Traces contributed to the archive have no restrictions as to what use may be made of them (except for traffic analysis as noted below). Traces may however have restrictions on redistribution. Check the Restrictions information associated with the trace.
Software contributed to the archive is in general copyrighted. Check the Restrictions information associated with the software for details.
Traces contributed to the archive often will have been filtered to some degree to preserve the privacy of the network users whose traffic was traced, and to address network security concerns. The Privacy information associated with the trace details these changes. Archive users agree to not perform traffic analysis aimed at circumventing the degree of privacy present in a trace.
The archive is open to two types of traces: those which have been previously studied, and "raw", unstudied traces. The advantages of previously studied traces are that generally the measurement artifacts have been identified, and from the results of the studies you have some ideas about the saliant features of the traces. The advantage of raw traces is that they tend to be recent, which in the quickly-evolving world of the Internet can be vital.