: Acceptable Use Policy

Similar documents
Acceptable Use Policy

Acceptable Use and Publishing Policy

Acceptable Use Policy

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP)

Terms and Conditions

2. VIOLATIONS OF ACCESSHOSTING.COM S ACCEPTABLE USE POLICY. b. Harm to minors. Using the Services to harm, or attempt to harm, minors in any way.

PTLGateway Acceptable Use Policy

Acceptable Use Policy ("AUP")

region16.net Acceptable Use Policy ( AUP )

Acceptable Use Policy

Acceptable Use Policy. Effective January 2017

NUCONNECT INTERNET ACCEPTABLE USE POLICY

NebraskaLink Acceptable Use Policy

Acceptable Use Policy (AUP)

The following is the Lightning IP Acceptable Usage Policy ( AUP ) for all Users of the Lightning IP Services. In General

Midstate Telephone & Midstate Communications. Acceptable Use Policy

300 Lena Drive Aurora, Ohio P: F: Page 1 of 5

ACCEPTABLE USE POLICY

WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY

Acceptable Use Policy Updated 1/16/2018

USAGE POLICIES. is defamatory, offensive, abusive, indecent, obscene, or constitutes harassment;

ACCEPTABLE USE POLICY

The AUP applies to all Snowball products and services but is in particular applicable to internet services.

Acceptable Use Policy

Wave s High-Speed Internet Service Acceptable Use Policy

GhostFiber Acceptable Use Policy

Acceptable Use Policies

Magna5 reserves the right to make modifications to this policy at any time.

You may contact The Translation Network by at You may also call The Translation Network at

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.

Acceptable use policy for SLT idc services(ver 1.2)

Electronic Network Acceptable Use Policy

Bloom Broadband Acceptable Use Policy

WAFA X3 Evolution Grade of Service. 13 October 2008

Cleveland State University General Policy for University Information and Technology Resources

MERIDIANSOUNDINGBOARD.COM TERMS AND CONDITIONS

Acceptable Use Policy

NETCOM.cm Acceptable Use Policy

Kings Heath Academy Acceptable Use (Staff and Students) Policy and Procedures September 2018

Open Internet Disclosure For Wireline and Fixed Wireless Network Services

ACCEPTABLE USE POLICY ( AUP )

TERMS OF USE FOR NAT TRAVERSAL FUNCTION TRIAL VERSION

Acceptable Use Policy

Acceptable Use Policy

II.C.4. Policy: Southeastern Technical College Computer Use

Keystone Acceptable Use Policy

PROFESSIONAL NETWORK SERVICES ACCEPTABLE USE POLICY ( AUP )

Acceptable Usage Policy

FreedomNet Solutions Acceptable Use Policy ( )

1801 North Main Street Ste 25 Phone: Mitchell, SD Office Hours: M-F 8am-5pm Fax:

Service Specific Terms & Conditions

Acceptable Use Policy

PRIMUS ACCEPTABLE USE POLICY

SNOHOMISH COUNTY PUD USER ACCOUNT SERVICES TERMS AND CONDITIONS

Acceptable Use Policy

Tyson Communications Acceptable Use and Network Management Policy

Terms and Conditions SNOHOMISH COUNTY PUD USER ACCOUNT SERVICES TERMS AND CONDITIONS

Grades of Service at a glance

Acceptable Use Policy

Acceptable Use Policy

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

Community Guidelines and User Agreement

Acceptable Use Policy for EWC HousingNet Internet Service Customers

ASSESSMENT CENTER TERMS AND CONDITIONS. Last Updated 1/21/2011

MON-CRE TELEPHONE COOPERATIVE, INC. ACCEPTABLE USE POLICY

ACCEPTABLE USE AND NETWORK MANAGEMENT POLICY

Acceptable Use Policy

ACCEPTABLE USE POLICY (AUP) 3W INFRA reserves the right to unilaterally amend the conditions set out in the Acceptable Use Policy (the Policies ).

BUCKEYE INTERNET SERVICE ACCEPTABLE USE POLICY

HX Grade of Service W3a & Sesat2 Middle East. 16 Jan 2008

Breckenridge Financial Supplies Website Use Policy

Acceptable Use Policy

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial

Guest Wireless Policy

OHSU s Alumni Relations Program (housed at the OHSU Foundation): 1121 SW Salmon Street, Suite #100 Portland, OR

IT ACCEPTABLE USE POLICY

Revised 10/15/2014 WEBSITE TERMS OF USE

Bentley Walker StarCom Grade of Service. 4 th June 2010

Shout! Radio Automation Terms Of Service

The Safe and Sound Services are available for individuals aged 18 years or older.

Service Level Agreement (SLA) for Customer by Cybersmart Pty Ltd (Cloud Hosting Agreement)

Acceptable Use Policy Document ID: SER-POL-001

Terms Of Use AGREEMENT BETWEEN USER AND DRAKE MODIFICATION OF THESE TERMS OF USE LINKS TO THIRD PARTY WEB SITES USE OF COOKIES

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems.

*Viola Business Fiber Internet**

NOOTRY TERMS OF SERVICE

Qikli Anti-Spam Policy

S E R V E R C E N T R E

Acceptable Usage Policy Published by FirstNet March 2015

SMS SERVICE PROVISION

HostUnmetered.net Terms of Service

Draft. Policies of Colorado State University University Policy. Category: Information Technology

SmarterBroadband. Usage Rules and Contract McCourtney Road, Grass Valley, CA (530)

ACCEPTABLE USE POLICIES FOR INFORMATION SERVICES COMPUTING RESOURCES

Tularosa Communications, Inc. (TCI) General Service Terms and Conditions

ACCEPTABLE USE POLICY (AUP)

Any reference in the Term to you or your means you as a user of the Website.

SERVICES and MICROSOFT HOSTED EXCHANGE

MANAGED HOSTING ACCEPTABLE USE POLICY

Transcription:

: Acceptable Use Policy This Acceptable Use Policy ("Policy") describes the proper and prohibited use of 's Hosting services ("Services") as subscribed to per the Master Service Agreement. This Policy is designed as a guideline and is not exhaustive as such. The policy can be modified from time to time effective upon posting on 's web site. The Services allow you to develop, publish, and display a web site, store data in a database, send and receive e-mail messages, maintain a bulletin board through which you can interact with the Internet users or other systems, and transmit, post, store, send and retrieve various information. does not monitor or censor the information you make available or collect through the use of the Services with the exception of systems and network resources monitoring. However, will act upon Policy violations when such are discovered during regular monitoring processes or reported to. expects you, and all other users of the Services, to take responsibility in using the Internet with courtesy and responsibility, and be familiar with and to practice good Internet etiquette. As consideration for 's provision of Services, you agree to abide by the following provisions relating to the acceptable use of your account. reserves the right in its sole discretion to: Revise this Acceptable Use Policy which shall be posted at 's web site; and Remove any content for any reason, including but not limited to, your violation of any conditions of this Acceptable Use Policy. 's right to remove inappropriate content under this Policy shall not place an obligation on to monitor or exert editorial control over the content of your account. You agree not to use or allow access to services to: 1. Create or maintain software download or distribution sites or sites created for the purpose of mass distribution of software products. A software distribution site is defined as a site on which 50% or more of total bandwidth (data transfer) is used for programs or binary code downloads. 2. Create or maintain sites that generate system errors or exceptions that disrupt servers' performance or cause server-wide outages. This includes overriding or avoiding system settings and restrictions imposed by the terms of Services. 3. Create or maintain sites that consume thirty-five percent or more of CPU capacity or use two hundred megabytes of memory, both physical and virtual combined, on the hosting server. 4. Exceed allowed bandwidth by transferring amounts of data greater than allowed by the terms of purchased Service. 5. Violate any applicable laws, regulations, or other provisions having the force of law, either intentionally or unintentionally. 6. Impersonate any person or entity or falsely state or otherwise misrepresent your affiliation with a person or entity. 7. Employ misleading e-mail addresses or falsify information in any part of any communication. 8. Upload, transmit, disseminate, post, store or post links to any content that: Acceptable Use Policy v.1.1 - May 15, 2005 Page 1 of 2

Prohibited from transmitting or posting by law, or by contractual or fiduciary relationship; Facilitates hacking or unauthorized access or use of data, systems, servers or networks including any attempt to probe, scan or test for vulnerabilities, or to breach security or authentication measures; Falsifies origin by forging TCP/IP packet headers, e-mail headers, or any part of a message header, unauthorized monitoring of data or traffic; Interferes with service to any user, system or network by using flooding techniques, overloading a system or a network, staging or broadcasting an attack, or any other means resulting in a crash of a host either deliberately or by negligence; Infringes or contributes to any infringement of any intellectual property, material protected by copyright, trademark, patent, trade secret or proprietary right of any party; Is or may be considered unsolicited or unauthorized advertising, promotional materials, or any junk mail, spam, spamvertisements, make money fast schemes, chain letters, pyramid schemes, or any other form of solicitation; Contains viruses, worms, Trojan horses, time bombs, trap doors, or any other computer code, files, or programs or repetitive requests for information designed to interrupt, destroy or limit the functionality of any computer software or hardware or telecommunications equipment; Is unlawful, harmful, threatening, abusive, harassing, tortious, unlawful, libelous, defamatory, vulgar, obscene, or invasive of privacy; Is of adult nature, pornographic, or harmful to minors; Promotes illegal activity, including providing instructions for illegal activity, or transmitting, disseminating or offering fraudulent goods, services, schemes or promotions, or furnishing false data on any signup form, contract or online application or registration, or the fraudulent use of any information obtained through the use of the Services including use of credit card numbers. Exploits the images of children or discloses personally identifiable information belonging to children. If determines that you have violated the terms of this Acceptable Use Policy, that determination, made at 's sole discretion, is grounds for immediate termination of your account without notice or penalty to. Acceptable Use Policy v.1.1 - May 15, 2005 Page 2 of 2

: No-SPAM Policy This policy further defines some of the prohibited actions as found in 's Acceptable Use Policy, a part of the hosting agreement you executed when subscribed to 's service and which outlines the acceptable and prohibited actions on your hosted account. Owners of hosted accounts are responsible for the complaints and consequences arising from use of your hosted account. Upon discovery or notification of these service abuses, will investigate and, without prior notice to you, may disable any account in order to protect the security, integrity and usability of the hosting services and the servers and shared network. Reporting Spam defines SPAM, also known as Unsolicited Commercial Email (UCE) or Unsolicited Bulk Email (UBE), as any email message the recipient considers unsolicited and of a commercial nature or email sent in bulk. expressly prohibits the sending of SPAM through its network and servers. If you believe that you have received SPAM (as defined above) from 's network, please send a signed complaint along with the message you received, including its complete email headers, to abuse@ does not investigate or take action based on anonymous SPAM complaints. Prohibited Email Activities Sending UCE/UBE, also known as SPAM: Defined as the sending of email to recipients who consider the message unsolicited email of a commercial nature or the sending of email in bulk to recipients who consider the message unsolicited email of any nature. It is one of the most serious account abuses. UCE or SPAM Response Collection: Defined as the collection of responses, directly or indirectly, from UCE or UBE sent by you or UCE or UBE sent on your behalf. Web Site Advertising via UCE or UBE, also known as SPAMvertising: Defined as the sending of email which: 1. is UCE or UBE as defined above; and 2. contains direct or indirect links or references to one or more web sites. This also includes the use of third-party email accounts, servers or services to SPAMvertise the site(s). No-SPAM Policy v.1.1 - May 15, 2005 Page 1 of 4

Mail Bombing: Defined as the sending an unreasonably large number of electronic mail messages to a single system, person or email address. Mail Harassment: Defined as sending email in a manner or with content that is perceived as threatening or harassing by the intended or actual recipient. Letter Bombing: Defined as sending email with content that will or could potentially harm the recipient's computer. Prohibited Mailing List Activity and Mailing List and Address List Minimum Requirements The following is a list of minimum requirements for the permitted use of mailing lists by way of services and networks. They are guidelines to minimize the probability of complaints. However, you will still be responsible for any complaints received in relation to your account despite having implemented all of the requirements. If you send out bulk email, your email will be conclusively labeled as SPAM unless you implement all of the following requirements, either under option A or Option B below. Option A. Listserve-style email lists: (All members add themselves to the list by sending a subscribe email from their email address to the list owner.) 1. In the initial message to the member, a. there is clear and conspicuous notice that the member is signing up for a mailing or address list; and b. there is a simple, effective method of list removal outlined in the message. c. a non-internet method of contacting the list owner is provided-phone number and/or land address will suffice. d. terms and conditions of email address use by the list are provided. 2. Prior to any subsequent mailing to the list, list owners must remove all addresses for list members who have chosen to be removed from the list and all addresses from which emails have bounced back as undelivered. 3. Lists are not used for purposes or in a manner which are harassing, abusive, illegal, and/or will create liability for you, or third parties. 4. Email to the list members is only from the entity with which the member signed up and only on the topic for which the recipient agreed to receive information. Emailing to a list which contains members of a list which was purchased, rented, leased, or lent to you is prohibited. Email to list members on a subject which is not on the topic or product for which the member agreed to receive messages is SPAM and is prohibited. Option B. General Mailing and Address Lists: (Members added by means other than member sending a subscribe email from their email address to the list owner.) 1. Provide clear and conspicuous notice that the prospective member is signing up for a mailing or address list and such notice must appear near the email address collection point. 2. Require prospective members of the list to take some non-passive action to request sign up for the list. 3. Provide conspicuous, comprehensive terms and conditions of address use that are posted or linked near the email collection point and available to the list member to print or download after sign up. No-SPAM Policy v.1.1 - May 15, 2005 Page 2 of 4

Include subject matter of the list and anticipated mailing frequency, sharing/trading/selling of the address. 4. An address is added to the list using only Double Opt-In Procedures, with the address confirmed and permission-to-email verified before mailings begin. An Opt-In Procedure is defined as a list sign up process where: a. potential mailing list members are given a clear, conspicuous choice as to whether they want to receive such emails or not; and b. if the potential member chooses to receive such emails, they express this choice by undertaking some non-passive action. A Double Opt-In Procedure is defined as an Opt-In Procedure where: a. the potential mailing list members request an invitation to join the mailing list or address list; b. prior to receiving any other mailing from the mailing list or address list, the potential member receives an invitation email message to the email account that will receive the mailings; c. to be added to the mailing list, the potential member must reply or click a link contained in the invitation email message; and (if replies constitute a request to receive email, then you are responsible for reading the replies and taking appropriate action-i.e. if the reply says, "Do not send me emails.", then the address must be removed from the list owner's databases.) d. if an invitation email is not replied to or confirmed by the link, that email address is not added to the mailing list and no further email is sent to that email address. 5. The list removal method must be simple, effective, and conspicuously displayed in all messages including the invitation email message. 6. There must be both an automated and non-automated means of removal from the list. 7. The list must provide a non-internet method of contacting the list owner. 8. Prior to any subsequent mailing to the list, list owners must remove all addresses from which emails have bounced back as undelivered and all addresses for list members who have chosen to be removed from the list. 9. Lists are not used for purposes which are harassing, abusive, or illegal or for purposes or in a manner which will create liability for you, or third parties. 10. Email to the list members is only from the entity with which the member signed up and only on the topic for which the recipient agreed to receive information. Email to a list which contains members of a list which was purchased, rented, leased, or lent to you are prohibited. Email to list members concerning a subject which is not concerning the topic or product for which the member agreed to receive messages is prohibited. No-SPAM Policy v.1.1 - May 15, 2005 Page 3 of 4

Prohibited Newsgroup Activities Newsgroup SPAMMING Defined as posting content or messages which: 1. are posted to 15 or more newsgroups and which contain the same or similar information; 2. violates the rules of the newsgroup in which the posting is made; 3. is off the topic of the newsgroup and is not the topic of the current discussion in the group; and/or 4. is a commercial posting unless the newsgroup rules expressly permit commercial posting. You are prohibited from cross-posting, commercial posting or off-topic posting in the support forums. Complaint Processing prohibits SPAMMING, defined as the sending of Unsolicited Commercial Email (UCE) and Unsolicited Bulk Email (UBE), in order to protect the integrity of the shared server and network resources. Please review 's No SPAM Policy, below, for the full definitions of SPAM, UCE and UBE, in addition to other email guidelines. Complaints of UCE and UBE, regardless of whether the email is actually solicited or not, are what trigger the blacklisting of networks and services. Therefore, the sending of email which results in UCE/UBE complaints is conclusively a SPAMMING activity in violation of 's No SPAM Policy. IT IS YOUR RESPONSIBILITY TO PREVENT ALL SPAM COMPLAINTS RESULTING FROM EMAIL ACTIVITIES ON YOUR.NET HOSTED ACCOUNT. Processing of Reports of SPAM Activity and SPAM Complaints processes reports of SPAM activity and SPAM complaints in the manner described below. A. If the email activity associated with your hosted account poses an immediate threat to 's servers or network, reserves the right to immediately disable the account and send email notice to your account contact. An immediate threat includes s receipt of ten or more SPAM complaints in a 72 hour period. B. Absent an immediate threat to the servers or network, will follow the steps outlined below for SPAM processing. 1. First UCE/UBE Event - sends a "complaint received" message to the complainants and sends the complaints and first warning to your account contact. 2. Second UCE/UBE Event - sends a "complaint received" message to the complainants and sends the complaints and second and final warning to your \ HOST UP account contact. 3. Third UCE/UBE Event - HOST UP immediately and permanently disables the email capabilities of the account and then sends notice to your HOST UP account contact of this permanent email disablement. A UCE/UBE Event is defined as either of the following: 1. HOST UP's receipt in any 72 hour period of 3 or more complaints or notices of activity on your account that violates HOST UP's No SPAM Policy; or 2. HOST UP's receipt in any 30 day period of 6 or more complaints or notices of activity on your account that violates HOST UP's No SPAM Policy No-SPAM Policy v.1.1 - May 15, 2005 Page 4 of 4