The following Acceptable Use Policy (the “AUP”) applies to all customers and users of spriteCloud Products and are a supplement to the Terms of Service (the “TOS”) between spriteCloud B.V. (“Supplier”) and each customer of the spriteCloud Products (each a “Customer”). All use of the Supplier Products by any Customer is subject to the TOS and this AUP. Supplier reserves the right, at its discretion, to modify this AUP at any time by posting a notice on the Supplier website or Supplier Products, or by sending Customer a notice via email or postal mail. Customer shall be responsible for reviewing and becoming familiar with any such modifications. Use of the Supplier Products by Customer following such notification constitutes Customer’s acceptance of the terms and conditions of the AUP as modified. Customer is responsible for all of its and its users’ activity in connection with the Supplier Products or otherwise under Customer’s account. Any capitalized terms which are not defined herein have the meaning set forth in the TOS.

Customer represents, warrants and agrees that it shall not (and shall not permit any third party to) directly or indirectly provide any Customer Data or otherwise use or interact with the Supplier Products in manner that:

This End User License Agreement (“Agreement”) is entered into by and between Supplier and the customer (individual or entity) that has procured the Supplier products or services for use as an end user (“Customer”). “Effective Date” means the date on which accepts the terms and conditions of this Agreement. Supplier reserves the right, at its sole discretion, to modify or replace this Agreement, or change, suspend, or discontinue any Supplier Product(s), including without limitation, the availability of any feature, database, or content) at any time by posting a notice on the Supplier Product(s) or by sending you an email. It is your responsibility to check this Agreement periodically for changes. Your continued use of any Supplier Product following the posting of any changes to this Agreement constitutes acceptance of those changes.

  • Infringes or violates the intellectual property rights or any other rights of anyone else (including Supplier);
  • Violates any law or regulation; Violates any agreement between Customer and anyone else (including Supplier);
  • Is harmful, fraudulent, deceptive, threatening, abusive, harassing, defamatory, vulgar, obscene, or otherwise objectionable (as determined by Supplier in its sole and absolute discretion);
  • Bypasses any measures used to prevent or restrict access to the Supplier Products (or other accounts, computer systems or networks connected to or accessed using the Supplier Products);
  • Jeopardizes the security of Customer’s or anyone else’s Supplier account (such as allowing someone else to log on as Customer on the Supplier Products);
  • Attempts, in any manner, to obtain the password, account, or other security information from any other user;
  • Creates more than a single account per person;
  • Contains software viruses or any other computer codes, files, or programs that are designed or intended to disrupt, damage, limit or interfere with the proper function of any software, hardware, or telecommunications equipment or to damage or obtain unauthorized access to any system, data, password or other information of Supplier or any third party;
  • Violates the security of any computer network, or cracks any passwords or security encryption codes;
  • Impersonates any person or entity, including any employee or representative of Supplier;
  • Runs Maillist, Listserv, any form of auto-responder or “spam” on the Supplier Products, or any processes that run or are activated while Customer is not logged into the Supplier Products, or that otherwise interfere with the proper working of the Supplier Products (including by placing an unreasonable load on the infrastructure of the Supplier Products);
  • “Crawls,” “scrapes,” or “spiders”(through use of manual or automated means): (i) any page or portion of the Supplier Products or (ii) any third party site in violation of that site’s terms of service or any other third party rights;
  • Installs on any virtual machine accessed as part of the Supplier Product any software which constitutes malware, spyware, viruses, or similar software, or which is installed for purposes of click fraud or similar activities (including, without limitation toolbars or other similar software which offer a “pay per install” or similar compensation scheme);
  • Accesses any social media site other than for purposes of software testing or validation;
  • Accesses any site or service in violation of (or in a manner intended to circumvent) any corporate or other policy restricting Customer’s access to such site or service;
  • Involves commercial activities and/or sales, other than for legitimate testing purposes (as determined by Supplier in its sole discretion);
  • Involves contests, sweepstakes, barter, advertising, or pyramid schemes;
  • Involves Bitcoin or Altcoin mining;
  • Is used to launch or attempt DDoS or DoS attacks of any kind;
  • Constitutes “click fraud” or, except for legitimate testing purposes (as determined by Supplier in its sole discretion), is intended to generate impressions, click-thrus, and/or other interactions of a user subsequent to an impression in connection with any online advertising; or
  • Is used for any other purpose other than the legitimate testing or validation of web sites, mobile web sites and applications.


Last update: May 2017

We'd like to set cookies, read why.

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.