Configure IT

Legal Terms & Conditions

Terms & Conditions

Basic introduction intended for beginners to learn & get acquainted with Configure.IT

You acknowledge that the Service is made available to you and provide to you based on the information that you provide upon registration as a user of the Service. Therefore, you agree and warrant that all registration information provided by you through this website will be truthful, accurate and current and that you will update all registration information as and when necessary to keep it truthful, accurate and current. Providing any untruthful or inaccurate information may constitute a breach of these Terms. You are responsible for the security of your user name, password and account, and for any use of your user name, password and account. If you become aware of any unauthorized use of your user name, password and account, or other breach or compromise of security, you agree to notify Configure.IT promptly. However, you may be held liable for losses incurred by Configure.IT or any other user of or visitor to the Configure.IT website due to someone else using your Configure.IT user name, password and account. Only one registration is allowed per person and your registration is personal to you and cannot be transferred to any other person.

  1. You must be a human. Accounts registered by “bots” or other automated methods are not permitted.
  2. You must provide your legal full name, a valid email address, and any other information requested in order to complete the signup process to open an account / request for invite.
  3. You are responsible for maintaining the security of your Account and password. Configure.IT cannot and will not be liable for any loss or damage from your failure to comply with this security obligation.
  4. You are responsible for all text, data, graphics, images, photos and video files posted on the Site (“Content”) and activity that occurs under your Account (even when Content is posted by others who have access to your Account).
  5. You may not use the Service for any illegal or unauthorized purpose. You must not, in the use of the Service, violate any laws in your jurisdiction (including but not limited to copyright and privacy laws).

 

You may not use anyone else’s Configure.IT password or account at any time. Configure.IT cannot and will not be liable for any loss or damage arising from your failure to comply with these obligations.

Platform / Website Usage

Users are prohibited from directly or indirectly violating or attempting to violate the security of the Configure.IT website

  • Accessing data not intended for the user or logging into a server or account which such user is not authorized to access.
  • Attempt to gain unauthorized access to any portion or feature of Configure.IT website, or any other systems or networks connected to Configure.IT website or to any Configure.IT server, or to any of the services offered on or through Configure.IT website, by hacking, password “mining” or any other illegitimate means.
  • Attempting to probe, scan or test the vulnerability of Configure.IT website or any network connected to Configure.IT website, or breach the security or authentication measures on Configure.IT website or any network connected to Configure.IT website. You may not reverse look-up, trace or seek to trace any information on any other user of or visitor to Configure.IT website, or any other customer of Configure.IT , including any Configure.IT account not owned by you, to its source, or exploit Configure.IT website or any service or information made available or offered by or through Configure.IT website, in any way where the purpose is to reveal any information, including but not limited to personal identification or information, other than your own information, as provided for by Configure.IT website.
  • Attempting to disable or circumvent any security mechanisms used by the Service.
  • Taking any action that imposes an unreasonable or disproportionately large load on the infrastructure of Configure.IT website or Configure.IT’s systems or networks, or any systems or networks connected to Configure.IT website or to Configure.IT
  • Attempting to interfere with service to any user, host or network, including, without limitation, using any means, including overloading, “flooding”, “mail bombing” or “crashing”
  • Sending or using the Service to create an Application that performs a malicious activity, including but not limited to spamming users, harvesting usernames and passwords, performing unauthorized scans of machines or ports,
  • Using the Service to create an Application that interferes with, disrupts, damages, or accesses in an unauthorized manner the servers, networks, or other properties or services of any third party, including, but not limited to, Configure.IT or any mobile communications carrier,
  • Forging, or using the Service to create an Application that forges, any TCP/IP packet header or any part of the header information in any email sent from within or to the Service,
  • Using any “deep-link”, “page-scrape”, “robot”, “spider” or other automatic device, program, algorithm or methodology, or any similar or equivalent manual process, to access, acquire, copy or monitor any portion of the Configure.IT website or Service or any Configure.IT Content or User Content, or in any way reproduce or circumvent the navigational structure or presentation of the Configure.IT website or Service, or to obtain or attempt to obtain any materials, documents or information through any means not purposely made available through the Configure.IT website,
  • Using or attempting to use any engine, software, tool, agent or other device or mechanism (including without limitation browsers, spiders, robots, avatars or intelligent agents) to navigate or search the Configure.IT website other than the search engine and search agents available from Configure.IT on the Configure.IT website and other than generally available third party web browsers (e.g., Netscape Navigator, Microsoft Explorer).
  • Using any device, software or routine to interfere or attempt to interfere with the proper working of the Configure.IT website or any activity being conducted on the Configure.IT website.

 

Actual or attempted violations of the Service or network security may result in immediate termination of access to the Configure.IT website and/or civil or criminal liability. Configure.IT reserves the right to investigate occurrences that may involve violations of the use of the Service and to contact and/or cooperate with law enforcement authorities in prosecuting users or any other person(s) who are involved in any actual or attempted violations of the use of the Service.