Comply with all applicable federal, state, and local laws, ordinances, rules and regulations regarding Your
website, User Content and/or e-mail services and will use each service, including bandwidth, disk space and other
resources only for lawful purposes. If the Company learns or discovers that You are violating any law related to
Your website, User Content and/or e-mail services, use of bandwidth, disk usage, the Company may be obligated to
inform the necessary law enforcement and/or any related agency(ies) of such conduct and may provide such
with information related to You, Your website, User Content and/or User's e-mail.
Require users of Your website to agree to and abide by this Acceptable Use Policy.
Use an e-mail marketing service provider to send all mass marketing e-mail campaigns.
You May Not Do Any of the Following
Use the Hosting Services to copy material from third parties (including text, graphics, music, videos or other
copyrightable material) without proper authorization, misappropriate or infringe the patents, copyrights,
or other intellectual property rights of any third party.
Use the Hosting Services to traffic in illegal drugs, gambling, obscene materials or any other products or
services that are prohibited under applicable law, export encryption software to points outside the United States
violation of applicable export control laws.
Use the Hosting Services to forge or misrepresent message headers, whether in whole or in part, to mask the
originator of the message.
Store on the Company's servers or use the Hosting Services to provide any User Content that is defamatory, trade
libelous, unlawfully threatening, unlawfully harassing, obscene, child pornographic, or indecent or that violates
any third party's right of publicity or right of privacy.
Store on the Company's servers or use the Hosting Services to provide any User Content that contains any IRC
application, bots, egg drops, viruses, trojan horses, worms, time bombs, cancelbots or other computer programming
routines that are intended to damage, detrimentally interfere with, surreptitiously intercept or expropriate any
system, data or personal information.
Attempt to attempt to undermine the security or integrity of, or gain unauthorized access to, the Company's
hardware, operating systems or any other computing systems or networks.
Attempt to use an IP Address not directly assigned by the Company staff if applicable. Attempting to use
unauthorized IP Addresses may result in IP Conflict. Any server found using an IP Address that it was not
assigned by the Company will be suspended at the Company's sole discretion from network access until such time as
the IP Address conflict can be corrected.
Restrict or inhibit any other user from using and enjoying the Hosting Service and/or the Internet.
Use the SMTP services of a third party for the purposes of relaying or sending electronic mail messages without
the express permission of that third party.
Host a publicly-accessible "open relay" SMTP or anonymous remailer service for any purpose, cause, or
Post a commercial advertisement to any USENET newsgroup, Internet "chat room", bulletin board, or
similar forum, if the target forum is not specifically chartered for public advertisement by non-private parties
items "for sale".
Post to any USENET Newsgroup or other newsgroups, forum, email mailing list or similar group or list articles
which are off-topic according to the charter or other public statement of the group.
Send Unsolicited Commercial E-mail (UCE, also known as SPAM).
Send bulk marketing email marketing campaigns through the e-mail accounts obtained under the Agreement.
Engage in any activity that is, or appears at the Company's sole discretion to be, an attempt to gain
unauthorized access to a remote system or network, or to gain information that could later be used to assist in
gaining unauthorized access to a remote system or network, such as port scanning, dictionary attacks, Denial of
Service attacks, server/service hijacking, etc.
Engage in any of the foregoing activities using the service of another provider, but channeling such activities
through an account hosted by the Company or remailer, or using an account hosted by the Company as a mail drop for
responses to UCE, or hosting a website that is advertised via UCE that originates from a non-Company host
server-connected source, or otherwise requiring return transit through the Company's internet backbone.
Falsify or "spoof" user information provided to the Company or to other users of the Service, and for
handling all complaints and trouble reports made by Your own customers and authorized users.
Use the Hosting Services to offer mail services, mail forwarding capabilities, POP accounts or auto responders
other than for your own account(s).
Abuse or fraudulently use the Service in any way not specifically set forth above.