***This message is automatically generated. Please do not respond to ***this message. The reply-to and from address have been purposely set ***to false addresses to prevent looping. Thank you for contacting the Advanced Internet Technologies, Inc. Network Abuse Center. We work diligently to enforce all the provisions of our Network's Acceptable Use Policy. When contacting our network about a problem or complaint, such as unsolicited email or inappropriate Usenet posting, please enclose sample messages, including full headers. For hacking, port scanning, denial-of-service attacks, and other illegal activities, please include appropriate logs. In such reports, please be sure to indicate what time zone any date stamps in your logs may be using. It is our policy to only take action against our customers. If we receive a complaint about the behavior of a customer of one of our customers or a reseller, we will forward the complaint to our customer for action. It is, however, a violation of our AUP for our customers to allow their customers to violate our AUP. Although, we are not able to reply to each message individually, all complaints are investigated and handled according to our network AUP, which is included below. If you are sending your message using anonymous or forged headers, please include contact information in the body of your message, in case we need to ask you for additional information. Otherwise, we may be forced to disregard your complaint. Thank you, Network Abuse Center Advanced Internet Technologies, Inc. NETWORK ABUSE POLICY This document sets forth Advanced Internet Technologies, Inc. (AIT, Inc.) Network Abuse Policy and supersedes any other written or oral policy. AIT, Inc. may modify this Policy from time to time as reasonably required. The provisions of this Policy are intended as guidelines and are not meant to be exhaustive. Any activity or conduct that violates law, regulations or the accepted norms of the Internet community or may harm AIT, Inc. facilities, reputation, goodwill or customer relations, whether or not expressly mentioned in this policy, is strictly prohibited. AIT, Inc. reserves the right at all times to revise its Network Abuse Policy and to take appropriate steps to address violations of that Policy as outlined in Section V herein. I. SYSTEM AND NETWORK SECURITY It is AIT, Inc. goal to: (1) protect network resources, (2) preserve the privacy and security of AIT, Inc. networks, (3) preserve the privacy and security of AIT, Inc. customers' networks, and (4) maximize the utility of AIT, Inc. and the Internet. 1.Customers may not: (i) tamper with other customer accounts, (ii) commit unauthorized intrusion into any part of AIT, Inc. network or systems; or (iii) use any of AIT, Inc. machines, files, accounts, or systems to intrude without authorization into any other network. 2.Customer may not use AIT, Inc. services not included in Customer's account, nor circumvent security (or assist others to circumvent security) in order to access services for which the person accessing those services has not entered into a binding agreement with AIT, Inc.. This includes, but is not limited to, the scanning of AIT, Inc. or other networks with intent to breach and/or evaluate security. 3.Customer may not use AIT, Inc. network or systems in a manner that encumbers disk space, processors or other system resources beyond those allowed by Customer's specific type of account. Customers may not make deliberate attempts to interfere with a service, overload a service, or attempt to disable a host. 4.The use or attempted use of Internet services or systems without authorization is strictly prohibited. This includes, but is not limited to, password cracking, defrauding others into releasing their passwords, denial-of-service attacks (sending packets with an illegal packet size, UDP flooding, ping-flooding, half-open TCP connection flooding, etc.). Additionally, Customers may not use programs, scripts, commands, or otherwise send messages with the intent to interfere with a Customer's terminal session. II.UNLAWFUL, HARMFUL OR OFFENSIVE COMMUNICATIONS It is a violation of this policy for Customer's knowingly to use the facilities or services of AIT, Inc. to create, transmit, post or otherwise make available through the Internet any material that is unlawful, abusive or harmful to AIT, Inc. facilities, customers, goodwill or reputation. Communications prohibited by this Policy include, but are not limited to materials that infringe copyright, trademark or other intellectual property; obscenity, indecency, or child pornography; and defamatory communications. Although it is not AIT, Inc. policy to monitor, censor or edit information made available through the use of its facilities, AIT, Inc. reserves the right to take appropriate action, as described in Section V herein, when it becomes aware of transmissions, postings or other communications that violate this Policy. III.E-MAIL 1. Customer may not send Unsolicited Commercial E-mail (UCE/UBE) to any other customer account that has not specifically requested such information or that causes complaints from the recipients of such unsolicited e-mail. AIT, Inc. services may not be used to send unsolicited advertising messages to other network Customers. Customer may not flood/spam newsgroups with commercial or non-commercial postings. 2. Customers may not continue to send commercial e-mail to a recipient if recipient has requested that Customer discontinue such communication. Any use of AIT, Inc. property for the composition, distribution, or collection of bulk e-mail, abusive e-mail, or any form of unsolicited, commercial e-mail is strictly prohibited. 3. AIT, Inc. prohibits the transmission of e-mail to non-consenting recipients that is harassing, libelous, defamatory, threatening, abusive or hateful. 4."Mail-bombing" (i.e. flooding a Customer site with large or numerous e-mail messages) is strictly prohibited. 5. Customers may not forge header information. 6. AIT, Inc. prohibits the use of Customer's account, or network connection, to collect replies of messages sent from any other provider that violate the rules of this Policy or those of the originating provider. 7. This Policy also applies to other means of Internet-based transmissions, including without limitation to Internet fax or Internet phone. IV.USENET 1. It is the responsibility of those persons who post messages to determine a newsgroup's etiquette. Customers that submit content to newsgroups should refrain from posting advertisements or other messages that are not expressly permitted by a newsgroup's charter of Frequently Asked Questions. Message posters are expected to submit messages relevant to the newsgroup's topic and agree not to submit the same message to large numbers of forums or newsgroups. 2. Customers are prohibited from forging header information and from posting chain letters of any type. 3. Customers may only post binary files to newsgroups designed for that purpose. 4. Customers may not cancel or supersede a posting of a message other than their own unless they serve as newsgroup moderators in the performance of their on-line responsibilities. 5. AIT, Inc. prohibits the use of Customer's account, or network connection, to collect replies of messages sent from any other provider that violate the rules of this Policy or those of the originating provider. V.ENFORCEMENT AIT, Inc. procedure is to deal with each net abuse case on an individual basis. Based on an investigation and a determination of the nature and severity of the abuse, AIT, Inc. may take immediate action, without prior notice, against any party or parties found in violation of this policy. Such action may include, but is not limited to, blocking of access to particular websites, newsgroups or other material found to violate the Network Abuse Policy, or termination of Customer's service with AIT, Inc.. Customer agrees that it will take appropriate action against persons who obtain Internet access or other Internet based services from Customer and who violate AIT, Inc. Network Abuse Policy. Customer further agrees that it will cooperate fully with AIT, Inc. in any actions taken by AIT, Inc. to enforce this Network Abuse Policy.
participants (1)
-
null@aitcom.net