Common use of Prohibited Uses and Activities Clause in Contracts

Prohibited Uses and Activities. The Agreement prohibits uses and activities involving the Service that are illegal, infringe on the rights of others or interfere with or diminish the use and enjoyment of the Service by others. Prohibited uses and activities include, but are not limited to, using the Service, Customer equipment or Millry’s Equipment, either individually or in combination with one another, to: Conduct and Information Restrictions • undertake or accomplish any unlawful purpose, including, but not limited to, posting, storing, transmitting or disseminating information, data or material that is libelous, obscene, unlawful, threatening or defamatory, or which infringes on the intellectual property rights of any person or entity, or which in any way constitutes or encourages conduct that would constitute a criminal offense or otherwise violate any local, state or federal law, order, or regulation; • post, store, send, transmit, or disseminate any information or material which a reasonable person could deem to be indecent, pornographic, harassing, threatening, hateful or intimidating; • upload, post, publish, transmit, reproduce, create derivative works of, or distribute in any way information, software or other material obtained through the Service or otherwise that is protected by copyright or other proprietary right, without obtaining permission of the owner, including, but not limited to, links to such material, serial or registration numbers for software programs or pirated copyrighted content, such as authorized copies of music, video or other media files, whether through Internet Relay Chat or file sharing programs or services; • transmit unsolicited bulk or commercial messages, commonly known as “spam”; • send numerous copies of the same or substantially similar messages, empty messages, or messages which contain no substantive content, or send very large messages or files that disrupt a server, account, newsgroup or chat service; • initiate, perpetuate or in any way participate in any pyramid or other illegal scheme; • participate in the collection of e-mail addresses, screen names, or other identifiers of others (without their prior consent), a practice sometimes known as “spidering” or “harvesting,” or participate in the use of software (including “spyware”) designed to facilitate this activity; • collect responses from unsolicited bulk messages; • falsify, alter or remove message headers; • falsify references to Millry or its network, by name or other identifier, in messages; • impersonate any person or entity, engage in sender address falsification, forge anyone else's digital or manual signature, or perform any other similar fraudulent activity (for example, “phishing”); • violate the rules, regulations, or policies applicable to any network, server, computer database, or Web site that you access.

Appears in 1 contract

Samples: millry.net

AutoNDA by SimpleDocs

Prohibited Uses and Activities. The Agreement What uses and activities does HTC prohibit? In general, the Policy prohibits uses and activities involving the Service that are illegal, infringe on the rights of others others, or interfere with or diminish the use and enjoyment of the Service by others. Prohibited For example, these prohibited uses and activities include, but are not limited to, using the Service, Customer equipment Equipment, or Millry’s the HTC Equipment, either individually or in combination with one another, to: Conduct and Information Restrictions information restrictions • undertake or accomplish any unlawful purpose, including. This includes, but is not limited to, posting, storing, transmitting or disseminating information, data or material that which is libelous, obscene, unlawful, threatening or defamatory, or which infringes on the intellectual property rights of any person or entity, or which in any way constitutes or encourages conduct that would constitute a criminal offense offense, or otherwise violate any local, state state, federal, or federal non-U.S. law, order, or regulation; • post, store, send, transmit, or disseminate any information or material which a reasonable person could deem to be indecent, pornographic, harassing, threatening, hateful or intimidatingunlawful; • upload, post, publish, transmit, reproduce, create derivative works of, or distribute in any way information, software or other material obtained through the Service or otherwise that is protected by copyright or other proprietary right, without obtaining any required permission of the owner, including, but not limited to, links to such material, serial or registration numbers for software programs or pirated copyrighted content, such as authorized copies of music, video or other media files, whether through Internet Relay Chat or file sharing programs or services; • transmit unsolicited bulk or commercial messages, messages commonly known as “spam”; ;” • send numerous very large numbers of copies of the same or substantially similar messages, empty messages, or messages which contain no substantive content, or send very large messages or files that disrupt disrupts a server, account, newsgroup blog, newsgroup, chat, or chat similar service; • initiate, perpetuate perpetuate, or in any way participate in any pyramid or other illegal scheme; • participate in the collection of e-mail very large numbers of email addresses, screen names, or other identifiers of others (without their prior consent), a practice sometimes known as “spidering” spidering or harvesting,” , or participate in the use of software (including “spyware”) designed to facilitate this activity; • collect responses from unsolicited bulk messages; • falsify, alter alter, or remove message headers; • falsify references to Millry HTC or its network, by name or other identifier, in messages; • impersonate any person or entity, engage in sender address falsification, forge anyone else's digital or manual signature, or perform any other similar fraudulent activity (for example, “phishingexample,“phishing”); • violate the rules, regulations, terms of service, or policies applicable to any network, server, computer database, service, application, system, or Web site that you access or use; Technical restrictions • access any other person's computer or computer system, network, software, or data without his or her knowledge and consent; breach the security of another user or system; or attempt to circumvent the user authentication or security of any host, network, or account. This includes, but is not limited to, accessing data not intended for you, logging into or making use of a server or account you are not expressly authorized to access, or probing the security of other hosts, networks, or accounts without express permission to do so; • use or distribute tools or devices designed or used for compromising security or whose use is otherwise unauthorized, such as password guessing programs, decoders, password gatherers, keystroke loggers, analyzers, cracking tools, packet sniffers, encryption circumvention devices, or Trojan Horse programs. Unauthorized port scanning is strictly prohibited; • copy, distribute, or sublicense any proprietary software provided in connection with the Service by HTC or any third party, except that you may make one copy of each software program for back-up purposes only; • distribute programs that make unauthorized changes to software (cracks); • use or run dedicated, stand-alone equipment or servers from the Premises that provide network content or any other services to anyone outside of your Premises local area network (“Premises LAN”), also commonly referred to as public services or servers. Examples of prohibited equipment and servers include, but are not limited to, email, Web hosting, file sharing, and proxy services and servers; • use or run programs from the Premises that provide network content or any other services to anyone outside of your Premises LAN, except for personal and non- commercial residential use; • service, alter, modify, or tamper with the HTC Equipment or Service or permit any other person to do the same who is not authorized by HTC; Network and usage restrictions • restrict, inhibit, or otherwise interfere with the ability of any other person, regardless of intent, purpose or knowledge, to use or enjoy the Service (except for tools for safety and security functions such as parental controls, for example), including, without limitation, posting or transmitting any information or software which contains a worm, virus, or other harmful feature, or generating levels of traffic sufficient to impede others' ability to use, send, or retrieve information; • restrict, inhibit, interfere with, or otherwise disrupt or cause a performance degradation, regardless of intent, purpose or knowledge, to the Service or any HTC (or HTC supplier) host, server, backbone network, node or service, or otherwise cause a performance degradation to any HTC (or HTC supplier) facilities used to deliver the Service; • resell the Service or otherwise make available to anyone outside the Premises the ability to use the Service (for example, through wi-fi or other methods of networking), in whole or in part, directly or indirectly. The Service is for personal and non-commercial residential use only and you agree not to use the Service for operation as an Internet service provider or for any business enterprise or purpose (whether or not for profit); • connect the HTC Equipment to any computer outside of your Premises; • interfere with computer networking or telecommunications service to any user, host or network, including, without limitation, denial of service attacks, flooding of a network, overloading a service, improper seizing and abusing operator privileges, and attempts to “crash” a host; and • accessing and using the Service with anything other than a dynamic Internet Protocol (“IP”) address that adheres to the dynamic host configuration protocol (“DHCP”). You may not configure the Service or any related equipment to access or use a static IP address or use any protocol other than DHCP unless you are subject to a Service plan that expressly permits you to do so.

Appears in 1 contract

Samples: Hickory Telephone Company And

Prohibited Uses and Activities. The Agreement prohibits uses and activities involving the Service that are illegal, infringe on the rights of others or interfere with or diminish the use and enjoyment of the Service by others. Prohibited uses and activities include, but are not limited to, using the Service, Customer equipment or Millry’s Xxxxxxx Equipment, either individually or in combination with one another, to: Conduct and Information Restrictions • undertake or accomplish any unlawful purpose, including, but not limited to, posting, storing, transmitting or disseminating information, data or material that is libelous, obscene, unlawful, threatening or defamatory, or which infringes on the intellectual property rights of any person or entity, or which in any way constitutes or encourages conduct that would constitute a criminal offense or otherwise violate any local, state or federal law, order, or regulation; • post, store, send, transmit, or disseminate any information or material which a reasonable person could deem to be indecent, pornographic, harassing, threatening, hateful or intimidating; • upload, post, publish, transmit, reproduce, create derivative works of, or distribute in any way information, software or other material obtained through the Service or otherwise that is protected by copyright or other proprietary right, without obtaining permission of the owner, including, but not limited to, links to such material, serial or registration numbers for software programs or pirated copyrighted content, such as authorized copies of music, video or other media files, whether through Internet Relay Chat or file sharing programs or services; • transmit unsolicited bulk or commercial messages, commonly known as "spam”; ;" • send numerous copies of the same or substantially similar messages, empty messages, or messages which contain no substantive content, or send very large messages or files that disrupt a server, account, newsgroup or chat service; • initiate, perpetuate or in any way participate in any pyramid or other illegal scheme; • participate in the collection of e-mail addresses, screen names, or other identifiers of others (without their prior consent), a practice sometimes known as “spidering” or “harvesting,” or participate in the use of software (including "spyware") designed to facilitate this activity; • collect responses from unsolicited bulk messages; • falsify, alter or remove message headers; • falsify references to Millry Xxxxxxx or its network, by name or other identifier, in messages; • impersonate any person or entity, engage in sender address falsification, forge anyone else's digital or manual signature, or perform any other similar fraudulent activity (for example, "phishing"); • violate the rules, regulations, or policies applicable to any network, server, computer database, or Web site that you access; • post or transmit on or through the service any fraudulent content, including content known by you to be false or intended to be relied on by others; or any advertising or promotional materials that contain false, deceptive or misleading statements, claims or representations; • make false or unverified complaints against Xxxxxxx or any Ragland member, or otherwise abuse any of Xxxxxxx’x complaint policies and procedures. Threatening or abusive communications received via service should first be reported by the Customer to appropriate criminal or civil authorities, and then to Xxxxxxx. Xxxxxxx Technical Restrictions Customers may not: • attempt to interfere with or compromise the operation of Xxxxxxx’x network in whole or part, to interfere with any of the equipment comprising the system, or to access other accounts or restricted areas of the system; • access any other person's computer or computer system, network, software, or data without his or her knowledge and consent; breach the security of another user or system; or attempt to circumvent the user authentication or security of any host, network, or account. This includes, but is not limited to, accessing data not intended for you, logging into or making use of a server or account you are not expressly authorized to access, or probing the security of other hosts, networks, or accounts without express permission to do so; • use or distribute tools or devices designed or used for compromising security, such as password guessing programs, decoders, password gatherers, unauthorized keystroke loggers, analyzers, cracking tools, packet sniffers, encryption circumvention devices, or Trojan Horse programs. Unauthorized port scanning is strictly prohibited; • copy, distribute, or sublicense any software provided in connection with the Service by Xxxxxxx or any third party, except that you may make one copy of each software program for back-up purposes only; • distribute programs that make unauthorized changes to software (“cracks”); • use or run dedicated, stand-alone equipment or servers from the premises that provide network content or any other services to anyone outside of your premises local area network ("Premises LAN"), also commonly referred to as public services or servers. Examples of prohibited equipment and servers include, but are not limited to, e-mail, Web hosting, file sharing, and proxy services and servers; • use or run programs from the premises that provide network content or any other services to anyone outside of your Premises LAN, except for personal and non- commercial residential use; • service, alter, modify, or tamper with Xxxxxxx equipment or Service or permit any other person to do the same who is not authorized by Xxxxxxx; • operate a mail server with an open mail relay. Network and Usage Restrictions Customers shall not: • restrict, inhibit, or otherwise interfere with the ability of any other person, regardless of intent, purpose or knowledge, to use or enjoy the Service, including, without limitation, posting or transmitting any information or software which contains a worm, virus, lock, key, bomb, cancelbot or other harmful feature, or generating levels of traffic sufficient to impede others' ability to use, send, or retrieve information; • restrict, inhibit, interfere with, or otherwise disrupt or cause a performance degradation, regardless of intent, purpose or knowledge, to the Service or any Xxxxxxx (or Xxxxxxx supplier) host, server, backbone network, node or service, or otherwise cause a performance degradation to any Xxxxxxx (or Xxxxxxx supplier) facilities used to deliver the Service; • resell the Service or otherwise make available to anyone outside the premises the ability to use the Service (for example, though WiFi or other methods of networking), in whole or in part, directly or indirectly. The Agreement contemplates use of the Service for residential and small business purposes only. You agree not to use the Service for operation as an Internet service provider or for any similar business purpose; • connect the Xxxxxxx equipment to any computer outside of your premises; • interfere with computer networking or telecommunications service to any user, host or network, including, without limitation, denial of service attacks, flooding of a network, overloading a service, improper seizing and abusing operator privileges, and attempts to "crash" a host; • access and use the Service with anything other than a dynamic Internet Protocol ("IP") address that adheres to the dynamic host configuration protocol ("DHCP"). You may not configure the Service or any related equipment to access or use a static IP address or use any protocol other than DHCP, unless you are subject to a Service plan that expressly permits you to do so; • use a personal account for high volume or commercial use; multiple, concurrent logins of the same account are not allowed.

Appears in 1 contract

Samples: Ragland Telephone

Prohibited Uses and Activities. The Agreement prohibits uses and activities involving the Service that are illegal, infringe on the rights of others or interfere with or diminish the use and enjoyment of the Service by others. Prohibited uses and activities include, but are not limited to, using the Service, Customer equipment or Millry’s Farmers’ Equipment, either individually or in combination with one another, to: Conduct and Information Restrictions • undertake or accomplish any unlawful purpose, including, but not limited to, posting, storing, transmitting or disseminating information, data or material that is libelous, obscene, unlawful, threatening or defamatory, or which infringes on the intellectual property rights of any person or entity, or which in any way constitutes or encourages conduct that would constitute a criminal offense or otherwise violate any local, state or federal law, order, or regulation; • post, store, send, transmit, or disseminate any information or material which a reasonable person could deem to be indecent, pornographic, harassing, threatening, hateful or intimidating; • upload, post, publish, transmit, reproduce, create derivative works of, or distribute in any way information, software or other material obtained through the Service or otherwise that is protected by copyright or other proprietary right, without obtaining permission of the owner, including, but not limited to, links to such material, serial or registration numbers for software programs or pirated copyrighted content, such as authorized copies of music, video or other media files, whether through Internet Relay Chat or file sharing programs or services; • transmit unsolicited bulk or commercial messages, commonly known as “spam”; • send numerous copies of the same or substantially similar messages, empty messages, or messages which contain no substantive content, or send very large messages or files that disrupt a server, account, newsgroup or chat service; • initiate, perpetuate or in any way participate in any pyramid or other illegal scheme; • participate in the collection of e-mail addresses, screen names, or other identifiers of others (without their prior consent), a practice sometimes known as “spidering” or “harvesting,” or participate in the use of software (including “spyware”) designed to facilitate this activity; • collect responses from unsolicited bulk messages; • falsify, alter or remove message headers; • falsify references to Millry Farmers or its network, by name or other identifier, in messages; • impersonate any person or entity, engage in sender address falsification, forge anyone else's digital or manual signature, or perform any other similar fraudulent activity (for example, “phishing”); • violate the rules, regulations, or policies applicable to any network, server, computer database, or Web site that you access.. Farmers’ Technical Restrictions Customers may not: • attempt to interfere with or compromise the operation of Farmers’ network in whole or part, to interfere with any of the equipment comprising the system, or to access other accounts or restricted areas of the system; • access any other person’s computer or computer system, network, software, or data without his or her knowledge and consent; breach the security of another user or system; or attempt to circumvent the user authentication or security of any host, network, or account. This includes, but is not limited to, accessing data not intended for you, logging into or making use of a server or account you are not expressly authorized to access, or probing the security of other hosts, networks, or accounts without express permission to do so; • use or distribute tools or devices designed or used for compromising security, such as password guessing programs, decoders, password gatherers, unauthorized keystroke loggers, analyzers, cracking tools, packet sniffers, encryption circumvention devices, or Trojan Horse programs. Unauthorized port scanning is strictly prohibited; • copy, distribute, or sublicense any software provided in connection with the Service by Farmers or any third party, except that you may make one copy of each software program for back-up purposes only; • distribute programs that make unauthorized changes to software (“cracks”); • use or run dedicated, stand-alone equipment or servers from the premises that provide network content or any other services to anyone outside of your premises local area network (“Premises LAN”), also commonly referred to as public services or servers. Examples of prohibited equipment and servers include, but are not limited to, e- mail, Web hosting, file sharing, and proxy services and servers; • use or run programs from the premises that provide network content or any other services to anyone outside of your Premises LAN, except for personal and non-commercial residential use; • service, alter, modify, or tamper with Farmers’ equipment or Service or permit any other person to do the same who is not authorized by Farmers;

Appears in 1 contract

Samples: Agreement

Prohibited Uses and Activities. The Agreement prohibits uses and activities involving the Service that are illegal, infringe on the rights of others or interfere with or diminish the use and enjoyment of the Service by others. Prohibited uses and activities include, but are not limited to, using the Service, Customer equipment or Millry’s New Hope Equipment, either individually or in combination with one another, to: Conduct and Information Restrictions • undertake or accomplish any unlawful purpose, including, but not limited to, posting, storing, transmitting or disseminating information, data or material that is libelous, obscene, unlawful, threatening or defamatory, or which infringes on the intellectual property rights of any person or entity, or which in any way constitutes or encourages conduct that would constitute a criminal offense or otherwise violate any local, state or federal law, order, or regulation; • post, store, send, transmit, or disseminate any information or material which a reasonable person could deem to be indecent, pornographic, harassing, threatening, hateful or intimidating; • upload, post, publish, transmit, reproduce, create derivative works of, or distribute in any way information, software or other material obtained through the Service or otherwise that is protected by copyright or other proprietary right, without obtaining permission of the owner, including, but not limited to, links to such material, serial or registration numbers for software programs or pirated copyrighted content, such as authorized copies of music, video or other media files, whether through Internet Relay Chat or file sharing programs or services; • transmit unsolicited bulk or commercial messages, commonly known as "spam”; ;" • send numerous copies of the same or substantially similar messages, empty messages, or messages which contain no substantive content, or send very large messages or files that disrupt a server, account, newsgroup or chat service; • initiate, perpetuate or in any way participate in any pyramid or other illegal scheme; • participate in the collection of e-mail addresses, screen names, or other identifiers of others (without their prior consent), a practice sometimes known as “spidering” or “harvesting,” or participate in the use of software (including "spyware") designed to facilitate this activity; • collect responses from unsolicited bulk messages; • falsify, alter or remove message headers; • falsify references to Millry New Hope or its network, by name or other identifier, in messages; • impersonate any person or entity, engage in sender address falsification, forge anyone else's digital or manual signature, or perform any other similar fraudulent activity (for example, "phishing"); • violate the rules, regulations, or policies applicable to any network, server, computer database, or Web site that you access.; • post or transmit on or through the service any fraudulent content, including content known by you to be false or intended to be relied on by others; or any advertising or promotional materials that contain false, deceptive or misleading statements, claims or representations; • make false or unverified complaints against New Hope or any New Hope member, or otherwise abuse any of New Hope’s complaint policies and procedures. Threatening or abusive communications received via service should first be reported by the Customer to appropriate criminal or civil authorities, and then to New Hope. New Hope Technical Restrictions Customers may not: • attempt to interfere with or compromise the operation of New Hope’s network in whole or part, to interfere with any of the equipment comprising the system, or to access other accounts or restricted areas of the system; • access any other person's computer or computer system, network, software, or data without his or her knowledge and consent; breach the security of another user or system; or attempt to circumvent the user authentication or security of any host, network, or account. This includes, but is not limited to, accessing data not intended for you, logging into or making use of a server or account you are not expressly authorized to access, or probing the security of other hosts, networks, or accounts without express permission to do so; • use or distribute tools or devices designed or used for compromising security, such as password guessing programs, decoders, password gatherers, unauthorized keystroke loggers, analyzers, cracking tools, packet sniffers, encryption circumvention devices, or Trojan Horse programs. Unauthorized port scanning is strictly prohibited; • copy, distribute, or sublicense any software provided in connection with the Service by New Hope or any third party, except that you may make one copy of each software program for back-up purposes only; • distribute programs that make unauthorized changes to software (“cracks”); • use or run dedicated, stand-alone equipment or servers from the premises that provide network content or any other services to anyone outside of your premises local area network ("Premises LAN"), also commonly referred to as public services or servers. Examples of prohibited equipment and servers include, but are not limited to, e-mail, Web hosting, file sharing, and proxy services and servers; • use or run programs from the premises that provide network content or any other services to anyone outside of your Premises LAN, except for personal and non- commercial residential use; • service, alter, modify, or tamper with New Hope equipment or Service or permit any other person to do the same who is not authorized by New Hope; • operate a mail server with an open mail relay. Network and Usage Restrictions Customers shall not: • restrict, inhibit, or otherwise interfere with the ability of any other person, regardless of intent, purpose or knowledge, to use or enjoy the Service, including, without limitation, posting or transmitting any information or software which contains a worm, virus, lock, key, bomb, cancelbot or other harmful feature, or generating levels of traffic sufficient to impede others' ability to use, send, or retrieve information; • restrict, inhibit, interfere with, or otherwise disrupt or cause a performance degradation, regardless of intent, purpose or knowledge, to the Service or any New Hope (or New Hope supplier) host, server, backbone network, node or service, or otherwise cause a performance degradation to any New Hope (or New Hope supplier) facilities used to deliver the Service; • resell the Service or otherwise make available to anyone outside the premises the ability to use the Service (for example, though WiFi or other methods of networking), in whole or in part, directly or indirectly. The Agreement contemplates use of the Service for residential and small business purposes only. You agree not to use the Service for operation as an Internet service provider or for any similar business purpose; • connect the New Hope equipment to any computer outside of your premises; • interfere with computer networking or telecommunications service to any user, host or network, including, without limitation, denial of service attacks, flooding of a network, overloading a service, improper seizing and abusing operator privileges, and attempts to "crash" a host; • access and use the Service with anything other than a dynamic Internet Protocol ("IP") address that adheres to the dynamic host configuration protocol ("DHCP"). You may not configure the Service or any related equipment to access or use a static IP address or use any protocol other than DHCP, unless you are subject to a Service plan that expressly permits you to do so; • use a personal account for high volume or commercial use; multiple, concurrent logins of the same account are not allowed.

Appears in 1 contract

Samples: nhtc.coop

AutoNDA by SimpleDocs

Prohibited Uses and Activities. The Agreement prohibits uses and activities involving the Service that are illegal, infringe on the rights of others or interfere with or diminish the use and enjoyment of the Service by others. Prohibited uses and activities include, but are not limited to, using the Service, Customer equipment or Millry’s Moundville Equipment, either individually or in combination with one another, to: Conduct and Information Restrictions • undertake or accomplish any unlawful purpose, including, but not limited to, posting, storing, transmitting or disseminating information, data or material that is libelous, obscene, unlawful, threatening or defamatory, or which infringes on the intellectual property rights of any person or entity, or which in any way constitutes or encourages conduct that would constitute a criminal offense or otherwise violate any local, state or federal law, order, or regulation; • post, store, send, transmit, or disseminate any information or material which a reasonable person could deem to be indecent, pornographic, harassing, threatening, hateful or intimidating; • upload, post, publish, transmit, reproduce, create derivative works of, or distribute in any way information, software or other material obtained through the Service or otherwise that is protected by copyright or other proprietary right, without obtaining permission of the owner, including, but not limited to, links to such material, serial or registration numbers for software programs or pirated copyrighted content, such as authorized copies of music, video or other media files, whether through Internet Relay Chat or file sharing programs or services; • transmit unsolicited bulk or commercial messages, commonly known as "spam”; ;" • send numerous copies of the same or substantially similar messages, empty messages, or messages which contain no substantive content, or send very large messages or files that disrupt a server, account, newsgroup or chat service; • initiate, perpetuate or in any way participate in any pyramid or other illegal scheme; • participate in the collection of e-mail addresses, screen names, or other identifiers of others (without their prior consent), a practice sometimes known as “spidering” or “harvesting,” or participate in the use of software (including "spyware") designed to facilitate this activity; • collect responses from unsolicited bulk messages; • falsify, alter or remove message headers; • falsify references to Millry Moundville or its network, by name or other identifier, in messages; • impersonate any person or entity, engage in sender address falsification, forge anyone else's digital or manual signature, or perform any other similar fraudulent activity (for example, "phishing"); • violate the rules, regulations, or policies applicable to any network, server, computer database, or Web site that you access.

Appears in 1 contract

Samples: www.mound.net

Prohibited Uses and Activities. The Agreement prohibits uses and activities involving the Service that are illegal, infringe on the rights of others or interfere with or diminish the use and enjoyment of the Service by others. Prohibited uses and activities include, but are not limited to, using the Service, Customer equipment or MillryCamellia/Hayneville and Hayneville Internet’s Equipment, either individually or in combination with one another, to: Conduct and Information Restrictions • undertake or accomplish any unlawful purpose, including, but not limited to, posting, storing, transmitting or disseminating information, data or material that is libelous, obscene, unlawful, threatening or defamatory, or which infringes on the intellectual property rights of any person or entity, or which in any way constitutes or encourages conduct that would constitute a criminal offense or otherwise violate any local, state or federal law, order, or regulation; • post, store, send, transmit, or disseminate any information or material which a reasonable person could deem to be indecent, pornographic, harassing, threatening, hateful or intimidating; • upload, post, publish, transmit, reproduce, create derivative works of, or distribute in any way information, software or other material obtained through the Service or otherwise that is that’s protected by copyright or other proprietary right, without obtaining permission of the owner, including, but not limited to, links to such material, serial or registration numbers for software programs or pirated copyrighted content, such as authorized copies of music, video or other media files, whether through Internet Relay Chat or file sharing programs or services; • transmit unsolicited bulk or commercial messages, commonly known as “spam”; • send numerous copies of the same or substantially similar messages, empty messages, or messages which contain no substantive content, or send very large messages or files that disrupt a server, account, newsgroup or chat service; • initiate, perpetuate or in any way participate in any pyramid or other illegal scheme; • participate in the collection of e-mail addresses, screen names, or other identifiers of others (without their prior consent), a practice sometimes known as “spidering” or “harvesting,” or participate in the use of software (including “spyware”) designed to facilitate this activity; . • collect responses from unsolicited bulk messages; • falsify, alter or remove message headers; • falsify references to Millry Camellia/Hayneville/Hayneville Internet or its network, by name or other identifier, in messages; • impersonate any person or entity, engage in sender address falsification, forge anyone else's digital or manual signature, or perform any other similar fraudulent activity (for example, “phishing”); • violate the rules, regulations, or policies applicable to any network, server, computer database, or Web site that you access.. CAMELLIA/HAYNEVILLE Internet’s Technical Restrictions Customers may not: • attempt to interfere with or compromise the operation of Camellia/Hayneville Internet’s network in whole or part, to interfere with any of the equipment comprising the system, or to access other accounts or restricted areas of the system; • access any other person’s computer or computer system, network, software, or data without his or her knowledge and consent; breach the security of another user or system; or attempt to circumvent the user authentication or security of any host, network, or account. This includes, but is not limited to, accessing data not intended for you, logging into or making use of a server or account you are not expressly authorized to access, or probing the security of other hosts, networks, or accounts without express permission to do so; use or distribute tools or devices designed or used for compromising security, such as password guessing programs, decoders, password gatherers, unauthorized keystroke loggers, analyzers, cracking tools, packet sniffers, encryption circumvention devices, or Trojan Horse programs. Unauthorized port scanning is strictly prohibited; • copy, distribute, or sublicense any software provided in connection with the Service by Camellia/Hayneville Internet or any third party, except that you may make one copy of each software program for back-up purposes only; • distribute programs that make unauthorized changes to software (“cracks”); • use or run dedicated, stand-alone equipment or servers from the premises that provide network content or any other services to anyone outside of your premises local area network (“Premises LAN”), also commonly referred to as public services or servers. Examples of prohibited equipment and servers include, but are not limited to, e-mail, Web hosting, file sharing, and proxy services and servers; • use or run programs from the premises that provide network content or any other services to anyone outside of your Premises LAN, except for personal and non-commercial residential use; • service, alter, modify, or tamper with CAMELLIA/HAYNEVILLE Internet’s equipment or Service or permit any other person to do the same who is not authorized by Camellia/Hayneville Internet; Network and Usage Restrictions Customers shall not: • restrict, inhibit, or otherwise interfere with the ability of any other person, regardless of intent, purpose or knowledge, to use or enjoy the Service, including, without limitation, posting or transmitting any information or software which contains a worm, virus, lock, key, bomb, cancelbot or other harmful feature, or generating levels of traffic sufficient to impede others’ ability to use, send, or retrieve information; • restrict, inhibit, interfere with, or otherwise disrupt or cause a performance degradation, regardless of intent, purpose or knowledge, to the Service or any Camellia/Hayneville Internet (or Camellia/Hayneville Internet supplier) host, server, backbone network, node or service, or otherwise cause a performance degradation to any Camellia/Hayneville Internet (or Camellia/Hayneville Internet supplier) facilities used to deliver the Service; • resell the Service or otherwise make available to anyone outside the premises the ability to use the Service (for example, though WiFi or other methods of networking), in whole or in part, directly or indirectly. The Agreement contemplates use of the Service for residential and small business purposes only. You agree not to use the Service for operation as an Internet service provider or for any similar business purpose; • connect the Camellia/Hayneville Internet equipment to any computer outside of your premises; Interfere with computer networking or telecommunications service to any user, host or network, including, without limitation, denial of service attacks, flooding of a network, overloading a service, improper seizing and abusing operator privileges, and attempts to “crash” a host;

Appears in 1 contract

Samples: Customer Service Agreement

Prohibited Uses and Activities. The Agreement prohibits uses and activities involving the Service that are illegal, infringe on the rights of others or interfere with or diminish the use and enjoyment of the Service by others. Prohibited uses and activities include, but are not limited to, using the Service, Customer equipment or MillryFTC’s Equipment, either individually or in combination with one another, to: Conduct and Information Restrictions • undertake or accomplish any unlawful purpose, including, but not limited to, posting, storing, transmitting or disseminating information, data or material that is libelous, obscene, unlawful, threatening or defamatory, or which infringes on the intellectual property rights of any person or entity, or which in any way constitutes or encourages conduct that would constitute a criminal offense or otherwise violate any local, state or federal law, order, or regulation; • post, store, send, transmit, or disseminate any information or material which a reasonable person could deem to be indecent, pornographic, harassing, threatening, hateful or intimidating; • upload, post, publish, transmit, reproduce, create derivative works of, or distribute in any way information, software or other material obtained through the Service or otherwise that is protected by copyright or other proprietary right, without obtaining permission of the owner, including, but not limited to, links to such material, serial or registration numbers for software programs or pirated copyrighted content, such as authorized copies of music, video or other media files, whether through Internet Relay Chat or file sharing programs or services; • transmit unsolicited bulk or commercial messages, commonly known as “spam”; • send numerous copies of the same or substantially similar messages, empty messages, or messages which contain no substantive content, or send very large messages or files that disrupt a server, account, newsgroup or chat service; • initiate, perpetuate or in any way participate in any pyramid or other illegal scheme; • participate in the collection of e-mail addresses, screen names, or other identifiers of others (without their prior consent), a practice sometimes known as “spidering” or “harvesting,” or participate in the use of software (including “spyware”) designed to facilitate this activity; • collect responses from unsolicited bulk messages; • falsify, alter or remove message headers; • falsify references to Millry FTC or its network, by name or other identifier, in messages; • impersonate any person or entity, engage in sender address falsification, forge anyone else's digital or manual signature, or perform any other similar fraudulent activity (for example, “phishing”); • violate the rules, regulations, or policies applicable to any network, server, computer database, or Web site that you access.

Appears in 1 contract

Samples: Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.