8.1. Customer hereby grants to Provider a license to copy, store, record, transmit, display, view, print and use Customer Data, solely to the extent necessary to provide the Services to Customer. Except as expressly provided in this Section 8, Customer grants to Provider no right, title, interest, or license in the Customer Data. Customer represents and warrants that it has all necessary consents and rights to provide personally identifiable information about its Users to Provider, and Customer will provide such information upon reasonable request by Provider.
8.2. Customer represents and warrants that it will not use the Services for any illegal, fraudulent, improper, or abusive purpose or in any way that interferes with Provider’s ability to provide high-quality Services to other customers, prevents or restricts other customers from using the Services, or damages any of Provider’s or other customers’ property. If Provider discovers use of the Services for anything other than the permitted uses in this Agreement or for any of the prohibited uses in this Agreement, Provider may at its sole discretion terminate or suspend all or part of Customer’s Services and charge any applicable fees for the Services used plus damages caused by such improper use. Prohibited uses include, but are not limited to: (a) behavior that is illegal, obscene, threatening, harassing, defamatory, libelous, deceptive, fraudulent, malicious, infringing, tortious or invasive of another’s privacy; (b) sending unsolicited messages or advertisements, including email, voicemail, text messages or faxes (commercial or otherwise) (“spamming”), or otherwise sending bulk or junk email, voicemail, text messages or faxes; (c) harvesting or otherwise collecting information about others, including email addresses, without their consent; (d) negligently, recklessly, knowingly or intentionally transmitting any material that contains viruses, time bombs, Trojan horses, worms, malware, spyware or any other programs that may be harmful or dangerous; (e) creating a false caller identity (“ID spoofing”) or forged email/text message address or header, or otherwise attempting to mislead others as to the identity of the sender or the origin of any communication made using the Services; (f) transmitting any material that may infringe, misappropriate, or otherwise violate the foreign or domestic intellectual property rights or other rights of third parties; (g) violating any U.S. or foreign law regarding the transmission of technical data or software exported through the Services; (h) using the Services in excess of what, in Provider’s sole discretion, would be expected of normal business use, including without limitation allowing more than one user to use a single VoIP line or using a single VoIP line in excess of what would be expected of a single user; (i) using the Services in any way that interferes with other customers’ and third parties’ use and enjoyment of the Services; (j) using or employing methods and/or devices that are designed or likely to take advantage of, bypass, exploit or otherwise avoid this use policy.
8.3. Customer understands and agrees that: (a) it will be solely liable for any transmissions sent through the Services under its account or its User’s account, including the content of any transmission sent through the Services under its account or its User’s account; (b) it will abide by all applicable Provider policies, procedures and agreements related to the Services; and (c) it will not attempt to gain unauthorized access to the Services, other accounts, computer systems or networks connected to the Services through password mining or any other Means.
8.4. Some of Provider’s plans and other Services are offered on an “unlimited” basis. All unlimited plans: (a) may only be used for normal commercially reasonable business use; (b) are provided only for dialog between two individuals at one time per line; (c) are issued on a “one (1) user per line basis”, meaning that only one registered User may be assigned to use the Services for any one line; and (d) are subject to additional usage charges, including but not limited to such charges associated with international calling, in accordance with the then-current rates that can be attained by contacting Rally Networks. Unlimited plans may not be used for any of the following prohibited uses (which are in addition to the other prohibited uses applicable to all Services): (i) trunking or forwarding a Provider Number to another phone number capable of handling multiple simultaneous calls, or to a private branch exchange (PBX) or a key system; (ii) spamming or blasting (e.g., sending bulk or junk voicemails, emails, text messages or faxes simultaneously); (iii) bulk call-in lines (e.g., customer support or sales call centers, “hotlines”, 900 numbers, sports-line numbers, etc.); or (iv) auto-dialing or “predictive” dialing (i.e., non-manual dialing or using a software program or other means to continuously dial or place out-bound calls). In addition, unusually high usage of the Services may impair Provider’s ability to provide high-quality Services to others and/or indicate unauthorized use of the Services, in which case Provider may suspend or terminate Customer’s account or, upon prior notice, convert Customer’s account to a metered calling plan that charges significantly higher usage rates.
8.5. Customers must report any unauthorized use of the Services to Provider immediately after Customer discovers such use. Customers are responsible for all use of the Services, whether authorized or unauthorized. Customers will be responsible if any of its Users use the Services in a manner prohibited by this Agreement. Customers will be responsible for any act or omission of a User that would be a breach of this Agreement if done by Customer.
8.6. Customer acknowledges and agrees that the right to use any Services is nonexclusive and nontransferable, and Customer will not permit use of the Services other than for its internal business purposes. Nothing in this Agreement will pass to Customer or any User title to any of the Services, any trade names, trade dress, trademarks, service marks, commercial symbols, copyrightable material, designs, logos and/or any other intellectual property of Provider or its vendors. Customers will not challenge or attempt to register or otherwise protect any of Provider’s intellectual property or other rights in the Services.
8.7. Customer will not: (a) copy or adapt the Services for any purpose, except as specifically permitted under this Agreement; (b) use the Services except in accordance with all applicable laws and regulations, and except as set forth in this Agreement; (c) reverse engineer, translate, decompile, or disassemble the Services; (d) use the Services in any outsourcing, application service provider, time-sharing or service bureau arrangement, including, without limitation, any use to provide services or process data for the benefit of, or on behalf of, any third party other than a User; (e) cause or permit the disabling or circumvention of any security mechanism contained in or associated with the Services; or (f) delete, alter, cover, or distort any copyright or other proprietary notices or trademarks with respect to the Services.
8.8. Customer understands and accepts that, in order to protect Customer against fraudulent use of the Services, Provider may require Customer to contact Provider in order to enable calling to certain calling destinations.
8.9. Customer will execute such other documents, provide such other information, and affirmatively cooperate with Provider, all as may be reasonably required by Provider relevant to providing the Services.