1. POLICIES REGARDING ACCEPTABLE USE
The Internet Access service policies (“Policies”) set forth below defines acceptable practices while using the Dedicated Hosting via or which involve access to the internet (the “Services”). By using the Services, You acknowledge that You have read, understood, and agree to abide by these Policies. In addition, You acknowledge that You will be responsible for violations of these Policies by third parties that have gained access to the Services through You. While it is not Our intent to control or monitor Your on-line experience or the content of Your on-line communications, We or our approved subcontractor may edit or remove content that We deem to be in violation of these Policies or that We otherwise deem harmful or offensive upon giving notice to You. These Policies apply to all aspects of the Services, including e-mail, online postings, chatting, and browsing.
2.1. These Policies are designed to assist in protecting the Services, all of our customers and those of our subcontractors and the Internet community as a whole from improper and/or illegal activity over the Internet. All of our customers are generally expected to behave in a reasonable fashion and to adhere to commonly accepted practices of the Internet community.
2.2. For the most part, simply exercising good judgment and common sense while using the Services should enable You to remain within the purview of acceptable conduct as further described in these Policies. The categories listed below are intended merely to serve as guidelines regarding appropriate and inappropriate conduct; the list is by no means exhaustive and should not be interpreted as such.
3. OUR RIGHTS
3.1. If You engage in conduct while using the Services that is in violation of these Policies or is otherwise illegal or improper, We reserve the right to invoke the provisions of the Agreement in relation to Your access to the affected element(s) of the Services.
3.2. We do not make any promise, nor do we have any obligation, to monitor or police activity occurring via the Services and will have no liability to any party, including You, for any violation of these Policies.
4. UNAUTHORIZED ACCESS/INTERFERENCE
4.1. You may not attempt to gain unauthorized access to, or attempt to interfere with or compromise the normal functioning, operation, or security of any of Our networks, systems, computing facilities, equipment, data, or information. You may not use the Services to engage in any activities that may interfere with the ability of others to access or use the Services or the Internet. You may not use the Services to monitor any data, information, or communications on any network or system without authorization. You may not attempt to gain unauthorized access to the user accounts or passwords of other users.
5.1. You may not use the Services to transmit excessive volumes of unsolicited commercial e-mail messages. Any unsolicited commercial e-mail messages or a series of unsolicited commercial e-mail messages constitutes Unsolicited Commercial E-mail “UCE” and is prohibited. In addition, “spamming” or “mailbombing” is also prohibited. Use of the service of another provider to send UCE, spam or mailbombs, to promote a site hosted on or connected to Our network or services (or that or Our subcontractors), is similarly prohibited.
6.1. You may not attempt to send e-mail messages or transmit any electronic communications using a name or address of someone other than Your own for purposes of deception. Any attempt to impersonate someone else by You by altering Your source IP address information or by using forged headers or other identifying information is prohibited. Any attempt by You to fraudulently conceal, forge, or otherwise falsify Your identity in connection with Your use of the Services is prohibited. This section 6 shall not prevent You from undertaking “ethical hacking” whereby You are aware of the hacking attempt, provided that You have notified Us in advance of such activity.
7. E-MAIL RELAY
7.1. Any use of another party’s electronic mail server by You to relay e-mail without express permission from such other party is prohibited.
8. ONLINE POSTINGS
8.1. All postings by You to online groups must comply with that group’s charter and other policies. You are prohibited from cross posting to unrelated news groups or to any news groups where the post does not meet that group’s charter. Continued posting of off-topic messages, including commercial messages (unless specifically invited by charter), is prohibited.
9. ILLEGAL ACTIVITY
9.1. You agree to use Our Services only for lawful purposes. Use of the Services for transmission, distribution, retrieval, or storage of any information, data, or other material in violation of any applicable law or regulation (including, where applicable any tariff or treaty) is prohibited. This includes, without limitation, the use or transmission of any data or material protected by copyright, trademark, trade secret, patent, or other intellectual property right without proper authorization and the transmission of any material that constitutes an illegal threat, violates export control laws, or is obscene, defamatory, or otherwise unlawful.
10. OTHER PROHIBITED ACTIVITIES
10.1. You are also prohibited from the following activities:
- 10.1.1. Attempting to intercept, redirect, or otherwise interfere with communications intended for others; and
- 10.1.2. Intentionally transmitting files containing a computer virus or corrupted data.
10.2. Any other inappropriate activity or abuse of the Services (brought to the attention of any subcontractor), whether or not specifically listed in these Policies, may result in Us invoking Your access to the affected element(s) of the Services.
11. COOPERATION WITH INVESTIGATIONS
11.1. You and We will cooperate with appropriate law enforcement agencies and other parties involved in investigating claims of illegal or inappropriate activity.
12.1. We make no guarantee regarding, and assume no liability for, the security and integrity of any data or information that You transmit over the Internet, including any data or information transmitted via any server designated as “secure.”
13. CONTENT OF THE INTERNET
13.1. We provide only access to the Internet. We do not operate or control the information, services, opinions or other content of the Internet. You agree that You shall make no claim whatsoever against Us relating to the content of the Internet or respecting any information, product, service or software ordered through or provided by virtue of the Internet.
14.1. We reserve the right to modify these Policies from time-to-time at Our sole discretion. We will notify You of any such modifications either via e-mail or by posting a revised copy of the Policies on our website.
15. MISUSE OF SERVICES
15.1. We reserve the right, where reasonably required, to install and use, or to have You install and use, any appropriate devices to prevent violations of these Policies, including devices designed to filter or terminate access to the Services. We shall consult with You prior to installing, or requiring the installation of, any such devices.
15.2. If You become aware of any violation of these Policies by any person, including third parties that have accessed the Services through it, You shall promptly notify Us.