Acceptable Uses Policy

By using our web hosting services, you agree to comply with this Policy. You are expected to use the Internet with respect, courtesy, and responsibility, giving due regard to the rights of other Internet users. We expect you to have a basic knowledge of how the Internet functions, the types of uses, which are generally acceptable, and the types of uses, which are to be avoided. Common sense is the best guide as to what is considered acceptable use. The following are unacceptable uses:

Illegality in any form, including but not limited to activities such as unauthorized distribution or copying of copyrighted software, violation of U.S. export restrictions, harassment, fraud, trafficking in obscene material, drug dealing, and other illegal activities.

Interpretation
The provisions of this Policy are intended as guidelines and are not meant to be exhaustive. Generally, conduct that violates law, regulation, or the accepted norms of the Internet community, whether or not expressly mentioned in this Policy, is prohibited. we reserves the right at all times to prohibit activities that damage its commercial reputation and goodwill.

Illegal Use
Our servers may be used only for lawful purposes. Transmission, distribution or storage of any material in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property right used without proper authorization, and material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws. Examples of non-acceptable content or links: “Pirated software”, “Hackers programs or archives”, “Warez Sites”, “Irc Bots”, “Mp3”.

We will be the sole arbiters as to what constitutes a violation of this provision, provided that all such determinations shall be made reasonably in good faith based on applicable law, regulation and the accepted norms of the Internet community.

Adult Content
Adult content. Pornographic material of ANY kind is not accepted for service or pubishing. This means by way of e-mail as well as by webpages, ftp, or any other means. We don’t want it. You can’t have it. Your site wil be destroyed if we find it.account will be billed a $200.00 clean up fee and terminated.

System and Network Security
Violations of system or network security are prohibited, and may result in criminal and civil liability. Examples include, but are not limited to the following: Unauthorized access, use, probe, or scan of a systems security or authentication measures, data or traffic. Interference with service to any user, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks, forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting.

Misuse of System Resources
It is a violation for anyone to post information or to include programs on the web space provided through the we services which consume excessive bandwidth, CPU time or storage space.

Tortious Conduct
No one shall post unlawful or defamatory information about a person without their consent, intentionally inflicting emotional distress, or violating trademarks, copyrights, or other intellectual property rights.

Spamming
Sending unsolicited mail messages, including, without limitation, commercial advertising and informational announcements, is explicitly prohibited. A user shall not use another site’s mail server to relay mail without the express permission of the site.

It is contrary to our policy for customers to use our servers to effect or participate in any of the following activities:

To post to any Usenet or other newsgroup, forum, e-mail mailing list or other similar group or list articles which are off-topic according to the charter or other owner-published FAQ or description of the group or list;

To send unsolicited mass e-mailings, if such unsolicited e-mailings provoke complaints from the recipients;

To engage in any of the foregoing activities using the service of another provider, but channeling such activities through a we provided server, or using a we provided server as a maildrop for responses;

To falsify user information provided to we or to other users of the service in connection with use of a we service.

Consequences of Violation
When we become aware of an alleged violation of its Acceptable Use Policy, we will initiate an investigation. During the investigation we may restrict Customer ‘s access in order to prevent further possible unauthorized activity. Depending on the severity of the violation, we may, at its sole discretion, restrict, suspend, or terminate Customer’s account and/or pursue other civil remedies. If such violation is a criminal offense, we will notify the appropriate law enforcement department of such violation.

we does not issue service credits for any outages incurred through service disablement resulting from Policy violations.

Reporting Network Abuse
Any party seeking to report any violations of this policy is urged to contact us immediately.

Your Competition Has A Website...

........DO YOU???