Common use of Network Abuse Clause in Contracts

Network Abuse. You may not make network connections to any users, hosts, or networks unless you have permission to communicate with them. Prohibited activities include: (i) Monitoring or crawling of a System; (ii) Denial of Service (DoS) - Inundating a target with communication requests; (iii) Interfering with the proper functioning of any System, including mail bombing or flooding techniques; (iv) Operating network services like open proxies, open mail relays, or open recursive domain name servers; (v) Using manual or electronic means to avoid any use limitations; (vi) Attack traffic that disrupts any portion of our network (incoming or outgoing) will be blocked until the customer is able to work with security personnel to resolve the issue; (vii) IRC websites and IRC servers are prohibited; (viii) You may not upload ROMs and Emulators; (ix) You must contact us prior to installing a CDN within our infrastructure. "Shared Resource" CDN’s are strictly prohibited.

Appears in 3 contracts

Sources: Dedicated Server Agreement, Dedicated Server Agreement, Dedicated Server Agreement