ACCEPTABLE USE POLICY
Use Policy specifies certain actions prohibited by AD for users of
the AD Network. AD reserves the right to modify this Policy at any
time to stay in compliance with any laws, regulations and security requirements.
By using AD services, any customer, employee or third party unconditionally
accepts the terms of this policy.
The AD Network
may be used only for lawful purposes. Transmission, distribution or
storage of any material in violation of any applicable law or regulation
coming to or from any unauthorized network or system is prohibited.
This includes, without limitation, material protected by copyright,
trademark, trade secret or other intellectual property rights used without
proper authorization; government and military data protected by law
and national security; university and academic data protected by public
policy; and material that is obscene, defamatory, constitutes an illegal
threat, or violates export control laws. Any violation of the above
which compromises the integrity of the AD Network or any other network
is strictly prohibited.
AND MACHINE RESOURCES.
AD reserves the right to monitor and allocate network and machine resources. IP addresses are allocated per server and according to virtual server specifications. Cgi resources are allocated one per domain (a virtual host is required for each cgi-bin and is considered a virtual host). AD in its sole discretion and upon reasonable notice to customer reserves the right to discontinue any hosting account and/or any script which causes excessive server load and/or uses excessive server and network resources.
AND NETWORK SECURITY.
Violations of system
or network security are prohibited, and may result in criminal and civil
liability. AD will investigate incidents involving such violations
and may involve and cooperate with law enforcement authorities if a
criminal violation is suspected. AD respects the privacy of customer
data and vigilantly protects that data and ALL customers who host with
AD. If any violation of the law or this AUP is suspected, AD reserves
the right to investigate. Use of the AD network constitutes consent
to monitoring. Examples of unlawful acts, system, or network security
violations include, without limitation, the following:
access to or use of data, systems or networks, including any attempt
to probe, damage, scan or test the vulnerability of a system or network
or to breach security or authentication measures without express authorization
of the owner of the system or network.
monitoring of data or traffic on any network or system without express
authorization of the owner of the system or network. Interference
with service to any user, host or network including, without limitation,
mailbombing, flooding, deliberate attempts to overload a system and
access to any data, system, or network from an unauthorized system
or network for any purpose which is not lawful or which is intended
to do harm.
- Forging of any
TCP-IP packet header or any part of the header information in an email
or a newsgroup posting. Electronic forging of any kind to include
but not limited to IP addresses, domains, business names, etc.
mail messages, including, without limitation, unwanted advertising and
informational announcements, is explicitly prohibited. A user shall
not use another site's mail server to relay mail without the express
permission of the site owner. Legitimate mailing lists and subscriber
lists are acceptable. Otherwise, it is spam.
Posting the same
messages to multiple newsgroups (excessive cross-posting or multiple-posting,
also known as "SPAM") is expressly prohibited.
OR ATTEMPTED VIOLATIONS OF THE POLICY, AND ACTUAL OR ATTEMPTED VIOLATIONS
BY A THIRD PARTY ON BEHALF OF AN AD CUSTOMER OR A CUSTOMER'S END USER,
SHALL BE CONSIDERED VIOLATIONS OF THE POLICY BY SUCH CUSTOMER OR END
If you are hosting
a bulk email site on AD servers and you use another ISP to SPAM from
in order to reference your AD site by IP address or domain name, you
are violating AD policy and possibly the law.
If you have been
granted telnet access to AD servers, multiple telnet log-ons are strictly
prohibited and you must come from a valid IP address. Forgery is against
Any type of denial
of service attack from valid or invalid addresses is a violation of
AD security policy and against the law.
If you have been
granted password privileges for FTP or telnet, sharing your password
with an unauthorized user or third party is strictly prohibited.
illegal Use or System or Network Security issues should be sent to firstname.lastname@example.org
email abuse should be sent to email@example.com
USENET abuse or SPAM should be sent to firstname.lastname@example.org
Millennium Copyright Act provides limitations for service provider
liability relating to material online with regard to information residing,
at the discretion of the user, on a system or network that the service
provider controls or operates. 17. U.S. 512(c).
AD does not tolerate
any pornographic material or spamming and both infringements will result
in an investigation and possible termination and removal of the site
and/or virtual server without a refund. AD prides itself as a responsible
member of the Internet community and is committed to protecting the
data of and providing quality service to all AD customers all of the
WITH AD STAFF.
Any threat, vulgar
and profane language directed at any AD staff member through
phone or email may result in immediate termination of an account. Any
violation of this policy by any employee, contractor or third party
programmer of AD should be reported immediately. Bottom line is
let's work together toward a mutually beneficial relationship and create
a prosperous and responsible Internet community.