Greg’s Japanese Auto supports the free flow of information and ideas over the Internet. Although Greg’s Japanese Auto has and accepts no obligation to monitor your use of the Service nor edit or censor content transmitted (via e-mail, downloading, uploading, posting, or otherwise) through the Service, your access to the Service is conditioned on legal and appropriate use of the Service. Your use of the Service and any activities conducted online through the Service shall not violate any applicable law or regulation or the rights of The State of Washington.
The use of the Service for the following activities is prohibited:
Spamming and Invasion of Privacy
Sending of unsolicited bulk and/or commercial messages over the Internet using the Service or using the Service for activities that invade another’s’ privacy.
Intellectual Property Right Violations
Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including patents, copyrights, trademarks, service marks, trade secrets, or any other proprietary right of any third party.
Obscene or Indecent Speech or Materials
Using Greg’s Japanese Auto’s network to advertise, solicit, transmit, store, post, display, or otherwise make available obscene or indecent images or other materials. Greg’s Japanese Auto will notify and fully cooperate with law enforcement if it becomes aware of any use of the Service in any connection with child pornography or the solicitation of sex with minors.
Defamatory or Abusive Language
Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another.
Forging of Headers
Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.
Accessing illegally or without authorization computers, accounts, equipment or networks belonging to another party, or attempting to penetrate security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity.
Distribution of Internet Viruses, Trojan Horses, or Other Destructive Activities
Distributing information regarding the creation of and sending Internet viruses, worms, Trojan Horses, pinging, flooding, mailbombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the Node or any connected network, system, service, or equipment.
Facilitating a Violation of this Agreement of Use
Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate this Agreement, which includes the facilitation of the means to spam, initiation of pinging, flooding, mailbombing, denial of service attacks, and piracy of software.
Export Control Violations
The transfer of technology, software, or other materials in violation of applicable export laws and regulations, including but not limited to the U.S. Export Administration Regulations and Executive Orders.
Other Illegal Activities
Using the Service in violation of applicable law and regulation, including, but not limited to, advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services.
The sale, transfer, or rental of the Service to customers, clients or other third parties, either directly or as part of a service or product created for resale.