|
All users of Techgnosis Netorks services agree to abide by the following
rules. Failure to abide by the Techgnosis Networks Acceptable Use Policy
may result in termination of account or in legal action.
- Users may not engage in any activity that may compromise the security
or integrity of data, computer system(s), or network(s) without the
express and explicit consent of the owner(s) of the data, computer system(s),
or network(s) that would be compromised.
- Users may not use Techgnosis Networks services to engage in illegal
activity, including, but not limited to, the following: harassment,
stalking, or intimidation; theft of intellectual property; fraudulent,
deceptive, or illegal business practices; transmission of child pornography.
- Users may not abuse the resources of the Internet and related networks,
nor may they aid or encourage others to so do. Examples of abuse include,
but are not limited to: spamming; unsolicited broadcast email; mass
posting; excessive multi-posting; transmission of chain letters; excessive
crossposting; unauthorized cancellation or superseding of articles;
collecting, using, distributing, or selling list(s) of email addresses
without the explicit consent of all persons on said list(s); email bombing;
advertising, collecting, buying, or distributing software to aid in,
expedite, or automate abuse of Internet resources, including bulk email
and address extraction software. Any user engaging in the above practices
on ANY network or system may have their access restricted or revoked,
regardless of whether Techgnosis Networks systems were used in the abuse
or not.
- Techgnosis Networks systems may not be used to promote or operate
multi-level marketing, pyramid or ponzi schemes, or so-called "network
marketing" ventures.
- In the event of premeditated and/or egregious violation of the Techgnosis
Networks Aceptable Use Policy, Techgnosis Networks may publish the identity
of the violator, so that victims may more easily contact the violator
and seek redress, and so that ISPs will be aware of this person's activities.
Unsolicited Broadcast Email will be considered egregious if one or more
of the following are true: if the return email address in the headers
does not point to an emailbox read by the original sender; if it was
sent to one hundred or more persons; if it contains code, binaries,
or scripts designed to cause the recipients systems to perform actions
at the direction of the sender (such as opening remote websites); if
any header lines are falsified to disguise the origin of the message;
or if it causes technical difficulties or dysfunction in any system.
Mass postings will be considered egregious if one or more of the following
conditions are met: if one hundred or more copies are posted; if it
contains code, binaries, or scripts designed to cause the recipients
systems to perform actions at the direction of the poster (such as opening
remote websites); if it cancels or supersedes other posts; or if any
header lines are falsified to disguise the origin of the sender. Abuse
will be considered premeditated if the violator has lost accounts at
other ISPs for the same or similar behaviour.
- Administrative work required to deal with a confirmed violation of
the Techgnosis Networks acceptable use policy will be billed at a rate
of $50.00/hour. This work includes, but is not necessarily limited to,
analysing headers, responding to abuse reports, cancellation of messages
posted in violation of this acceptable use policy, tracing of messages,
and tracing of connections.
- We reserve the right to refuse service to anyone, at any
time.
|