[ Main ] [ Services ] [ Signup ] [ Hosted Sites ] [ Contact Us ] [ Acceptable Use Policy ]


 

All users of Techgnosis Netorks services agree to abide by the following rules. Failure to abide by the Techgnosis Networks Acceptable Use Policy may result in termination of account or in legal action.

  • Users may not engage in any activity that may compromise the security or integrity of data, computer system(s), or network(s) without the express and explicit consent of the owner(s) of the data, computer system(s), or network(s) that would be compromised.
  • Users may not use Techgnosis Networks services to engage in illegal activity, including, but not limited to, the following: harassment, stalking, or intimidation; theft of intellectual property; fraudulent, deceptive, or illegal business practices; transmission of child pornography.
  • Users may not abuse the resources of the Internet and related networks, nor may they aid or encourage others to so do. Examples of abuse include, but are not limited to: spamming; unsolicited broadcast email; mass posting; excessive multi-posting; transmission of chain letters; excessive crossposting; unauthorized cancellation or superseding of articles; collecting, using, distributing, or selling list(s) of email addresses without the explicit consent of all persons on said list(s); email bombing; advertising, collecting, buying, or distributing software to aid in, expedite, or automate abuse of Internet resources, including bulk email and address extraction software. Any user engaging in the above practices on ANY network or system may have their access restricted or revoked, regardless of whether Techgnosis Networks systems were used in the abuse or not.
  • Techgnosis Networks systems may not be used to promote or operate multi-level marketing, pyramid or ponzi schemes, or so-called "network marketing" ventures.
  • In the event of premeditated and/or egregious violation of the Techgnosis Networks Aceptable Use Policy, Techgnosis Networks may publish the identity of the violator, so that victims may more easily contact the violator and seek redress, and so that ISPs will be aware of this person's activities. Unsolicited Broadcast Email will be considered egregious if one or more of the following are true: if the return email address in the headers does not point to an emailbox read by the original sender; if it was sent to one hundred or more persons; if it contains code, binaries, or scripts designed to cause the recipients systems to perform actions at the direction of the sender (such as opening remote websites); if any header lines are falsified to disguise the origin of the message; or if it causes technical difficulties or dysfunction in any system. Mass postings will be considered egregious if one or more of the following conditions are met: if one hundred or more copies are posted; if it contains code, binaries, or scripts designed to cause the recipients systems to perform actions at the direction of the poster (such as opening remote websites); if it cancels or supersedes other posts; or if any header lines are falsified to disguise the origin of the sender. Abuse will be considered premeditated if the violator has lost accounts at other ISPs for the same or similar behaviour.
  • Administrative work required to deal with a confirmed violation of the Techgnosis Networks acceptable use policy will be billed at a rate of $50.00/hour. This work includes, but is not necessarily limited to, analysing headers, responding to abuse reports, cancellation of messages posted in violation of this acceptable use policy, tracing of messages, and tracing of connections.
  • We reserve the right to refuse service to anyone, at any time.