Prohibited Uses and Activities. This AUP identifies certain uses and activities that Company considers to be unlawful or abusive and therefore strictly prohibited. The examples listed herein are non- exclusive and are provided solely for guidance to customers. Company, at its sole discretion, reserves the right to discontinue service for any unlawful, prohibited, or abusive use. In the event of uncertainty as to whether any contemplated use or activity is permitted, please contact a customer service representative for assistance. In addition to any other illegal or abusive uses or activities, the following constitute violations of this AUP: i. Unlawful Use: Using service in any manner that violates local, state or federal law, including without limitation using service to transmit any material (by e-mail or otherwise) whose transmission is unlawful under any local, state or federal law applicable to such transmission. ii. Copyright or Trademark Infringement: Using service to transmit any material (by e-mail, bit torrent software, direct download, FTP sites or otherwise) that infringes any copyright, trademark, patent, trade secret, or other proprietary rights of Company or any third party, including, but not limited to, the unauthorized copying of copyrighted material, the digitization and distribution of photographs from magazines, books, or other copyrighted sources, the digitization and distribution of copyrighted video or music, and the unauthorized transmittal of copyrighted software. iii. Violation of the Digital Millennium Copyright Act (DMCA): Using service to circumvent any technological measures used by copyright owners to protect their works or using service to produce or disseminate technology primarily designed or produced to circumvent DMCA protections, that have only limited commercially significant purpose or use other than to circumvent; or that are marketed for use in circumventing DMCA protections. iv. Harm to Minors: Using service to harm, or attempt to harm, minors in any way; including but not limited to activities involving child pornography or the sexual exploitation of children.
Appears in 3 contracts
Sources: Terms and Conditions, Terms and Conditions, Terms and Conditions
Prohibited Uses and Activities. This AUP identifies certain uses and activities that Company considers to be unlawful or abusive and therefore strictly prohibited. The examples listed herein are non- non-exclusive and are provided solely for guidance to customers. Company, at its sole discretion, reserves the right to discontinue service for any unlawful, prohibitedharmful, infringing, offensive, or abusive interfering use. In the event of uncertainty as to whether any contemplated use or activity is permitted, please contact a customer service representative for assistance. In addition to any other illegal or abusive uses or activities, the following constitute violations of this the AUP:
i. : • Unlawful Use: Using service in any manner that violates local, state or federal law, including treaty, court order, ordinance, regulation, or administrative rule, including, without limitation limitation, using service to transmit any material (by e-mail or otherwise) whose transmission is unlawful under any local, state or federal law applicable to such transmission.
ii. • Copyright or Trademark Infringement: Using service to transmit any material (by e-mail, bit torrent file sharing software, direct download, FTP sites or otherwise) that infringes infringes, misappropriates, or otherwise violates any copyright, trademark, patent, trade secret, trade dress, right of privacy, right of publicity, moral rights, or other proprietary rights of Company or any third party, including, but not limited to, the unauthorized copying of copyrighted material, the digitization and distribution of photographs from magazines, books, or other copyrighted sources, the digitization and distribution of copyrighted video or music, and the unauthorized transmittal of copyrighted software.
iii. • Violation of the Digital Millennium Copyright Act (DMCA): Using service to circumvent any technological measures used by copyright owners to protect their works or using service to produce or disseminate technology primarily designed or produced to circumvent DMCA protections, that have only limited commercially significant purpose or use other than to circumvent; or that are marketed for use in circumventing DMCA protections.
iv. For additional information concerning your rights and responsibilities in connection with reporting or responding to claims of copyright infringement, see Reporting Claims of Copyright Infringement. • Harm to Minors: ; Using service to harm, or attempt to harm, exploit, or attempt to exploit minors in any way; including but not limited to activities involving child pornography or the sexual exploitation of children. • Threats: Using service to transmit any material (by e-mail or otherwise) that illegally threatens or encourages bodily harm or destruction of property. • Harassment and Cyberbullying: Using service to transmit any material (by e-mail or otherwise) that unlawfully harasses another. • Fraudulent Activity: Using service to make fraudulent offers to sell or buy products, items or services, or to advance any type of financial scam such a “pyramid schemes,” “Ponzi schemes”, unregistered sales of securities, securities fraud and “chain letters.” • Forgery or Impersonation: Adding, removing or modifying identifying network, message or article header information in an effort to deceive or mislead I is prohibited while using service. Attempting to impersonate any person by using forged headers or other identifying information is prohibited. • Unsolicited Commercial E-mail/Unsolicited Bulk E-mail: Using service to transmit any unsolicited commercial e-mail or unsolicited bulk e-mail without our prior written consent. Activities that have the effect of facilitating un solicited commercial e-mail or unsolicited bulk e-mail, whether or not that e-mail is commercial in nature, are prohibited. Using deliberately misleading headers in e-mails sent to multiple parties is prohibited. • Intentional Network Disruptions, Abusive Activity and Bots: Using service for any activity that adversely affects the ability of other people or systems to use service or third party Internet-based resources. This specifically but without limitation includes excessive consumption of network or system resources whether intentional or unintentional. This also includes “denial of service” and “distributed denial-of-service” (DoS) attacks against another network host or individual user. Interference with or disruption of other network users, network services or network equipment is prohibited. The transmission of viruses, malware, or engaging in “mail bombing,” “chat flooding,” cybersquatting, and similar unlawful behavior is also prohibited. Attempting to circumvent user authentication or security of any host, network, or account on Company’s systems or the Internet at Large (“cracking”). This includes scanning or probing ports without the consent of the owner of the machine being scanned. Using any robot, spider or other automatic device, process or means to access the service for any purpose, including monitoring or copying any of the material on the service. Introduce any Trojan horses, worms, logic bombs or other material which is malicious or technologically harmful. • Unauthorized Access: Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data. This includes unauthorized monitoring, scanning, or probing of the Company’s or any third party’s network or system and hacking, attacking, breaching, or circumventing the security of any host, network, service, personal computer, network access, software or data without express authorization of the owner. • Collection of Personal Data: Using service to collect, or attempt to collect, personal information about third parties without heir knowledge or consent in violation of applicable state or federal law.
Appears in 2 contracts
Sources: Standard Agreement for Local Exchange Service, Service Agreement