This Acceptable Use Policy (the POLICY) is used to define those actions which are considered appropriate and inappropriate by an account user (the CLIENT) while utilizing the Internet Service (the SERVICE) of&i2eyenet.net or an associated organization (the PROVIDER). If an account is found to be in violation of this POLICY, we reserve the right to terminate service to that CLIENT without notice. We prefer to warn CLIENTs of inappropriate behavior and suggest corrective action short of termination. However, flagrant violations of the POLICY can result in immediate termination of service, without notice or warning. Failure to enforce this POLICY, for whatever reason, shall not be construed as a waiver of the PROVIDER's right to do so at any time. As a part of our network community, CLIENTs must use their Internet service responsibly. Questions regarding this POLICY, or complaints, should be directed to firstname.lastname@example.org
1. GENERAL USE:
In general, you cannot use your Internet account in a manner: which violates any law, regulation, treaty or tariff; in a manner which violates the rules, regulations and policies of any network, server, web site, database or service provider you access through your Internet account; in a manner which is defamatory, fraudulent, indecent, offensive or deceptive; to threaten, harass, abuse or intimidate others; to damage the name or reputation of&i2eyenet.net or its subsidiaries; to break security on any computer network, or to access an account which does not belong to you; or in a manner which interferes with other CLIENT's use and enjoyment of the services provided. The PROVIDER reserves sole discretion whether any use of the service is a violation of this POLICY.
2. LIMITATIONS OF GUIDELINES:
The guidelines provided below are not intended to be all-inclusive. The PROVIDER reserves the right to term an action or behavior taken by a CLIENT to be a breach of the spirit of these guidelines as well as the letter, and take necessary steps as outlined in this POLICY.
3. MODIFICATION OF POLICY:
The PROVIDER reserves the right to modify this policy at a later date. If modifications to this POLICY are made, the PROVIDER will post a notification of such changes on the Internet, at http://i2eyenet.net. Changes will be in effect as of the date of notification.
4. ELECTRONIC MAIL:
Each CLIENT's account includes access to send and receive electronic mail ("email"). Misuse of a CLIENT's EMAIL account may result in termination of service. The following examples are non-exclusive, and are provided for your guidance. You may not use your account to send unsolicited bulk or commercial EMAIL messages ("spam"). This includes, but is not limited to, bulk mailing of commercial advertising, informational messages, charity requests, petitions for signatures, or political or religious tracts. Such messages may only be sent to those email addresses which explicitly request such messages. You may not use your account to collect responses from unsolicited bulk or commercial email sent from the accounts of other service providers. Forging, altering, or removing electronic mail headers is prohibited. You may not send numerous copies of the same or substantially the same message, nor may you send very large messages or files to a recipient, with the intent to disrupt a server or account ("mail bombing").
5. MAILBOX LIMITATIONS:
It is expected that the CLIENT will regularly monitor their email messages, and download messages off the server in a timely manner. If the files in your mail box exceed your quota capacity for a period longer than five (5) days, you will be alerted by the PROVIDER, and asked to download and archive your messages offline. Failure to comply within another five (5) business days may result in those files being purged from the system.
6. EMAIL HARRASSMENT:
You may not use your email account to harass or intimidate others. Harassment, whether through language, frequency of messages, or size of messages is prohibited. Sending a single unwelcome message may be considered harassment. If a recipient asks to stop receiving email, you must not send that person any further messages. You may not forward or otherwise propagate chain letters, whether such messages solicit money or other items of value or not, and regardless of whether the recipient wishes to receive such messages. SERVICE email accounts may not be used to collect replies to messages sent from another Internet service provider if those messages violate this POLICY.
7a. PERSONAL WEB SITE:
The personal web space made available to CLIENTS as part of their SERVICE is for personal use only. It may not be used as a promotional web page for any commercial product or service, nor can such products or services be offered for sale on the page. The CLIENT may not link their personal web space to another web location to bypass any provision of this POLICY.
7b. BUSINESS WEB SITE:
The business web space made available to CLIENTS as part of their SERVICE is for business use and may contain marketing related content for products or services.
8. WEB SITE CONTENT:
The PROVIDER does not routinely monitor the content of web sites. The CLIENT is solely responsible for the content of their web site. The PROVIDER reserves the right, but does not bear the responsibility, to remove any content or files from its server space which is illegal or otherwise does not comply with this POLICY. The CLIENT may not use their web space to publish content which the PROVIDER determines, at its sole discretion, to be unlawful, indecent, or objectionable. For the purposes of this POLICY, "content" refers to all forms of communications including narrative descriptions, graphics (including photographs, illustrations, images, drawings, logos), executable programs, video recordings and audio recordings. "Unlawful" content is that which violates any law, statute, treaty, regulation or lawful order. This includes, but is not limited to: obscene material, defamatory, fraudulent or deceptive statements, threatening, intimidating, or harassing statements, or material which violates the privacy or property rights of others (including copyrights and trademarks). "Indecent" content includes, but is not limited to, that which depicts images or descriptions of acts or activities of a sexually frank nature, explicit nudity, or that which is otherwise judged to be inappropriate for the public media. "Objectionable" content is that which is otherwise lawful, but which the PROVIDER, at its sole discretion, considers inappropriate for the public domain, or which the PROVIDER does not want its name or those of its employees associated with.
9. WEB SITE WARNING PAGE:
Any web page hosted on the PROVIDER's system which displays any content which is inappropriate for all persons or age groups must display a warning page which advises potential viewers as to the nature of the site. This warning page should contain no objectionable images or language, and should be clear in warning potential viewers about the consequences of continuing. The display of a warning page does not circumvent the restrictions on Personal Web Site Content noted above.
10. USENET POSTINGS:
Some SERVICE accounts have access to a UseNet news server. In general, the same limitations on electronic mail are also applied to UseNet postings. CLIENTs may not send mass unsolicited postings to a single news group, or the same posting to many different news groups. Postings to news groups should follow the general form and purposes of the newsgroup; most have regular Frequently Asked Questions ("FAQ") postings which define what sorts of postings are allowed or prohibited there. Off topic posts are not allowed. You may not threaten, harass, or attempt to intimidate another person using your UseNet access. You may not upload or distribute unlawful content via UseNet.
11. ACCOUNT SECURITY:
The CLIENT is responsible for any abuse or misuse of their SERVICE account, even if the inappropriate activity was committed by friend, family, guest or employee of the CLIENT. The CLIENT must take steps to ensure that others do not gain access to their account password. Passwords must contain at least 5 characters (any combination of letters, numbers, and symbols), and should contain at least one number or symbol. Passwords should not be based on any word found in the dictionary, and specifically not on any personal information (such as names or birth dates). Your password should not be the same as your user name. Sharing your password with unauthorized users is prohibited. Attempting to learn the password of another CLIENT is prohibited.
You may not attempt to circumvent user authentication or security of any host, network or account ("cracking"). This includes, but is not limited to, accessing data not intended for you, logging into or making use of a server or account you are not expressly authorized to access, or probing the security of other networks. Use or distribution of tools designed for compromising security is prohibited. Examples of these tools include, password guessing programs, cracking tools or network probing tools. You may not attempt to interfere with service to any user, host, or network ("denial of service attacks"). This includes, but is not limited to: "flooding" of networks, deliberate attempts to overload a service, and attempts to "crash" a host. Users who violate systems or network security may incur criminal or civil liability. The PROVIDER will cooperate fully with investigations of violations of systems or network security at other sites, including cooperation with law enforcement authorities in the investigation of suspected criminal activities.
13. ILLEGAL ACTIVITY:
Any activity on the PROVIDER's network that is a violation of any state or federal law is a violation of this POLICY and will result in immediate termination of SERVICE. Prohibited activities include, but are not limited to: transmitting obscene materials; intentionally spreading or threatening to spread computer viruses; gaining or attempting to gain unauthorized access to any network or system, including the PROVIDER's private network infrastructure; accessing or attempting to access information which is not intended for you; transmitting pirated software; conducting or participating in illegal gambling; or soliciting for pyramid or other illegal schemes.
14. REPORTING VIOLATIONS OF POLICY:
CLIENTs and others who wish to report a violation of this POLICY may do so to email@example.com. All complaints will be kept confidential. Complaints which are found to have merit will result in a warning to the CLIENT found in violation, or termination of SERVICE, should the violation warrant. Repeated warnings will result in termination of SERVICE.