CloudFire Services Use Policy
Versione
v1.2025
Ultimo aggiornamento
April 28, 2025
1) Premises
a) In accordance with the General Conditions, failure to comply with this Policy will result in the immediate suspension of the Services. Any requests for information regarding the content of this document must be sent in the manner set out in paragraph 27.1 of the General Conditions.
2) Violations
a) The use of the Services or Infrastructure or the network to carry out and/or promote illegal, abusive or irresponsible behavior is prohibited, including:
i) unauthorized access or use of data, systems or networks, including any attempt in violation of paragraph 5 below to probe, examine or test the possible vulnerability of a system, network, Services or Infrastructure;
ii) the violation of security or authentication measures without the express authorization of the owner of the system or network, Services or Infrastructure;
iii) to carry out or become part of activities, even through software, that cause interference, of any type, to the Services, to the Infrastructure or to any user of the same; by way of example but not limited to, attacks using pirated software, cracks, keygenerators, serials, computer attacks of any type, including DOS attacks, viruses or other harmful components or deliberate attempts to overload a transmission system;
iv) create situations of danger and/or instability and/or other technical problems that have an effect on the quality of the Services of the Contracting Party or Third Parties, causing damage to them and/or to CloudFire;
v) the collection or use of e-mail addresses, names or other identifiers without the consent of the person concerned (including, without limitation, spamming, phishing, internet scams, password theft, spidering);
vi) the collection or use of third-party information without the consent of the owner of the information; (including, without limitation, spamming, phishing, internet scams, password theft, spidering);
vii) the use and/or dissemination of any false, misleading, misleading information, even, by way of example but not limited to, by e-mail or newsgroup;
viii) the use of the Services for the distribution of software that fraudulently collects information or fraudulently transmits information;
ix) the use of the Services to offer information to the public (textual or graphic) harmful to the CloudFire image;
x) use the Services to offer anonymous communication systems, without maintaining the identity of the users as required by current legislation, such as, by way of example but not limited to, the so-called “TOR”, “anonymizer” or “VPN”.
xi) the use of the service for the distribution of so-called “adware” software unless:
(a) has the user's explicit consent to download and install the software based on a clear and clearly visible notice about the nature of the software;
(.b) it is software that can be easily removed with the use of standard tools for this purpose, included in the main operating systems (such as, by way of example, Microsoft “ad/remove”);
xii) the installation of applications available on the network that can create destabilizations to the service or infrastructure
iii) offer information to the public (textual or graphic) harmful to the CloudFire image through the services made available;
xiv) use the Service in such a way that it interferes with the normal functioning of the services nor make improper use of system resources such as, by way of example and not limited to, the use of software that saturates the performance capacity of the network, the disk system and the CPU.
3) Use of resources
a) The Contracting Party undertakes not to use equipment that is defective or not approved according to European standards, or that presents malfunctions that may damage the integrity of the Services, Infrastructure and/or create risks for the safety of people. CloudFire, in fact, does not provide any guarantee about the compatibility of the equipment (hardware) and programs (software) used by the Contracting Party with the Services, since all related checks are the sole responsibility of the Contracting Party.
4) Commercial Messages
a) The dissemination, in any way, of commercial messages through the Services is prohibited if you are unable to demonstrate:
i) that the recipients have given their prior consent to receive e-mail through an express opt-in procedure;
ii) that the consent collection procedures include appropriate tools to ensure that the person giving their consent is the owner of the e-mail address for which the consent was provided;
iii) that proof of the recipient's consent be kept in a form that can be promptly produced upon request;
iv) that procedures are applied that allow a recipient to revoke their consent, and that they are able to comply with the revocation of consent within 48 hours of receipt, informing the recipients that the revocation of their consent will be processed in a maximum of 48 hours;
v) that an e-mail address is always highlighted for any complaints;
(1) It is not allowed to obscure, in any form, the sender of the e-mail;
(2) CloudFire may suspend the transmission of e-mail messages that violate these provisions.
5) Vulnerability testing
a) The Contracting Party may not in any way attempt to probe, examine, verify or test the vulnerability of the Services and Infrastructure or to violate the security of any CloudFire system, either with passive or invasive techniques, without the express written consent of CloudFire. In the same way, the Contracting Party may not carry out these activities through the Services with respect to the Infrastructure or information of Third Parties without their explicit consent.
6) Offensive content
a) It is forbidden to publish, transmit or store on the CloudFire Infrastructure any content or link to content that may:
i) constitute, depict, encourage, promote or refer in any way to pedophilia, racism, fanaticism or pornography that are not included in compliance with current regulations on the subject and accessible only to people of legal age;
ii) do not provide and do not convey through the Service content that adopts vulgar, offensive and irreverent language or that in an offensive way refer to problems related to disabilities, social maladjustment, mental distress in development;
iii) not to provide and not convey through the Service content that represents or incites violence and/or that incites, in an express and/or subliminal way, hatred or attitudes of intolerance and discrimination based on differences in race, sex, religion, culture, nationality, health or that in general may harm the mental or moral development of the child;
iv) inciting violence, threatening or harassing;
v) be unfair or misleading with respect to the consumer protection laws of any jurisdiction, including chain letters and pyramid schemes;
vi) be defamatory or violate privacy;
vii) create a risk to personal safety or health, a risk to public safety or public health, compromise national security or interfere with investigations by the Judicial Authority;
viii) improperly disclose trade secrets or other confidential information owned by Third Parties;
ix) have the purpose of helping third parties to evade copyright;
x) infringe the copyright of third parties, trademarks, patents or other proprietary right of Third Parties;
xi) refer (or submit links) to gambling and/or online casinos, promote illegal drugs, violate export control laws, refer to illegal gambling or illegal arms trafficking;
xii) be otherwise illegal or solicit illegal behavior under applicable laws in the legal system of the Contracting Party or CloudFire;
xiv) be otherwise harmful, fraudulent, or lead to legal action against CloudFire.
(1) Content “posted or transmitted” through the CloudFire Services or Infrastructure must be considered to include web content, e-mail, chat, and any other type of publication or transmission based on the Internet.
7) Copywriting-protected material
a) The use of CloudFire's Services and Infrastructure to download, publish, distribute, copy or use in any way any text, music, software, art, image or other copyrighted work is prohibited, except where:
i) has been expressly authorized by the right holder;
ii) is otherwise permitted by applicable copyright laws in the relevant legal system.