2. Use of the solution
2.1 The User shall not upload pictures containing personal data or other personal information onto the Solution without the consent of the individuals concerned. These individuals shall always retain the right to revoke their consent.
2.2 The Users shall use the Solution as a normal and prudent person. In this regard, the User commits to carefully follow the instructions of Toolmaster and not to use the Solution for purposes deemed unlawful, unreasonable or illegal. Users may not use Solution to transmit, distribute, or store material in a manner that Toolmaster believes:
• Is abusive, deceptive, pornographic, obscene, defamatory, slanderous, offensive, or otherwise inappropriate;
• Violates or otherwise encroaches on the rights of others, including, but not limited to, infringing or misappropriating any privacy, intellectual property, proprietary right of another;
• Advocates or induces illegal activity;
• Stalks, harasses, or harms anyone, including minors;
• Violates the applicable privacy legislation (such as, but not limited to, Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (‘General Data Protection Regulation’), Directive 2002/58/EC of the European Parliament and Council of 12 July 2002, concerning the processing of personal data and the protection of privacy in the electronic communications sector (‘e-privacy directive’).
• Modifies, alters, tampers with, or otherwise creates derivative works of any of the Solution;
• Reverse engineers, disassembles, or decompiles the (infrastructure of the) Solution;
• Accesses or uses the Solution in a way intended to avoid incurring fees or exceeding usage limits or quotas;
• Interferes with or adversely affects the Solution or use of the Solution by other customers;
• Uses any high volume automated means (including robots, spiders, scripts or similar data gathering or extraction methods) to access the Solution and any other accounts, computer systems, or networks connected thereto;
• Monitors or crawls a system so that such system is impaired or disrupted;
• Conducts denial of service attacks;
• Intentionally interferes with the proper functioning of any system, including any deliberate attempt to overload a system by any means;
• Operates network services like open proxies, open mail relays, or open recursive domain name servers;
• Uses means (manual or electronic) to avoid any use limitations placed on a system, such as access and storage restrictions;
• Distributes, publishes, sends, or facilitates unsolicited mass e-mailings, promotions, advertising, or solicitations, including commercial advertising and informational announcements;
• Alters or obscures mail headers or assume a sender's identity without the sender's explicit permission;
• Collects or replies to messages if those messages violate this Policy;
• Is in general to be considered abnormal use of the Solution.
2.3 Users may not distribute, publish, send, or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations (like “spam”). Users may not alter or obscure mail headers or assume a sender’s identity without the sender’s explicit permission. Users may not collect replies to messages sent from another internet service provider if those messages violate this Policy or the acceptable use policy of that provider.
2.4 If the User observes or discovers any deficiency or problem in the Solution, the User is obligated to immediately cease the use of the Solution and make every reasonable effort – or have every reasonable effort made – to prevent any (further) damage.