our web hosting services, you agree to comply with this Policy.
You are expected to use the Internet with respect, courtesy, and
responsibility, giving due regard to the rights of other Internet
users. We expect you to have a basic knowledge of how the Internet
functions, the types of uses, which are generally acceptable,
and the types of uses, which are to be avoided. Common sense is
the best guide as to what is considered acceptable use. The following
are unacceptable uses:
Illegality in any form, including but not limited
to activities such as unauthorized distribution or copying of
copyrighted software, violation of U.S. export restrictions, harassment,
fraud, trafficking in obscene material, drug dealing, and other
The provisions of this Policy are intended as guidelines and are
not meant to be exhaustive. Generally, conduct that violates law,
regulation, or the accepted norms of the Internet community, whether
or not expressly mentioned in this Policy, is prohibited. we reserves
the right at all times to prohibit activities that damage its
commercial reputation and goodwill.
we servers may be used only for lawful purposes. Transmission,
distribution or storage of any material in violation of any applicable
law or regulation is prohibited. This includes, without limitation,
material protected by copyright, trademark, trade secret or other
intellectual property right used without proper authorization,
and material that is obscene, defamatory, constitutes an illegal
threat, or violates export control laws. Examples of non-acceptable
content or links: "Pirated software", "Hackers
programs or archives", "Warez Sites", "Irc
We will be the sole arbiters as to what constitutes
a violation of this provision, provided that all such determinations
shall be made reasonably in good faith based on applicable law,
regulation and the accepted norms of the Internet community.
Adult content. Pornographic material of ANY kind is not accepted
for service or pubishing. This means by way of e-mail as well
as by webpages, ftp, or any other means. We don't want it. You
can't have it. Your site wil be destroyed if we find it.account
will be billed a $200.00 clean up fee and terminated.
System and Network Security
Violations of system or network security are prohibited, and may
result in criminal and civil liability. Examples include, but
are not limited to the following: Unauthorized access, use, probe,
or scan of a systems security or authentication measures, data
or traffic. Interference with service to any user, host or network
including, without limitation, mail bombing, flooding, deliberate
attempts to overload a system and broadcast attacks, forging of
any TCP-IP packet header or any part of the header information
in an email or a newsgroup posting.
Misuse of System Resources
It is a violation for anyone to post information or to include
programs on the web space provided through the we services which
consume excessive bandwidth, CPU time or storage space.
No one shall post unlawful or defamatory information about a person
without their consent, intentionally inflicting emotional distress,
or violating trademarks, copyrights, or other intellectual property
Sending unsolicited mail messages, including, without limitation,
commercial advertising and informational announcements, is explicitly
prohibited. A user shall not use another site's mail server to
relay mail without the express permission of the site.
It is contrary to our policy for customers to
use our servers to effect or participate in any of the following
To post to any Usenet or other newsgroup, forum,
e-mail mailing list or other similar group or list articles which
are off-topic according to the charter or other owner-published
FAQ or description of the group or list;
To send unsolicited mass e-mailings, if such unsolicited
e-mailings provoke complaints from the recipients;
To engage in any of the foregoing activities using
the service of another provider, but channeling such activities
through a we provided server, or using a we provided server as
a maildrop for responses;
To falsify user information provided to we or to
other users of the service in connection with use of a we service.
Consequences of Violation
When we become aware of an alleged violation of its Acceptable
Use Policy, we will initiate an investigation. During the investigation
we may restrict Customer 's access in order to prevent further
possible unauthorized activity. Depending on the severity of the
violation, we may, at its sole discretion, restrict, suspend,
or terminate Customer's account and/or pursue other civil remedies.
If such violation is a criminal offense, we will notify the appropriate
law enforcement department of such violation.
we does not issue service credits for any outages
incurred through service disablement resulting from Policy violations.
Reporting Network Abuse
Any party seeking to report any violations of this policy is urged
to contact us immediately.