General Statement: Company is dedicated to the unrestricted free transmission of information via the internet and its many resources. Our goal is to deliver enterprise quality on-demand IT services to all of our Customers while serving as the medium of exchange for transmission of all information. The storage, distribution, and exchange of information (content) are the internet’s single most valuable feature. Company is dedicated to protecting the source and distribution of information and protecting the rights and privileges of those utilizing it. Company does not purport to be the content police; our duty in the process of information dissemination is simply to act as conduit between interested parties. Company follows all local, state and federal laws pursuant to the services delivered over the internet and directly related to the Colocation Agreement. The purpose of this AUP is to inform all Customers of acceptable, anticipated Customer use. This AUP is intended to act as a guideline to service and not to be all encompassing.
Colocation Services: Customers Proper use under the Colocation Agreement is to utilize the network in any way so long as Customer does not violate any local, state, or federal laws or generate harm to the network or interfere with the use of services of other users utilizing the same network. Violation, misuse, or interference of the services shall be considered a violation of the AUP and shall trigger the Methods of Resolution under this AUP as set forth below in Table C.
Customer Content: Company does not actively monitor content for review. Company believes in the free dissemination of information via our services. Dedicated content will only be reviewed upon complaint by verified third parties. Content that does not violate local, state and federal law or the AUP is deemed in compliance and shall remain intact. Legal adult content is allowed. Content deemed in violation will be addressed pursuant to the Methods of Resolution under this AUP as set forth below in Table C.
Per Se Violations: The following list represents per se direct violations of this AUP and will be subject to immediate redress under one or more of the Methods of Resolution as described in this AUP and as set forth below. Note: Company is not required to follow the Methods of Resolution for Hourly Services, and reserves the right to immediately terminate the Colocation Agreement based on violations of this AUP.
1. Copyright and Trademark Infringement: Direct copyright infringement (as defined and noted under Title 17, Section 512 of the United States Code) and trademark infringement are direct violations.
2. Unsolicited Email: The sending or receiving of mass unsolicited email (SPAM) is a direct violation. This includes the direct sending and receiving of such messages, support of such messages via web page, splash page or other related sites, or the advertisement of such services.
3. Email Bombing: The sending, return, bouncing or forwarding of email to specified user(s) in an attempt to interfere with or over flow email services is a direct violation.
4. Proxy Email (SPAM): The use of dedicated services to proxy email unsolicited users is a direct violation. Proxy email is defined as the use of dedicated services to act in concert with other services located inside and outside the network to achieve mass unsolicited email (SPAM) to unrelated third parties.
5. UseNet SPAM: The use of dedicated services to send, receive, forward, or post UseNet unsolicited email or posts is a direct violation.
6. Illegal Use: Any use of dedicated services in a manner which is defined or deemed to be statutorily illegal is a direct violation. This includes, but is not limited to: death threats, terroristic threats, threats of harm to another individual, multi-level marketing schemes, “ponzi schemes,” invasion of privacy, credit card fraud, racketeering, and other common illegal activities.
7. Child Pornography: Company has a zero-tolerance policy on child pornography and related sites. The hosting of child pornography or related sites or contact information is in direct violation of federal law and Company’s AUP.
8. Threats & Harassment: Company’s Colocation Services can be utilized for any type of individual, organizational or business use. This does not include threats to or harassment of individuals, organizations or businesses, unless it falls within the bounds of protected free speech under the First Amendment of the United States Constitution.
9. Fraudulent Activities: Company prohibits utilizing dedicated services or network services for fraudulent activities.
10. Terrorist Websites: Compay prohibits the use of dedicated services for the hosting of terrorist-related web sites. This includes sites advocating human violence and hate crimes based upon religion, ethnicity, or country of origin.
11. Distribution of Malware: Company prohibits the storage, distribution, fabrication, or use of malware, including without limitation, virus software, root kits, password crackers, adware, key stroke capture programs and other programs normally used in malicious activity. Programs used in the normal ordinary course of business are deemed acceptable.
12. Phishing: Company strictly prohibits any activity associated with Phishing or systems designed to collect personal information (name, account numbers, usernames, passwords, etc.) under false pretense. Splash pages, phishing forms, email distribution, proxy email or any relation to phishing activities will result in immediate removal.
Reporting Violation of the Acceptable Use Policy: Company accepts reports of alleged violations of this AUP by contacting the Customer Support Line (806) 798-2600. Reports of alleged violations must be verified and must include the name and contact information of the complaining party, and the IP address or website allegedly in violation, and description of the violation. Unless otherwise required by law, such as the DMCA, Company owes no duty to third parties reporting alleged violations due to lack of privity in contract law. Company will review all verified third party reports and will take appropriate actions as described within Methods of Resolution as set forth in Table C below or within its sole discretion.