BizSystems Internet Services 
Acceptable
Use Policy
Home
Home

Acceptable Use Policy

By using our services, you agree to comply with our policies. We support the free flow of information and ideas over the Internet and do not actively monitor use of the services we provide to our clients under normal circumstances. We expect you to use the internet with respect, courtesy, and responsibility, giving due regard to the rights of other internet users. We do not exercise editorial control over the content of any web site, electronic mail transmission, newsgroup, or other material created or accessible over or through the services we provide, except for certain proprietary web sites. We may remove any materials that, in our sole discretion, may be illegal, may subject us to liability, or which may violate this Acceptable Use Policy. We may cooperate with legal authorities and/or third parties in the investigation of any suspected or alleged crime or civil wrong. Your violation of this Acceptable Use Policy may result in the suspension or termination of either your access to our services and/or your account or other civil remedies. If we believe such a violation is a criminal offense, we will notify the appropriate law enforcement department of the violation. We do not issue credit for paid service that are interrupted or terminated as a result of violations of this Acceptable Use Policy.

The provisions of this Acceptable Use Policy are intended as guidelines and are not meant to be exhaustive. Generally, conduct that violates the law, regulation, or the accepted norms of the internet community, whether or not expressly mentioned in this Acceptable Use Policy, is prohibited. In addition, we reserve the right at all times to prohibit activities that damage our reputation and goodwill.

The following constitute violations of the Acceptable Use Policy.

  1. Illegal use. Transmission, distribution or storage of any material that, intentionally or unintentionally, violates any applicable local, state, national, or international law, or any rules or regulations promulgated thereunder. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property right used without proper authorization, and material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws.
  2. Defamatory, threatening or abusive language. Using our network or services to transmit any material (by email, uploading, posting, news, or otherwise) that is defamatory, scandalous, or constitutes private information about an individual sent without their consent, or material sent to intentionally inflict emotional distress, or material that threatens or encourages bodily harm or destruction of property.
  3. Harm to minors. Harming or attempting to harm minors in any way.
  4. Forgery or impersonation. Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message. The use of anonymous remailers or nicknames does not constitute impersonation or forgery. Using deliberately misleading headers in news postings in order to avoid spam email address collectors is allowed.
  5. Fraudulent activity. Making fraudulent offers to sell or buy products, items or services, or to advance any type of financial scam including advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, and pirating software.
  6. Distribution of Internet Viruses, Worms, Trojan Horses, or Other Destructive Activities. Distributing information regarding the creation of and sending internet viruses, worms, Trojan horses, pinging, flooding, mailbombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the network or any connected network, system, service, or equipment.
  7. Spamming. Sending unsolicited mail messages, including, without limitation, commercial advertising and informational announcements, is explicitly prohibited. Using another site's mail server to relay mail without the express permission of the site. Maintaining an open SMTP relay. Posting to any usenet or other newsgroup, forum, e-mail mailing list or other similar group or list, articles which are off-topic according tho the charter of other owner-published definition or description of the group or list. Sending unsolicited mass e-mailings, if such unsolicited e-mailings provoke complaints from the recipients. Engaging any of the forgoing activities using the service of another provider, but channeling such activities through our services, or using a server on our network as a maildrop for responses. Falsifying user information provided to us or to other users.
  8. Unauthorized Access. Using our services to access, or to attempt to access, the accounts of others, or to penetrate, or attempt to penetrate, security measures of another entity's computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in the corruption or loss of data.
  9. Network Disruption and unfriendly activity. Any activity which adversely affects the ability of other people or systems to use the our network or the internet, including but not limited to denial of service attacks against another network host or individual user, interference with or disruption of other network users, network services, or network equipment. You may not, through action or inaction, allow others to use your equipment or network for illegal or inappropriate actions, and may not permit your network or equipment, through action or inaction, to be configured in such a way that it gives a third party the capability to use it in an illegal or inappropriate manner.
  10. Facilitating a Violation of this Acceptable Use Policy. Advertising, transmitting, or otherwise making available any software, program, product, or service that is designed to violate this Acceptable Use Policy, which includes the facilitation of the means to spam, initiation of pinging, flooding, mailbombing, denial of service attacks, and piracy of software.
  11. Engaging in activities, whether lawful or unlawful, that we determine to harmful to its subscribers, clients, operations, reputation, goodwill, or customer relations.
  12. We reserve the right to add, delete, or modify any provision of this Acceptable Use Policy at any time without notice. Parties seeking to report any violations of this policy may contact us via e-mail at: abuse@bizsystems.net