top of page

Website Terms of Use

User Conduct

You must not use the site in any way that causes, or is likely to cause, the site or access to it to be interrupted, damaged or impaired in any way.

​

You must ensure that any content you upload onto the site (including photographs) is not obscene, offensive, defamatory or racist and does not breach any law or regulation or any intellectual property rights of a third party or any right or duty owed to a third party. This means that if any of the content you upload is copyright protected, you must obtain the copyright owner’s written permission in order to use it.

​

In the event that you become aware of any content which breaches any of the above rules, please notify us immediately by emailing info@theemeffect.org.au.

​

You must not use the site to misrepresent your identity or affiliation with any person or organisation.

​

You must not use the site to send junk or spam email.

​

You must not use the site to conduct, display or forward details of any survey, contest, pyramid scheme or chain letter.

​

The Em Effect reserves the right to remove any content from any page without notice at its sole discretion.

​

You must not to attempt to modify, adapt, translate, sell, reverse engineer, decompile or disassemble any portion of the site or any other web site.

​

You must not to attempt to bypass the network firewall.

​

You must not to use any part of the site which you are not authorised to use or devise ways to circumvent security in order to access part of the site which you are not authorised to access. This includes but is not limited to scanning networks with the intent to breach and/or evaluate security, whether or not the intrusion results in access.

​

You must not to use or attempt to use the site for any unlawful, criminal or negligent purpose. This includes but is not limited to password cracking, social engineering (defrauding others into releasing their passwords), denial-of-service attacks, harmful and malicious destruction of data, injection of computer viruses and intentional invasion of privacy.

​

bottom of page