ABSOLUTE-EMAIL
 
 

 Acceptable Uses Policy

 

1. Use and Misuse of the Services.

 

1.1 All complaints of abuse, violation and misuse of the Services, whether described in this Section or otherwise, shall be investigated promptly. If you are not sure if your actions will be an abuse, violation or misuse, please ask first.

1.2 You are responsible for all use of your service, with or without your knowledge or consent.

1.3 You agree to use the Services only for lawful purposes, in compliance with all applicable laws.

1.4 When the Company becomes aware of possible violations of this Agreement, the Company may initiate an investigation that may include gathering information from you and the complaining party, if any, and examination of material on the Server. The Company, in its sole discretion, will determine what action will be taken in response to a violation on a case-by-case basis. Violations of this Agreement could result in immediate termination of the Service and/or subject you to criminal or civil liability.

 

2. Email Use.

 

2.1 Unacceptable affronts to netiquette and unacceptable activities include, but are not limited to, the following: spamming (sending unsolicited advertising to those with which you have no existing business relationship and posting off-topic advertising in newsgroups); spoofing (using a return email address that is not the valid reply address of the sender or sending an email message that does not contain enough information to enable the recipient to identify you); passive spamming (promoting a website hosted by the Company by spamming from some other source); trolling (posting controversial messages in newsgroups to generate responses); mailbombing (inundating a user with email without any serious intent to correspond or sending large or multiple files to a user); generating a higher volume of outgoing mail than a normal user (no more than 100 recipients in a single email, no more than 100 recipients in total per hour, and no more than 500 recipients in any 24 hour period); propagating chain letters; and subscribing someone else to an electronic mailing list without that person's permission, are prohibited.

A message is considered unsolicited if it is posted in violation of a newsgroup charter or sent to a recipient who has not requested the message. Making an email address available to the public does not constitute a request to receive messages. Distribution of mass emailing programs is also prohibited. All recipients on a mailing list must have personally subscribed. Mailing lists may not be used to distribute unsolicited email. Emails sent to mailing lists must contain a clear opt-out policy to allow the recipient to prevent any future mailings from you, and must clearly identify who you are (your company or personal name etc.) and contain contact details for you. If you are repeatedly mailbombed or attract such behaviour, the Services will be terminated.

2.2 You should not send email to any user who does not wish to receive it, either at the Company or elsewhere. The Company recognizes that email is an informal medium; however, you must refrain from sending any further emails to a user after receiving a request to stop.

2.3 You may not alter the headers of email messages to disguise their identity or to prevent users from responding to the messages. The Company may disclose the usernames of accounts responsible for forged email messages to system administrators or users requesting the information.

2.4 Violations of the Company policies outlined herein can sometimes result in massive numbers of email responses. If you receive so much email that the Company resources are affected, the Company staff may shut down your mailbox.

2.5 It is unacceptable to send abusive or threatening correspondence to the Company, whether via our website or another means. It is also unacceptable to bombard or send repeated correspondence to the Company with a single request or enquiry whilst you are awaiting a reply from the Company with regard to that same request or enquiry.

 

3. System Security.

 

3.1 You are prohibited from utilizing the Services to compromise the security of system resources or accounts on the Servers or at any other site. Use or distribution of tools designed for compromising security or containing viruses or trojans are prohibited. Examples of these tools include, but are not limited to, password guessing programs, cracking tools or network probing tools.

3.2 If you are involved in violations of system security, the Company reserves the right to release all usernames of users involved in such violations to system administrators at other sites in order to assist them in resolving security incidents. The Company will also fully cooperate with law enforcement authorities in investigating suspected lawbreakers.

 

4. System Resources.

 

4.1 System abuse includes any use of resources that disrupts the normal use of the Servers or Services for others. Examples of system abuse include running excessive numbers of processes or consuming excessive amounts of CPU time, memory, disk space or bandwidth.

4.2 Any usage of 10% or more of system resources is an undue burden on the system and is unacceptable. If your usage ever exceeds 10% of system resources, your account may be terminated immediately and without prior notice.

4.3 Further, running programs in the background on the Servers without the Company's prior written authorization, or running chat rooms, Internet Relay Chat, IRC bots, more then 500 emails a day and the like are not acceptable uses of the Servers.

   
Copyright Medusa Red Ltd. ©