.
  • Using the Services to engage in or in connection with fraudulent activity, or using Customer’s account to engage in fraudulent activity with respect to third parties.
  • Promoting or engaging in illegal activities.
  • Harvesting or otherwise collecting information about Customer’s members, or other persons, without their express consent.
  • Interfering with or disrupting networks connected to the Services; violating the regulations, policies or procedures of such networks; or engaging with networks, users, or other parties through the Services without authorization.
  • Violating or facilitating the violation of any local, state, federal, or foreign law or regulation, including laws and regulations.
  • Registering with the Services with an email of a throw-away email address provider or any other publicly accessible email address.
  • Using the Services, or a component of the Services, in a manner not authorized by the Company, including interception of data and falsification, impersonation, forgery, or other misrepresentation of information.
  • Using the Services to transmit or store personally identifiable information (“PII”) (excluding the provision of account information to the Company for the purpose of Customer’s receipt of the Services).
  • Creating a Supporting Cast or other Company account for the purpose of competitive evaluation or research.
  • Revealing Customer’s account password to others or allowing use of Customer’s account by others.
  • Failing to make a reasonable effort to protect Customer’s passwords and to secure resources against unauthorized use or access. Customer must configure hardware and software in a way that reasonably prevents unauthorized users from accessing Customer’s account.
  • Failing to create and enforce appropriate policies and safeguards regarding data that Customer consensually collects from members through the Services.

This list of prohibited uses is provided by way of example and should not be considered exhaustive. All investigations and determinations related to violations of this AUP, and any consequent actions taken against Customer as a result of a violation, will be made by the Company in its sole discretion.

We reserve the right to change this AUP from time to time without notice by posting changes to the Company’s website.  When we do, we will also revise the “Last Updated” date of this AUP.