Home   About Us   Contact Us   Join Us   Links   License   Photos   Repeaters   Facebook   Disclaimer  
.

Net Abuse

Net Abuse is defined as a committed abuse against an Internet, Intranet, or Network based computer system or service. This document sets forth the site Network Abuse Policy and supersedes any other written or oral policy. The site may modify this Policy as reasonably required. The provisions of this Policy are intended as guidelines and are not meant to be in-depth. Any activity or conduct that violates law, regulations, or may harm site equipment, reputation, goodwill or member's relations, whether or not expressly mentioned in this Policy, is strictly prohibited. The site reserves the right at all times to revise its Net Abuse Policy and to take any appropriate actions to address violations of this Policy as outlined. 

System and Network Security

It is the goal of the site to secure, protect, and preserve the personal privacy and data stored on or over its' servers and networks. This "implied agreement" between the site and its' Members (customers) includes the forgoing:

1. Customers may not tamper with other customer accounts, commit unauthorized intrusion into any part of the site network or systems, or use any of the site equipment, files, accounts, or systems to intrude into any other network.

2. Customers may not circumvent security (or assist others to circumvent security), in order to access services for which that person accessing those services has not entered into a binding agreement with the site. This includes, and is not limited to, the scanning of the site computer systems or other networks with intent to breach and/or evaluate its' network security.

3. Customers may not use the site computer systems in a manner that overloads disk space, processors, or other system resources beyond those allowed by Customer's specific type of account. Customers may not make deliberate attempts to interfere with a service, overload of a service, or attempt to disable a host.

4. The use or attempted use of Internet services or systems without authorization is strictly prohibited. This includes, but is not limited to, password cracking, defrauding others into releasing their passwords, denial-of-service attacks (sending packets with an illegal packet size, UDP flooding, ping-flooding, half-open TCP connection flooding, etc.). Additionally, Customers may not use programs, scripts, commands, or otherwise send messages with the intent to interfere with any Customer's use of service.

Unlawful, Harmful or Offensive Communications

It is a violation of this policy for a Member or Customer to knowingly use the equipment or services of the site, to create, transmit, post or otherwise make available through the Internet any material that is unlawful, abusive or harmful to the site members or customers, goodwill or reputation. Communications prohibited by this Policy include, but are not limited to, materials that infringe upon copyright, trademark or other intellectual property, obscenity, indecency, child pornography, and any form of defamatory communications. The site utilizes public and private security means to ensure that any information or data transmitted to and from this system is secured. This computer system, including all related equipment, networks, and network devices (includes internet access) are provided for authorized use only. Members or Customers engaged in conducting business with the site constitutes authorized use. This computer system is monitored for all lawful purposes, including ensuring your access is authorized, for management of the system, to facilitate protection against unauthorized access, and to verify security procedures and operations. Monitoring includes, and is not limited to, active tracing to verify authorization to our systems. During monitoring, information may be examined, recorded, copied, and used for authorized purposes. All information, including personal information, placed on or sent over this system, may be monitored. Use of this system, authorized or unauthorized, constitutes consent to monitoring. Unauthorized use of this computer system will subject you to criminal prosecution. Evidence of unauthorized use collected during monitoring will be used for administrative, criminal, or other adverse actions. Use of this system constitutes consent to monitoring for all lawful purposes.

     


Website designed, Maintained and Copyright by Trube Technologies 2000-2017, all rights reserved. Please report any errors or problems by Opening a New Ticket