Acceptable Use Policy

Bespoke Technology Labs (“We”) are chosen by many of our clients because of our high quality works, and we’re proud that our customers can trust our services. In exchange, we trust you to use our products and services responsibly.

You agree to not misuse any products and services offered by Bespoke Technology Labs.
For example, you must not attempt to do the following:

  • Crawl, scan, spider, or scrape any of our systems or networks;
  • Access or use areas or parts of our products, services, accounts, or shared resources which you do not have permission or authorisation to;
  • Breach or otherwise circumvent our security and/or authentication measures;
  • Interfere with or disrupt specific users, hosts, networks, or services (for example by uploading a virus, overloading, flooding, spamming, or mail-bombing any part of our products and/or services);
  • Send unsolicited communications, promotions, advertisements, or spam;
  • Access or search our products and services by any means other than our publicly supported interfaces and/or APIs (excluding recognised search engines).
  • Use our content or others’ property without appropriate written authorisation;
  • Send altered, deceptive, or false information, including “spoofing” or “phishing”;
  • Promote or advertise on our products or services without authorisation;
  • Abuse Bespoke Technology Labs referrals or promotions for personal or corporate gain;
  • Abuse our products or services in a manner that disrupts other users’ property or activity;
  • Sell our products or services via unauthorised channels;
  • Violate the law in any way including storing, publishing, or sharing material that’s fraudulent, defamatory, misleading, or that violates the privacy or infringes the rights of others;

Breaches
Any breach of our acceptable use policy will be investigated. Where appropriate, incidents will be reported to the relevant authorities.
This policy does not affect your statutory rights. Legal action can be taken in accordance with the Computer Misuse Act 1990.

The Computer Misuse Act 1990 makes the following criminal offences: to gain unauthorised access to computer material; to gain unauthorised access to computer material with intent to commit or facilitate commission of further offences or to modify computer material without authorisation.

Contact
If you have any questions, comments or requests regarding this acceptable use policy, or your dealings with this website and our products and services, please feel free to get in touch with us.

Last Updated on 14th March 2019