MobileIron Acceptable Use Policy

 

(version January 20, 2017)

This MobileIron Acceptable Use Policy (this “Policy”) describes prohibited uses of the cloud-based services offered by MobileIron, Inc. (the “SaaS Products”) to you (a “Customer”). The examples described in this Policy are not exhaustive. MobileIron may modify this Policy at any time by posting a revised version. By accessing or using the SaaS Products, Customer agrees to the latest version of this Policy. If Customer violates the Policy or authorizes or helps others to do so, MobileIron may suspend or terminate Customer’s use of the SaaS Products.

 

No Illegal, Harmful, or Offensive Use or Content

Customer may not access, use, or authorize, encourage, promote, facilitate or help others to use, the SaaS Products for any illegal, harmful, fraudulent, infringing or offensive use, or to transmit, store, display, distribute or otherwise make available content that is illegal, harmful, fraudulent, infringing or offensive. Prohibited activities or content include any activities that are illegal, that violate the rights of others, or that can be harmful to others, or MobileIron’s operations or reputation; content that infringes or misappropriates the intellectual property or proprietary rights of others; content that is defamatory, obscene, abusive, invasive of privacy, or otherwise objectionable; or content or other computer technology that can damage, interfere with, surreptitiously intercept, or expropriate any system, program, or data, including viruses, Trojan horses, worms, time bombs, spyware or cancelbots.

 

No Security Violations

Customer may not use the SaaS Products to violate the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a “System”). Prohibited activities include accessing or using any System without permission, including attempting to probe, scan, or test the vulnerability of a System or to breach any security or authentication measures used by a System; monitoring of data or traffic on a System without authorization; or forging TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route. The legitimate use of aliases and anonymous remailers is not prohibited by this provision.

No Network Abuse

Customer may not make network connections to any users, hosts, or networks unless Customer has permission to communicate with them. Prohibited activities include monitoring or crawling of a System that impairs or disrupts the System being monitored or crawled; inundating a target with communications requests so the target either cannot respond to legitimate traffic or responds so slowly that it becomes ineffective; interfering with the proper functioning of any System, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, or flooding techniques; operating network services like open proxies, open mail relays, or open recursive domain name servers; or using manual or electronic means to avoid any use limitations placed on a System, such as access and storage restrictions, or to avoid incurring fees.

No E-Mail or Other Message Abuse

Customer must not access or use the SaaS Products to distribute, publish, send, or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations (like “spam”), including commercial advertising and informational announcements. Customer will not alter or obscure mail headers or assume a sender’s identity without the sender’s explicit permission. Customer will not collect replies to messages sent from another internet service provider if those messages violate this Policy or the acceptable use policy of that provider.

MobileIron’s Monitoring and Enforcement & Violations of this Policy

MobileIron reserves the right, but does not assume the obligation, to investigate any violation of this Policy or misuse of the SaaS Products. MobileIron may investigate violations of this Policy or misuse of the SaaS Products; or remove, disable access to, or modify any content or resource that violates this Policy or any other agreement MobileIron has with Customer for use of the SaaS Products.

MobileIron may report any activity that MobileIron suspects violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. MobileIron’s reporting may include disclosing appropriate Customer information or content. MobileIron also may cooperate with appropriate law enforcement agencies, regulators, or other appropriate third parties to help with the investigation and prosecution of illegal conduct by providing network and systems information related to alleged violations of this Policy.

If Customer becomes aware of any violation of this Policy, Customer must immediately notify us and provide MobileIron with assistance, as requested, to stop or remedy the violation.

CUSTOMER AGREES TO HOLD MOBILEIRON HARMLESS FROM AND AGAINST, AND WAIVE (TO THE EXTENT PERMITTED BY APPLICABLE LAW) ANY CLAIMS CUSTOMER MAY HAVE AGAINST MOBILEIRON RESULTING FROM ANY DISCLOSURE, INVESTIGATION OR ACT OR OMISSION OF MOBILEIRON IN THE COURSE OF CONDUCTING OR COOPERATING WITH AN INSPECTION AS DESCRIBED IN THIS POLICY.