Prohibited Activities Policy

This Prohibited Activities Policy (“Policy”) is incorporated into the Amplifier terms of service as published on the Amplifier website (“Terms”). The Terms shall control in the event of any conflict or inconsistency between this Policy and the Terms. All capitalized terms not otherwise defined in this Policy will have the meaning given them in the Terms. 

You may only use the Services as expressly permitted by Amplifier. You may not cause harm to the Amplifier Platform or the Services.

1. Prohibited Activities. Specifically, but not by way of limitation, you may not:

(a) upload, download, post, email or otherwise transmit any material that contains software viruses or any other computer code, files or programs designed to interrupt, destroy or limit the functionality of any computer software or hardware or telecommunications equipment;

(b) modify, create derivative works from, reverse engineer, decompile or disassemble any technology used to provide the Services;

(c) interfere with, or disrupt the access of any user, host or network, including, without limitation, sending a virus, overloading, flooding, spamming, or by scripting the creation of content in such a manner as to interfere with or create an undue burden on the Service;

(d) use a robot, spider or other device or process to monitor the activity on or copy pages from the App or site, except in the operation or use of an internet “search engine”, hit counters or similar technology;

(e) collect electronic mail addresses or other information from third parties by using the Service;

(f) impersonate another person or entity or otherwise misrepresent your affiliation with a person or entity;

(g) use any meta tags, search terms, key terms, or the like that contain Amplifier’s name or trademarks;

(h) engage in any activity that interferes with another user’s ability to use or enjoy the Services; or

(i) assist or encourage any third party in engaging in any activity prohibited by this TOS.

(j) use the Service to harm minors in any way, including, but not limited to, uploading Content that violates child pornography laws, child sexual exploitation laws and laws prohibiting the depiction of minors engaged in sexual conduct;

(k) upload Content that may be seen as condoning or encouraging unsafe practices that would result in the physical, mental or moral harm of children;

(l) upload, download, post, email or otherwise transmit any Content that is unlawful, harmful, threatening, abusive, vulgar, harassing, defamatory, obscene, pornographic, profane, indecent, inflammatory, defamatory, libelous, tortious, hateful, racially, ethnically, socially, politically, legally, morally, religiously objectionable or otherwise objectionable, or invasive of another’s rights including but not limited to rights of celebrity, privacy and intellectual property.

(m) upload, download, post, email or otherwise transmit any Content that may infringe any patent, trademark, trade secret, copyright or other intellectual or proprietary right of any party. As a guideline, you may contribute only original work that you have created yourself from original elements. This means you can’t use images of celebrities or corporate products, nor images, text, or designs that you’ve copied from a website without written permission from the owner. You cannot create a “new” image using elements from images other people have created. You cannot contribute a quote or a slogan that is substantially the same as something already written by someone else. By uploading any Content, you represent and warrant that you have the lawful right to reproduce and distribute such Content and that the Content complies with all applicable federal, state and local laws, regulations and ordinances;

(n) upload, download, post, email or otherwise transmit any Content that would constitute or encourage a criminal offense, illegal activity, violate the rights of any party, or that would otherwise create liability or violate any local, state, national, or international law;

(o) upload, download, post, email or otherwise transmit false or misleading information;

(p) disrupt or interfere with the security of, or otherwise abuse, the Service;

(q) disrupt or interfere with any other user’s enjoyment of the Service or affiliated or linked websites;

(r) use an anonymizing proxy;

(s) incorporate images or names that would violate a person’s right of privacy or publicity; or

(t) use a manual or automatic device or process to retrieve, index, “data mine” or in any way reproduce or circumvent the navigational structure or presentation of the Service.

(u) breach the Amplifier Terms or Policies;

(v) violate any law, statute, ordinance, or regulation;

(w) control an Account linked to another Account that has violated this or other Amplifier policies.

2. Monitoring. Amplifier reserves the right, but does not assume the obligation, to monitor transactions and communications that occur through the Service. If Amplifier determines, in its sole and absolute discretion, that you or another Amplifier user will breach a term or condition of this Policy or that such transaction or communication is inappropriate, Amplifier may cancel such transaction or take any other action to restrict access to or the availability of any material that may be considered objectionable, without any liability to you or any third party.

3. Warranty Void. If you engage in any of the activities or conduct prohibited by this Policy then any and all express or implied warranties shall become null and void.