Acceptable use policy

October 2023

This document is our acceptable use policy. It is part of our terms of service and applies to all F‑Secure services (as that term is defined in our terms of service). By accepting our terms of service or using or accessing any F‑Secure service, you agree to comply with this acceptable use policy. In connection with your use of any F‑Secure service, you agree not to:

  1. Post, use or transmit abusive messages, defamatory, libelous, false or misleading statements, hate speech, or messages that incite or threaten violence;

  2. Post, use or transmit any content that is unlawful, offensive, threatening, libelous, defamatory, obscene or otherwise objectionable;

  3. Harass, annoy, intimidate or threaten other users of the F‑Secure services or employees, contractors or agents of F‑Secure or its service providers;

  4. Transmit spam, chain letters, or other unsolicited email;

  5. Impersonate another person, misrepresent your affiliation with another person or entity, engage in fraud, or hide or attempt to hide your identity;

  6. Access any part of the F‑Secure service that you are not authorized to access;

  7. Access any part of the F‑Secure service, or any content or data therein, through any technology or means other than those expressly provided to you by F‑Secure;

  8. Access any part of the F‑Secure service, or any content or data therein, through technologies such as “scraping tools,” “robots,” “spiders” or “offline readers,” or through any system that sends more request to F‑Secure’s servers than a human can reasonably produce in the same period of time, or bypass any robot exclusion measures we may put into place;

  9. Use an F‑Secure service in a manner that interferes or may interfere with the normal functioning, security, integrity or operation of the F‑Secure service;

  10. Upload or transmit invalid data, viruses, worms, harmful code, malware, or other software agents;

  11. Decipher or decrypt transmissions from any F‑Secure service, circumvent or disable (or attempt to circumvent or disable) any access, authentication, copy restrictions or other feature of any F‑Secure service, attempt to access or use the F‑Secure services through means other than those we expressly provide to you, or otherwise attempt to compromise or violate the security of any F‑Secure service or its components (including another user’s account);

  12. Attempt to identify, probe, scan or test any vulnerability of any part of the F‑Secure service(s) without F‑Secure’s signed, written authorization;

  13. Attempt to modify, or gain unauthorized use of or access to, another user's account(s), web­site(s), application(s), system(s), equipment or data;

  14. Collect or harvest any personally identifiable information (including account names) from any other user;

  15. Use any F‑Secure service in violation of any applicable law or regulation, including intellectual property and privacy laws in applicable jurisdictions;

  16. Post, use or transmit any content, data or materials that violate applicable laws or regulations or any third party rights (including any intellectual property, privacy or publicity rights); and/or

  17. Attempt or facilitate violations of any of the foregoing.

Without limiting any other remedies available to it, F‑Secure may in its sole discretion suspend or terminate access to the F‑Secure service for violations of this acceptable use policy (as determined by F-Secure), to prevent harm to other parties, or to preserve our security, availability or integrity.