CyberStrategies, Inc. Acceptable Use Policy
Effective December 1, 2011
In General. The CyberStrategies, Inc. equipment and services must be used in a manner that is consistent with the intended purpose of the CyberStrategies, Inc. equipment and services and may be used only for lawful purposes. Clients shall not use the CyberStrategies, Inc. equipment and services in order to transmit, distribute or store material: (a) in violation of any applicable law or regulation, including export or encryption laws or regulations; (b) that may adversely affect the CyberStrategies, Inc. equipment and services or other CyberStrategies, Inc. clients; or (c) that may expose CyberStrategies, Inc. to criminal or civil liability. Clients are prohibited from facilitating the violation of any part of this AUP or another provider's AUP, including, but not limited to transmitting, distributing, or otherwise making available any product or service that violates this AUP or another provider's AUP.Inappropriate Content. Clients shall not use the CyberStrategies, Inc. equipment and services to transmit, distribute or store material that is inappropriate, as reasonably determined by CyberStrategies, Inc., or material that is obscene (including child pornography), defamatory, libelous, threatening, abusive, hateful, or excessively violent.
Intellectual Property. Material accessible through the CyberStrategies, Inc. equipment and services may be subject to protection under privacy, publicity, or other personal rights and Intellectual Property rights, including but not limited to, copyrights and laws protecting patents, trademarks, trade secrets or other proprietary information. Clients shall not use the CyberStrategies, Inc. equipment and services in any manner that would infringe, dilute, misappropriate, or otherwise violate any such rights. If you use a domain name in connection with any of the CyberStrategies, Inc. equipment and services, you must not use that domain name in violation of the trademark, service mark, or other rights of any third party.
Harmful Content. Clients shall not use the CyberStrategies, Inc. equipment and services to transmit, distribute or store material that may be harmful to or interfere with the CyberStrategies, Inc. equipment and services or any third party's networks, systems, services, or web sites. Such prohibited harmful content includes, but is not limited to, viruses, worms, or Trojan horses. Further, clients are responsible for any programs they provide, which execute on CyberStrategies, Inc. servers. Specifically they must not interfere with the general works of the servers or the information or processes of any other client. All applicable patches must be applied as soon as practical.
Fraudulent/Misleading Content. Clients shall not use the CyberStrategies, Inc. equipment and services to transmit or distribute material containing fraudulent offers for goods or services, or any advertising or promotional materials that contain false, deceptive, or misleading statements, claims, or representations.
Email and Unsolicited Messages. Clients shall not use the CyberStrategies, Inc. equipment and services to transmit unsolicited email messages, including, without limitation, unsolicited bulk email, where such emails could reasonably be expected to provoke complaints ("spam"). Further, Clients are prohibited from using the service of another provider to send spam to promote a site hosted on or connected to the CyberStrategies, Inc. equipment and services. In addition, Clients shall not use the CyberStrategies, Inc. equipment and services in order to (a) send email messages which are excessive and/or intended to harass or annoy others, (b) continue to send email messages to a recipient that has indicated that he/she does not wish to receive them, (c) send email with forged header information, (d) send malicious email, including, without limitation, "mail-bombing", (e) send or receive email messages in a manner that violates the use policies of any other Internet service provider, or (f) use an email box exclusively as a storage space for data.
Inappropriate Actions. Clients shall not use the CyberStrategies, Inc. equipment and services to conduct activities that may be harmful to or interfere with the CyberStrategies, Inc. equipment and services or any third party's networks, systems, services, or Web sites, including, but not limited to, flooding, mail bombing, or denial of service attacks. Clients are prohibited from violating or attempting to violate the security of the CyberStrategies, Inc. equipment and services or the computers, accounts, or networks of another party. Clients are also prohibited from any activity considered a precursor to attempted security violations, including, but not limited to, any form of scanning, probing, or other testing or information gathering activity. Inappropriate activity may result in civil or criminal liability. CyberStrateties, Inc. will investigate such activity, and may involve and cooperate with law enforcement authorities in prosecuting Clients involved in such activity.Responsibility for Content. CyberStrategies, Inc. takes no responsibility for any material created or accessible on or through CyberStrategies, Inc. equipment and services. CyberStrategies, Inc. is not obligated to monitor such material, but reserves the right to do so. CyberStrategies, Inc. will not exercise any editorial control over such material. In the event that CyberStrategies, Inc. becomes aware that any such material may violate this AUP and/or expose CyberStrategies, Inc. to civil or criminal liability, CyberStrategies, Inc. reserves the right to block access to such material and suspend or terminate any Client creating, storing or disseminating such material. CyberStrategies, Inc. further reserves the right to cooperate with legal authorities and third parties in the investigation of alleged wrongdoing, including disclosing the identity of the Client that CyberStrategies, Inc. deems responsible for the wrongdoing.
Violations of this AUP may be reported using the support form using the link at the bottom of this page.