• Violate any applicable federal, state, local, or international law or regulation (including, without limitation, any laws regarding the export of data or software to and from the US or other countries).
• Access data, a server or an account for any purpose other than conducting Cashmere AI business, even if you have authorized access
• Make statements about warranty, expressly or implied, unless it is a part of normal job duties
• Make fraudulent offers of products, items, or services originating from any Cashmere AI account for the purpose of exploiting, harming, or attempting to exploit or harm, minors in any way by exposing them to inappropriate content, asking for personally identifiable information, or otherwise.
• Send, knowingly receive, upload, download, use, or re-use any material which violates the rights of any individual or entity established in any jurisdiction.• Transmit, or procure the sending of, any advertising or promotional material, including any "junk mail," "chain letter," "spam," or any other similar solicitationImpersonate or attempt to impersonate Cashmere AI, an employee, contractor, another user, or any other person or entity (including, without limitation, by using e-mail addresses or screen names associated with any of the foregoing).
• Engage in any other conduct that restricts or inhibits anyone's use of the network, or which, as determined by us, may harm Cashmere AI or users of the network or expose them to liability.
• Disable, overburden, damage, or impair the network or interfere with any other party's use of the network, including their ability to engage in real time activities through the network
.• Use any robot, spider, or other automatic device, process, or means to access the network for any purpose, including monitoring or copying any network traffic or resources available on the network.
• Use any manual process to monitor or copy any network traffic or resources available on the network or for any other unauthorized purpose without Cashmere AI's prior written consent.
• Use any device, software, or routine that interferes with the proper working of the network
• Introduce any viruses, honeypots, trojan horses, worms, logic bombs, or other software or material which is malicious or technologically harmful.
• Attempt to gain unauthorized access to, interfere with, damage, or disrupt any parts of the network or any server, computer, database, or other resource or element connected to the network.
• Violate, attempt to violate, or knowingly facilitate the violation of the security or integrity of the network.
• Use of organization-provided identifiers (e.g., email addresses) and authentication secrets (e.g., passwords) for creating accounts on external sites/applications