Acceptable Website Use and Data Policy
1. Overview
Smash Factor LLC is committed to protecting its clients (actual and potential), employees,
and the company from illegal or damaging actions by individuals, whether intentional or unintentional.
Internet, intranet, and extranet-related systems — including but not limited to the company’s name,
website domain address, email, computer equipment, mobile devices, software, operating systems, storage media,
and network accounts (email, web browsing, FTP, etc.) — are the property of Smash Factor LLC.
These systems must be used for business purposes in serving the interests of the company, its clients,
and its customers during normal operations.
2. Purpose
The purpose of this policy is to outline the acceptable use of:
- The company’s name and website domain address
- Email
- Computer equipment
- Other electronic devices
These rules are in place to protect Smash Factor LLC, its clients, and employees.
Inappropriate use exposes the company to risks including:
- Virus and ransomware attacks
- Compromise of network systems and services
- Data breaches
- Legal issues
3. Scope
This policy applies to:
- The company’s name and website domain address
- Email and company information
- Electronic and computing devices
- Network resources used to conduct Smash Factor LLC business
It applies to all:
- Clients (actual or potential)
- Employees
- Contractors
- Consultants
- Temporary workers
- Third-party affiliates
All individuals are responsible for exercising good judgment in accordance with
Smash Factor LLC policies, standards, and applicable laws.
Exceptions: Documented in Section 5.2.
4. Policy
4.1 General Use and Ownership
- Proprietary information published on the company’s website or stored on devices
(whether owned or leased by Smash Factor LLC, a client, an employee, or a third party)
remains the sole property of Smash Factor LLC.
- Authorized individuals may monitor website activity, equipment, systems,
and network traffic at any time for security and maintenance purposes.
- Smash Factor LLC reserves the right to audit its website, networks, and systems
periodically to ensure compliance.
4.2 Unacceptable Use
The following activities are prohibited. This list is not exhaustive but provides a framework for unacceptable behavior.
4.2.1 System and Network Activities
The following are strictly prohibited, with no exceptions:
- Violating the rights of any person or company protected by copyright, trade secret, patent, or intellectual property laws.
- Installing or distributing pirated or unlicensed software.
- Unauthorized copying of copyrighted material (e.g., photographs, books, music, or software).
- Accessing data, servers, or accounts for non-business purposes, even if authorized.
- Exporting software or technical information in violation of international or regional export laws.
- Introducing malicious programs (e.g., viruses, worms, trojans, ransomware).
- Sharing account passwords or allowing others to use your account.
- Making fraudulent offers of products, items, or services from a Smash Factor LLC account.
- Effecting security breaches or network disruptions, including but not limited to:
- Accessing data without authorization
- Logging into servers or accounts without explicit authorization
- Network sniffing
- Ping floods, packet spoofing, denial of service (DoS) attacks
- Brute-forcing accounts
- Forged routing information for malicious purposes
- Performing port scanning or security scanning without authorization.
- Circumventing authentication or security controls.
- Interfering with or denying service to any user of Smash Factor LLC’s network or website (e.g., DoS attacks).