You Must Do the Following

  1. Comply with all applicable federal, state, and local laws, ordinances, rules and regulations regarding Your website, User Content and/or e-mail services and will use each service, including bandwidth, disk space and other resources only for lawful purposes. If the Company learns or discovers that You are violating any law related to Your website, User Content and/or e-mail services, use of bandwidth, disk usage, the Company may be obligated to inform the necessary law enforcement and/or any related agency(ies) of such conduct and may provide such agency(ies) with information related to You, Your website, User Content and/or User's e-mail.
  2. Review and ensure that you comply with the United States CAN-SPAM Act of 2003, available at http://business.ftc.gov/documents/bus61-can-spam-act-compliance-guide-business.
  3. Require users of Your website to agree to and abide by this Acceptable Use Policy.
  4. Use an e-mail marketing service provider to send all mass marketing e-mail campaigns.

You May Not Do Any of the Following

  1. Use the Hosting Services to copy material from third parties (including text, graphics, music, videos or other copyrightable material) without proper authorization, misappropriate or infringe the patents, copyrights, trademarks or other intellectual property rights of any third party.
  2. Use the Hosting Services to traffic in illegal drugs, gambling, obscene materials or any other products or services that are prohibited under applicable law, export encryption software to points outside the United States in violation of applicable export control laws.
  3. Use the Hosting Services to forge or misrepresent message headers, whether in whole or in part, to mask the originator of the message.
  4. Store on the Company's servers or use the Hosting Services to provide any User Content that is defamatory, trade libelous, unlawfully threatening, unlawfully harassing, obscene, child pornographic, or indecent or that violates any third party's right of publicity or right of privacy.
  5. Store on the Company's servers or use the Hosting Services to provide any User Content that contains any IRC application, bots, egg drops, viruses, trojan horses, worms, time bombs, cancelbots or other computer programming routines that are intended to damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or personal information.
  6. Attempt to attempt to undermine the security or integrity of, or gain unauthorized access to, the Company's hardware, operating systems or any other computing systems or networks.
  7. Attempt to use an IP Address not directly assigned by the Company staff if applicable. Attempting to use unauthorized IP Addresses may result in IP Conflict. Any server found using an IP Address that it was not officially assigned by the Company will be suspended at the Company's sole discretion from network access until such time as the IP Address conflict can be corrected.
  8. Restrict or inhibit any other user from using and enjoying the Hosting Service and/or the Internet.
  9. Use the SMTP services of a third party for the purposes of relaying or sending electronic mail messages without the express permission of that third party.
  10. Host a publicly-accessible "open relay" SMTP or anonymous remailer service for any purpose, cause, or reason.
  11. Post a commercial advertisement to any USENET newsgroup, Internet "chat room", bulletin board, or similar forum, if the target forum is not specifically chartered for public advertisement by non-private parties of items "for sale".
  12. Post to any USENET Newsgroup or other newsgroups, forum, email mailing list or similar group or list articles which are off-topic according to the charter or other public statement of the group.
  13. Send Unsolicited Commercial E-mail (UCE, also known as SPAM).
  14. Send bulk marketing email marketing campaigns through the e-mail accounts obtained under the Agreement.
  15. Engage in any activity that is, or appears at the Company's sole discretion to be, an attempt to gain unauthorized access to a remote system or network, or to gain information that could later be used to assist in gaining unauthorized access to a remote system or network, such as port scanning, dictionary attacks, Denial of Service attacks, server/service hijacking, etc.
  16. Engage in any of the foregoing activities using the service of another provider, but channeling such activities through an account hosted by the Company or remailer, or using an account hosted by the Company as a mail drop for responses to UCE, or hosting a website that is advertised via UCE that originates from a non-Company host server-connected source, or otherwise requiring return transit through the Company's internet backbone.
  17. Falsify or "spoof" user information provided to the Company or to other users of the Service, and for handling all complaints and trouble reports made by Your own customers and authorized users.
  18. Use the Hosting Services to offer mail services, mail forwarding capabilities, POP accounts or auto responders other than for your own account(s).
  19. Abuse or fraudulently use the Service in any way not specifically set forth above.