Download our latest report to discover the strategic advantages of sustainable procurement! Explore ESG

Updated NOV 29, 2021

This Supplier.io Acceptable Use Policy (this “Policy”) describes prohibited uses of the cloud-based services offered by Supplier.io, Inc. (the “SaaS Products”) to you. The examples described in this Policy are not exhaustive. Supplier.io may modify this Policy at any time with an updated version. By accessing or using the SaaS Products, you agree to the latest version of this Policy. If you violate the Policy or authorize or help others do so, Supplier.io may suspend or terminate your use of the SaaS Products.

No Illegal, Harmful, or Offensive Use or Content

You may not access, use, or authorize, encourage, promote, facilitate or help others to use the SaaS Products for any illegal, harmful, fraudulent, infringing, or offensive use, or to transmit, store, display, distribute or otherwise make available content that is illegal, harmful, fraudulent, infringing or objectionable. Prohibited activities or content include any illegal activities that violate the rights of others, or that can be harmful to others, or Supplier.io’s operations or reputation; content that infringes or misappropriates the intellectual property or proprietary rights of others; content that is defamatory, obscene, abusive, invasive of privacy, or otherwise objectionable; or content or other computer technology that can damage, interfere with, surreptitiously intercept, or expropriate any system, program, or data, including viruses, Trojan horses, worms, time bombs, spyware or cancelbots.

No Security Violations

You may not use the SaaS Products to violate the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a “System”). Prohibited activities include accessing or using any System without permission, including attempting to probe, scan, or test the vulnerability of a System or to breach any security or authentication measures used by a System; monitoring of data or traffic on a System without authorization; or forging TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route. This provision does not prohibit the legitimate use of aliases and anonymous remailers.

No Network Abuse

You may not make network connections to any users, hosts, or networks unless you have permission to communicate with them. Prohibited activities include monitoring or crawling of a System that impairs or disrupts the System being monitored or crawled; inundating a target with communications requests so the target either cannot respond to legitimate traffic or responds so slowly that it becomes ineffective; interfering with the proper functioning of any System, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, or flooding techniques; operating network services like open proxies, open mail relays, or open recursive domain name servers; or using manual or electronic means to avoid any use limitations placed on a System, such as access and storage restrictions, or to avoid incurring fees.

No E-Mail or Other Message Abuse

You must not access or use the SaaS Products to distribute, publish, send, or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations (like “spam”), including commercial advertising and informational announcements. You will not alter or obscure mail headers or assume a sender’s identity without the sender’s explicit permission. You will not collect replies to messages sent from another internet service provider if those messages violate this Policy or the acceptable use policy of that provider.

Supplier.io’s Monitoring and Enforcement & Violations of this Policy

Supplier.io reserves the right but does not assume the obligation, to investigate any violation of this Policy or misuse of the SaaS Products. Supplier.io may investigate violations of this Policy or misuse of the SaaS Products; or remove, disable access to, or modify any content or resource that violates this Policy.

Supplier.io may report any activity that Supplier.io suspects violate any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. Supplier.io’s reporting may include disclosing your information or content if required by law and only in accordance with the applicable law’s requirements. Supplier.io may also cooperate with appropriate law enforcement agencies, regulators, or other appropriate third parties to help investigate and prosecute illegal conduct by providing network and systems information related to alleged violations of this Policy.

If you become aware of any violation of this Policy, you must immediately notify us and provide Supplier.io with assistance, as requested, to stop or remedy the violation.

YOU AGREE TO HOLD SUPPLIER.IO HARMLESS FROM AND AGAINST, AND WAIVE (TO THE EXTENT PERMITTED BY APPLICABLE LAW) ANY CLAIMS YOU MAY HAVE AGAINST SUPPLIER.IO RESULTING FROM ANY DISCLOSURE, INVESTIGATION OR ACT OR OMISSION OF SUPPLIER.IO IN THE COURSE OF CONDUCTING OR COOPERATING WITH AN INSPECTION AS DESCRIBED IN THIS POLICY.