Acceptable Use Policy
You agree not to misuse Filecamp’s services ("Services") or help anyone else to do so. For example, you must not even try to do any of the following in connection with the Services:
- Interfere or attempt to interfere in any manner with the functionality or proper working of the Services.
- Use any robot, spider, data scraping, automation, or extraction tool, or similar mechanism in the Services.
- Probe, scan or test the vulnerability of any system or network unless done with written permission from Filecamp.
- Breach or otherwise bypass any security or authentication measures of the Services.
- Transmit viruses, malware, any other malicious or destructive code, or other prohibited items, into the Services. Prohibited items include: any routine, device, or other undisclosed feature (e.g., so-called time bomb, virus, software lock, drop dead device, malicious logic, worm, Trojan horse, or trap, back door or software routine) that is either (1) designed to delete, disable, deactivate, interfere with, or otherwise harm any software, program, data, device, system, or service; or (2) intended to provide unauthorized access or produce unauthorized modifications.
- Distribute content that harms or interferes with the operation of the Services or third-party networks, servers, or other infrastructure.
- Use the Services for phishing scams.
- Access or use portions of the Services you are not authorized to access or use.
- Reverse engineer, decompile, disassemble, attempt to gain unauthorized access to, or attempt to discover the underlying source code or structure of, the Services, and the technology and software used to provide them, and all intellectual property and proprietary rights therein.
- Access, tamper with, or use non-public areas or parts of the Services, or shared areas of the Services you haven't been invited to.
- Interfere with or disrupt any user, host, or network, for example by sending a virus, overloading, flooding, spamming, or mail-bombing any part of the Services.
- Access, search or create accounts for the Services by any means other than our publicly supported interfaces (for example, "scraping" or creating accounts in bulk).
- Send unsolicited communications, promotions or advertisements, or spam.
- Circumvent storage space limits.
- Publish or share materials that are unlawfully pornographic or indecent, or that contain extreme acts of violence or terrorist activity, including terror propaganda.
- Violate the law in any way, including storing, publishing, or sharing material that's fraudulent, defamatory, misleading, or violates the privacy or infringes the rights of others.