Trademark and Brand Policy

While Social Exploits would like to accommodate all the requests to add a touch of Social Exploits flair to their sites, we are passionate about protecting the reputation of our brand. This means we have to turn down many requests because sites imply that Social Exploits is endorsing them or is otherwise affiliated with them. The same applies if Social Exploit’s trademarks, logos, web pages, screen shots, or other distinctive features (“Social Exploits Brand Features” or “Brand Features”) are associated with objectionable material, as determined by Social Exploits.

Table of Contents

Introduction

These Brand Features can be used only pursuant to these guidelines, our Brand Features Terms and Conditions, and for the specific purposes for which Social Exploits has given permission. If you have a written agreement with Social Exploits that specifically addresses how you may use its Brand Features, you don’t need to go through the approval process here unless you want to do something other than what has been authorized in your existing agreement. Otherwise, the only time you can use Brand Features without advance written permission is if there is clear and express language on our website stating that you can use those Brand Features without first obtaining permission.

When you use any of our Brand Features, you must always follow the Rules for Proper Usage included in these guidelines. In addition, Social Exploits may provide you with written requirements as to the size, typeface, colors, and other graphic characteristics of the Social Exploits Brand Features. If we provide these requirements to you at the time of our approval, you must implement them before using our Brand Features. If we provide these requirements to you after we initially gave our permission, you must implement them within a commercially reasonable timeframe.

Who do these Guidelines Apply to?

These guidelines apply to Social Exploits employees, customers, licensees, consultants, outside vendors, and other third parties.

If you are a LICENSEE of a Social Exploits Brand Features under a marketing program agreement or other business alliance agreement, the license agreement may have special permissions or usage guidelines in addition to or that supersede the guidelines set forth below.

If you are a supplier of products or services to Social Exploits, you may only display or use the Social Exploits Brand Features  in accordance with your agreement with Social Exploits. You may not use a Social Exploits Brand Features in a manner that implies endorsement or approval of your products or services by Social Exploits without specific written permission from Social Exploits.

Any and all other displays of Social Exploits Brand Features must follow the guidelines below.

Using Social Exploits Brand Features

You are permitted to refer to Social Exploits sites, products, and services by their associated trademark or service name, as long as such references:

  • Are truthful, fair, and not misleading
  • Do NOT misrepresent, mislead, suggest, or otherwise confuse users into believing Social Exploits is the source of goods or services not actually made or provided by Social Exploits or its subsidiaries
  • Comply with these policy guidelines, which Social Exploits may modify from time to time at its sole discretion.

Your use or display of a social Exploits Brand Feature must always include appropriate acknowledgement of the Social Exploits ownership of the brand feature.

What You Can Not Do

You may NOT, and are specifically prohibited from:

  • Including a Social Exploits Brand Features into the name(s) of your products, services, domain names, trademarks, logos, or company.
  • Adopting trademarks or logos for your products, services, domain names, trademarks, logos, or company names that are confusingly similar to the Social Exploits Brand Features.
  • Making any use of any Social Exploits Brand Features  in connection with your goods or services that improperly suggests that Social Exploits is the source of or otherwise approves of or is connected with your goods or services, when no such express source, approval, or connection exists.
  • Making unlicensed use of any Social Exploits Brand Feature.
  • Making any use of any Social Exploits Brand Feature that violates any laws or regulations.
  • Displaying a Social Exploits Brand Feature in a manner that is in Social Exploits’ sole opinion misleading, unfair, defamatory, infringing, libelous, disparaging, obscene or otherwise objectionable to Social Exploits.
  • Copying or imitating Social Exploits’ trade dress, including the look and feel of Social Exploits web design properties or Social Exploits brand packaging, distinctive color combinations, typography, graphic designs, product icons, or imagery associated with Social Exploits.
  • Registering Social Exploits Brand Features as second level domain names.
  • Using Social Exploits Brand Features in a way that suggests a common, descriptive, or generic meaning.

Rules for Proper Usage

Rules for proper usage of Social Exploits Brand Features include:

  • ALWAYS using the proper spelling and the proper trademark symbol. For the trademark symbol, the superscript or subscript mode is preferred, but if it is not available, use parentheses: (TM), (SM.) or (R).
  • ALWAYS using trademarks and brand names in the ways they were intended to be used. Do not use them for goods or services for which they were not originally intended. Do not alter them in any way. Do not make puns out of them or portray them in a negative light.
  • NEVER incorporating the trademark or any part of the trademark into a third party’s company name, product brand name, or model number.

Third Party Usage of Social Exploits Code Names

Social Exploits uses internal code names to identify projects related to specific products or services that are in development and may or may not be publicly released. These code names are only for tracking purposes to aid in identifying a specific project, and are not indicative of that project’s feature set, release time table, eventual brand name, or a promise or warranty that the project will be publicly released at all.

If and when a code-named project is publicly released, it will receive and be promoted under a commercial brand name and all references to that product or service by the Social Exploits code name should cease entirely. Use of the correct Social Exploits commercial product names in advertising and marketing materials is essential to accurate and effective marketing communications, and to avoid potential legal claims based on the use of a Social Exploits code name.

Customers, licensees, and other third parties are not authorized by Social Exploits to use Social Exploits code names in advertising, promotion, or marketing of any product or service. The use of any Social Exploits code name in advertising will automatically disqualify the advertisement from qualification for reimbursement under any Social Exploits cooperative marketing program, and could result in termination from Social Exploits marketing programs.

Social Exploits does not represent or warrant that any Social Exploits code name is non-infringing or available for use in commerce. Use by customers, licensees, or other third parties of Social Exploits code names may provoke legal challenges from others claiming rights in such names, and may result in legal liability. Social Exploits accepts no responsibility or liability arising from or related to such third-party use (in any way) of Social Exploits code names. Social Exploits will not under any circumstances indemnify, defend, or hold harmless any customer, licensee, or other third party for the use of a Social Exploits code name. Third-party use of Social Exploits code names is at the user’s sole risk.