|   | 
     
       All users of Techgnosis Netorks services agree to abide by the following 
        rules. Failure to abide by the Techgnosis Networks Acceptable Use Policy 
        may result in termination of account or in legal action. 
       
      
        - Users may not engage in any activity that may compromise the security 
          or integrity of data, computer system(s), or network(s) without the 
          express and explicit consent of the owner(s) of the data, computer system(s), 
          or network(s) that would be compromised.
 
        - Users may not use Techgnosis Networks services to engage in illegal 
          activity, including, but not limited to, the following: harassment, 
          stalking, or intimidation; theft of intellectual property; fraudulent, 
          deceptive, or illegal business practices; transmission of child pornography.
 
        - Users may not abuse the resources of the Internet and related networks, 
          nor may they aid or encourage others to so do. Examples of abuse include, 
          but are not limited to: spamming; unsolicited broadcast email; mass 
          posting; excessive multi-posting; transmission of chain letters; excessive 
          crossposting; unauthorized cancellation or superseding of articles; 
          collecting, using, distributing, or selling list(s) of email addresses 
          without the explicit consent of all persons on said list(s); email bombing; 
          advertising, collecting, buying, or distributing software to aid in, 
          expedite, or automate abuse of Internet resources, including bulk email 
          and address extraction software. Any user engaging in the above practices 
          on ANY network or system may have their access restricted or revoked, 
          regardless of whether Techgnosis Networks systems were used in the abuse 
          or not.
 
        - Techgnosis Networks systems may not be used to promote or operate 
          multi-level marketing, pyramid or ponzi schemes, or so-called "network 
          marketing" ventures.
 
        - In the event of premeditated and/or egregious violation of the Techgnosis 
          Networks Aceptable Use Policy, Techgnosis Networks may publish the identity 
          of the violator, so that victims may more easily contact the violator 
          and seek redress, and so that ISPs will be aware of this person's activities. 
          Unsolicited Broadcast Email will be considered egregious if one or more 
          of the following are true: if the return email address in the headers 
          does not point to an emailbox read by the original sender; if it was 
          sent to one hundred or more persons; if it contains code, binaries, 
          or scripts designed to cause the recipients systems to perform actions 
          at the direction of the sender (such as opening remote websites); if 
          any header lines are falsified to disguise the origin of the message; 
          or if it causes technical difficulties or dysfunction in any system. 
          Mass postings will be considered egregious if one or more of the following 
          conditions are met: if one hundred or more copies are posted; if it 
          contains code, binaries, or scripts designed to cause the recipients 
          systems to perform actions at the direction of the poster (such as opening 
          remote websites); if it cancels or supersedes other posts; or if any 
          header lines are falsified to disguise the origin of the sender. Abuse 
          will be considered premeditated if the violator has lost accounts at 
          other ISPs for the same or similar behaviour.
 
        - Administrative work required to deal with a confirmed violation of 
          the Techgnosis Networks acceptable use policy will be billed at a rate 
          of $50.00/hour. This work includes, but is not necessarily limited to, 
          analysing headers, responding to abuse reports, cancellation of messages 
          posted in violation of this acceptable use policy, tracing of messages, 
          and tracing of connections.
 
	- We reserve the right to refuse service to anyone, at any
time.
 
       
     |