Acceptable Usage Policy

As a condition to access websites and services, you agree to strictly observe the following DOs and DON’Ts.

Failure to comply with any of these terms may result in your Scale-up Account being closed, legal review and prosecution.


  1. Comply with all applicable laws, including, without limitation, tax laws, export control laws and regulatory requirements
  2. Provide accurate registration information to us and inform us if your details such as email address change
  3. Review the Privacy Policy
  4. Review and comply with notices sent by Scale-up Systems Limited concerning websites and services


  1. Duplicate, license, sublicense, publish, broadcast, transmit, distribute, perform, display, sell, rebrand, otherwise transfer or commercially exploit content, except as permitted in your organizations Scale-up Systems Limited Software License Agreement
  2. Reverse engineer, decompile, disassemble, decipher or otherwise attempt to derive the source code for any underlying intellectual property in, or any part thereof
  3. Share information, content or any data you view on and/or obtain from with any third party or in any way that is competitive with Scale-up Systems Limited, where competitive actions are determined at the sole discretion of Scale-up Systems Limited
  4. Rent, lease, loan, trade, sell/re-sell access to or any information therein, or the equivalent, in whole or part
  5. Use or attempt to use another's account without authorization from Scale-up Systems Limited, or create a false identity on
  6. Remove any copyright, trademark or other proprietary rights notices contained in or on, including those of both websites and services or any of its licensors
  7. Infringe or use’s brand, logos and/or trademarks, including, without limitation, using the word “DynoChem” in any business name, email, or URL or including Scale-up Systems Limited’s trademarks and logos on any website without authorization
  8. Engage in “framing,” “mirroring,” or otherwise simulating the appearance or function of
  9. Attempt to or actually override any security component included in or underlying
  10. Engage in any action that interferes with the proper working of or places an unreasonable load on our infrastructure, including but not limited to unsolicited communications, attempts to gain unauthorized access, or transmission or activation of computer viruses