Acceptable Use Policy
last updated: 23 November 2023
Version:POL-5 (REV 1)
This Acceptable Use Policy for using any products and services provided by Automata
- Agreement – signed document between the Customer and Automata, usually in the form of a Master Services Agreement or a Statement of Work.
- Authorised User – means the users authorised by the customer to use the software in accordance with the terms of this Agreement;
- Customer – the business that has entered into an Agreement with Automata and for whom these policies are relevant.
- End User – the person that will use the service.
- GDPR – General Data Protection Regulation.
- LINQ System – is Automata On-Premise Equipment, specifically the SCARA robotic arm, rail, transport layer, electronics within the bench including the hub, and bench frame itself.
- Partner – the customer who is in a working partnership with Automata.
- SaaS – Software As A Service – software delivery and licensing in which software is accessed online via a subscription.
- Services – the Subscribed Services, Set-up Services and Support Services;
- Software – Automata’s cloud-hosted software-as-a-service LINQ software application to which the customer has subscribed as set out in the relevant Statement of Work.
This Acceptable Use Policy (“AUP”) describes rules that apply to any party (“you”, “your”, “yours”, “Customer”, or “Partner”) using any products and services, provided by Automata as part of the Automata’s contractual obligations (“Services”) and any user of any software application or service made available by you that interfaces with the product or services provided by Automata.
The examples described in this AUP are not exhaustive. You are responsible for your End Users’ compliance with this AUP. If you or any End User violates this AUP, Automata may suspend your use of the Services. This AUP may be updated by Automata from time to time upon reasonable notice, which may be provided via your account, e-mail, or by posting an updated version of this AUP on the Automata website.
- Inappropriate content – users will not at any time use the services to transmit or store any content or communications (commercial or otherwise) that is illegal, harmful, unwanted, inappropriate, objectionable, confirmed to be criminal misinformation, or otherwise poses a threat to the public.
- Prohibited activities – do not use the Services to engage in or encourage any activity that is illegal, deceptive, harmful, violating others’ rights, or harmful to Automata’s business operations or reputation, including:
- Violations of laws – violating laws, regulations, governmental orders, or industry standards or guidance in any applicable jurisdiction (collectively, “Applicable Laws”). This includes violating Applicable Laws requiring (a) consent be obtained prior to transmitting, recording, collecting, or monitoring data or communications or (b) compliance with opt-out requests for any data or communications.
- Interference with the services – interfering with or otherwise negatively impacting any aspect of the services or any third-party networks that are linked to the services.
- Reverse engineering – reverse engineering, copying, disassembling, or decompiling the services.
- Falsification of identity or origin – creating a false identity or any attempt to mislead others as to the identity of the sender or the origin of any data or communications.
- Developing weapons or experimental creations with the intent of causing harm – using Automata systems to develop weaponized pathogens or chemicals with the explicit intent to cause harm to others.
- No service integrity violations – do not violate the integrity of the services, including:
- Bypassing Service Limitations – Attempting to bypass, exploit, defeat, or disable limitations or restrictions placed on the services.
- Altering or manipulating service measures – Attempting to alter, manipulate, or block communications of any metrics or telemetry measures used within the Product or service.
- Security Vulnerabilities – Finding security vulnerabilities to exploit the services or attempting to bypass any security mechanism or filtering capabilities. Any vulnerabilities should be communicated directly to Automata so that appropriate actions can be taken.
- Disabling the Services – Any Denial of Service (DoS) attack on the services or any other conduct that attempts to disrupt, disable, or overload the services.
- Harmful Code or Bots – Transmitting code, files, scripts, agents, or programs intended to do harm, including viruses or malware, or using automated means, such as bots, to gain access to or use the services, or sending malicious code or files.
- Unauthorised access – attempting to gain unauthorised access to the services.
- The customer shall ensure that only Authorised Users use the SaaS Software and that such use is at all times in accordance with this Agreement.
- The customer shall ensure that Authorised Users are, at all times whilst they have access to the SaaS Software, the employees or contractors of the customer and have received the appropriate training for working with and around the LINQ System.
- Authorised User Accounts cannot be shared or used by more than one individual at the same time.
Applicable data protection laws:
- all applicable data protection and privacy legislation in force from time to time in the UK including the retained EU law version of the General Data Protection Regulation ((EU) 2016/679) (UK GDPR), the Data Protection Act 2018 (and regulations made thereunder) or any successor legislation, and all other legislation and regulatory requirements in force from time to time which apply to a party relating to the use of personal data (including, without limitation, the privacy of electronic communications);
- to the extent the EU GDPR applies, the law of the European Union or any member state of the European Union to which the supplier is subject, which relates to the protection of personal data;
Contact our legal team
For questions or further information, please get in touch