Acceptable Use Policy

 

Last Updated: May 12, 2026

This Acceptable Use Policy (this “AUP”) describes activities that are not allowed in connection with your use of the products and services (the “Services”) offered by enhancedCPETanalytics LLC (“eCPETa”, “we” or “us”).

For purposes of this AUP, “Customer” means the entity that has entered into an agreement with eCPET for the Services (the “Agreement”), and “Authorized Users” or “you” means Customer’s employees and contractors permitted to access the Services. Customer is responsible for ensuring its Authorized Users comply with this AUP.

The Services are intended for Customer’s internal business purposes in accordance with the Agreement and this AUP.  TheexamplesdescribedinthisAUParenotexhaustive,andnothinginthis AUPisintendedtograntanyrightsorpermissionsnotsetforthin,orcontraryto,thosecontained inthe Agreement.

We may modify this AUP at any time by posting a revised version on our website. By using the Services, you agree to the latest version of this AUP. If you violate the AUP or authorize or help others to do so, we may suspend or terminate your use of the Services. You are responsible for violations of this AUP by anyone using your account with your permission or on an unauthorized basis. Your use of the Services to assist another person in an activity that would violate this AUP if performed by you is a violation of the AUP.

No Illegal, Harmful, or Offensive Use or Content

You may not use, or encourage, promote, facilitate or instruct others to use, the Services for or in connection with any illegal, harmful or offensive purpose, or to transmit, store, display, distribute or otherwise make available content that is illegal, harmful, or offensive. Prohibited activities or content include:

  • Illegal Activities. Any use of the Services in violation of law or in furtherance of illegal activities.
  • Fraudulent or Harmful Activities. Activities that may be harmful to others, or our operations or reputation, including offering or disseminating fraudulent goods, services, schemes, or promotions (e.g., make-money-fast schemes, Ponzi and pyramid schemes, phishing, or pharming), impersonating another person or entity, or engaging in other deceptive practices.
  • Violation of Intellectual Property Rights. Using the Services in a manner that violates or infringes on or misappropriates the intellectual property or proprietary rights of any third party, including without limitation any rights in or to copyright, patent, trademark, trade secret, privacy or publicity, and publishing content intended to assist others in defeating technical measures intended to protect any such rights.
  • Offensive Content. Content that is defamatory, obscene, abusive, invasive of privacy, deceptive, pornographic, or otherwise objectionable in a manner that is reasonably likely to harm cPET, its customers or third parties, or to violate applicable law.
  • Harmful Content. Content or other computer technology that may damage, interfere with, surreptitiously intercept, or expropriate any system, program, or data, including viruses, malware, adware, Trojan horses, worms, or time bombs.
  • Violent, Harassing, or Abusive Content. Publishing, transmitting or storing any content or links to any content that is excessively violent, incites violence, threatens violence, contains harassing content or hate speech, creates a risk to a person’s safety or health, or public safety or health, compromises national security or interferes with an investigation by law enforcement.
  • Deceptive Content. Content that is unfair or deceptive under the consumer protection laws of any jurisdiction.
  • Controlled Substances. Selling or distributing controlled substances, including but not limited to any illegal or prescription drugs.
  • Misuse of Personal Data. Processing, storing, or transmitting personal data in violation of applicable data protection or privacy laws, or in a manner inconsistent with Customer’s rights and obligations with respect to such data.

No Security Violations

You may not use the Services to violate the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a “System”). Prohibited activities include:

  • Unauthorized Access. Accessing or using any System without permission, including attempting to probe, scan, or test the vulnerability of a System or to breach any security or authentication measures used by a System.
  • Interception. Monitoring of data or traffic on a System without permission.
  • Account Misuse. Sharing access credentials, circumventing account limitations, or otherwise using the Services in a manner inconsistent with assigned access rights.

Vulnerability Testing

You may not attempt to probe, scan, penetrate, or test the vulnerability of a eCPET system or network, or to breach the eCPET security or authentication measures, whether by passive or intrusive techniques, or conduct any security or malware research on or using the Services, without eCPET’s prior written consent.

Bot, Spiders, and Scraping

You may not access or use the Services through any automated means except as expressly authorized by eCPET in writing in advance. Without limiting the foregoing, you agree not to (and not to permit any third party to):

(a) use any robot, crawler, scraper, spider, data mining tool, harvesting tool, or other automated software or device to access, query, monitor, copy, index, download, or otherwise extract data or content from the Services;

(b) systematically retrieve data or other content from the Services to create, compile, directly or indirectly, a collection, database, or directory without eCPET’s prior written consent;

(c) bypass, circumvent, or interfere with any rate limits, access controls, technical restrictions, or protective measures implemented by eCPET, including measures designed to prevent or restrict automated access;

(d) access or use the Services in a manner that imposes an unreasonable or disproportionately large load on the Services or its supporting infrastructure;

(e) scrape, extract, or use any content or data from the Services (including outputs) for the purpose of developing, training, fine-tuning, benchmarking, evaluating, or validating any machine learning or artificial intelligence models or systems, except as expressly authorized in advance in writing;

(f) access or use the Services in violation of the Services’ robots.txt file or any other technical or policy-based restrictions governing automated access.

Any unauthorized use of the Services’ content, including through scraping or other automated means, may result in immediate suspension or termination of access, and eCPET reserves all rights to pursue any available legal or equitable remedies.

Excessive Use of Shared System Resources

You may not use the Services in a way that unnecessarily interferes with their normal operation, or that consumes a disproportionate share of resources. You agree that we may quarantine or delete any data stored on the Services if the data is infected with a virus, or is otherwise corrupted, and has the potential to infect or corrupt the System or other customers’ data that is stored on the same system.

Our Monitoring and Enforcement

We reserve the right, but do not assume the obligation, to investigate any violation of this AUP or misuse of the Services. We may:

  • investigate violations of this AUP or misuse of the Services;
  • remove, disable access to, or modify any content or resource that violates this AUP or any other agreement we have with you for use of the Services; or
  • report any activity that we suspect violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. Our reporting may include disclosing, reviewing and preserving appropriate customer information, including disclosing, reviewing, and preserving Customer information to the extent reasonably necessary to comply with applicable law or support such investigation.
  • We also may cooperate with appropriate law enforcement agencies, regulators, or other appropriate third parties to help with the investigation and prosecution of illegal conduct by providing network and systems information related to alleged violations of this AUP.

Consequences of Violation of AUP

If we determine that you have violated this AUP, we may suspend or terminate your use of the Services. We may intercept or block any content or traffic where the Services is being used unlawfully or not in accordance with this AUP. Our right to suspend or terminate your use of the Services applies even if a violation is committed without your authorization.

Where reasonably practicable, eCPET will provide notice of any violation and an opportunity to cure prior to suspension or termination; provided that eCPET may act immediately where necessary to prevent harm, legal exposure, or security risks.

Reporting of Violations of this AUP

If you become aware of any violation of this AUP, you will immediately notify us and provide us with assistance, as requested, to stop or remedy the violation. To report any violation of this AUP, please contact us at info@enhancedcptanalytics.com.

Inquiries regarding this AUP should be directed to info@enhancedcptanalytics.com.