AIT Abuse Complaint

null at aitcom.net null at aitcom.net
Sun Dec 23 12:40:00 PST 2001


***This message is automatically generated.  Please do not respond to
***this message. The reply-to and from address have been purposely set
***to false addresses to prevent looping.

Thank you for contacting the Advanced Internet Technologies, Inc. Network
Abuse Center.  We work diligently to enforce all the provisions
of our Network's Acceptable Use Policy.

When contacting our network about a problem or complaint, such
as unsolicited email or inappropriate Usenet posting, please 
enclose sample messages, including full headers.  For hacking,
port scanning, denial-of-service attacks, and other illegal 
activities, please include appropriate logs.  In such reports, 
please be sure to indicate what time zone any date stamps in 
your logs may be using.

It is our policy to only take action against our customers.  If 
we receive a complaint about the behavior of a customer of one
of our customers or a reseller, we will forward the complaint
to our customer for action.  It is, however, a violation of our
AUP for our customers to allow their customers to violate our 
AUP.

Although, we are not able to reply to each message individually, 
all complaints are investigated and handled according to our 
network AUP, which is included below.  If you are sending your
message using anonymous or forged headers, please include contact
information in the body of your message, in case we need to ask 
you for additional information.  Otherwise, we may be forced to
disregard your complaint.

Thank you,
Network Abuse Center
Advanced Internet Technologies, Inc. 

NETWORK ABUSE POLICY 

This document sets forth Advanced Internet Technologies, Inc. (AIT, Inc.) Network Abuse Policy and supersedes any other written or oral policy. AIT, Inc. may modify this Policy from time to time as reasonably
required. The provisions of this Policy are intended as guidelines and are not meant to be exhaustive. Any activity or conduct that violates law, regulations or the accepted norms of the Internet
community or may harm AIT, Inc. facilities, reputation, goodwill or customer relations, whether or not expressly mentioned in this policy, is strictly prohibited. AIT, Inc. reserves the right at all
times to revise its Network Abuse Policy and to take appropriate steps to address violations of that Policy as outlined in Section V herein. 

I. SYSTEM AND NETWORK SECURITY 

It is AIT, Inc. goal to: (1) protect network resources, (2) preserve the privacy and security of AIT, Inc. networks, (3) preserve the privacy and security of AIT, Inc. customers' networks,
and (4) maximize the utility of AIT, Inc. and the Internet. 

1.Customers may not: (i) tamper with other customer accounts, (ii) commit unauthorized intrusion into any part of AIT, Inc. network or systems; or (iii) use any of AIT, Inc.
machines, files, accounts, or systems to intrude without authorization into any other network. 

2.Customer may not use AIT, Inc. services not included in Customer's account, nor circumvent security (or assist others to circumvent security) in order to access services for which
the person accessing those services has not entered into a binding agreement with AIT, Inc.. This includes, but is not limited to, the scanning of AIT, Inc. or other networks with
intent to breach and/or evaluate security. 

3.Customer may not use AIT, Inc. network or systems in a manner that encumbers disk space, processors or other system resources beyond those allowed by Customer's specific
type of account. Customers may not make deliberate attempts to interfere with a service, overload a service, or attempt to disable a host. 

4.The use or attempted use of Internet services or systems without authorization is strictly prohibited. This includes, but is not limited to, password cracking, defrauding others into
releasing their passwords, denial-of-service attacks (sending packets with an illegal packet size, UDP flooding, ping-flooding, half-open TCP connection flooding, etc.). Additionally,
Customers may not use programs, scripts, commands, or otherwise send messages with the intent to interfere with a Customer's terminal session. 

II.UNLAWFUL, HARMFUL OR OFFENSIVE COMMUNICATIONS 

It is a violation of this policy for Customer's knowingly to use the facilities or services of AIT, Inc. to
create, transmit, post or otherwise make available through the Internet any material that is unlawful, abusive or harmful to AIT, Inc. facilities, customers, goodwill or reputation.
Communications prohibited by this Policy include, but are not limited to materials that infringe copyright, trademark or other intellectual property; obscenity, indecency, or child
pornography; and defamatory communications. Although it is not AIT, Inc. policy to monitor, censor or edit information made available through the use of its facilities, AIT, Inc. reserves the
right to take appropriate action, as described in Section V herein, when it becomes aware of transmissions, postings or other communications that violate this Policy. 

III.E-MAIL 

1. Customer may not send Unsolicited Commercial E-mail (UCE/UBE) to any other customer account that has not specifically requested such information or that causes complaints from the
recipients of such unsolicited e-mail. AIT, Inc. services may not be used to send unsolicited advertising messages to other network Customers. Customer may not flood/spam
newsgroups with commercial or non-commercial postings. 

2. Customers may not continue to send commercial e-mail to a recipient if recipient has requested that Customer discontinue such communication. Any use of AIT, Inc. property for the
composition, distribution, or collection of bulk e-mail, abusive e-mail, or any form of unsolicited, commercial e-mail is strictly prohibited. 

3. AIT, Inc. prohibits the transmission of e-mail to non-consenting recipients that is harassing, libelous, defamatory, threatening, abusive or hateful. 

4."Mail-bombing" (i.e. flooding a Customer site with large or numerous e-mail messages) is strictly prohibited. 

5. Customers may not forge header information. 

6. AIT, Inc. prohibits the use of Customer's account, or network connection, to collect replies of messages sent from any other provider that violate the rules of this Policy or those of
the originating provider. 

7. This Policy also applies to other means of Internet-based transmissions, including without limitation to Internet fax or Internet phone. 

IV.USENET 

1. It is the responsibility of those persons who post messages to determine a newsgroup's etiquette. Customers that submit content to newsgroups should refrain from posting
advertisements or other messages that are not expressly permitted by a newsgroup's charter of Frequently Asked Questions. Message posters are expected to submit messages
relevant to the newsgroup's topic and agree not to submit the same message to large numbers of forums or newsgroups. 

2. Customers are prohibited from forging header information and from posting chain letters of any type. 

3. Customers may only post binary files to newsgroups designed for that purpose. 

4. Customers may not cancel or supersede a posting of a message other than their own unless they serve as newsgroup moderators in the performance of their on-line responsibilities.

5. AIT, Inc. prohibits the use of Customer's account, or network connection, to collect replies of messages sent from any other provider that violate the rules of this Policy or those of
the originating provider. 


V.ENFORCEMENT 

AIT, Inc. procedure is to deal with each net abuse case on an individual basis. Based on an investigation and a determination of the nature and severity of the abuse, AIT, Inc. may take
immediate action, without prior notice, against any party or parties found in violation of this policy. Such action may include, but is not limited to, blocking of access to particular websites,
newsgroups or other material found to violate the Network Abuse Policy, or termination of Customer's service with AIT, Inc.. 

Customer agrees that it will take appropriate action against persons who obtain Internet access or other Internet based services from Customer and who violate AIT, Inc. Network Abuse
Policy. Customer further agrees that it will cooperate fully with AIT, Inc. in any actions taken by AIT, Inc. to enforce this Network Abuse Policy.





More information about the cypherpunks-legacy mailing list