| |
Terms Of Use |
|
|
Unsolicited
Commercial E-mail & Unsolicited Bulk E-mail "SPAM"
Unsolicited e-mail, including commercial advertising and informational
announcements sent without the recipient either requesting such information
or otherwise explicitly expressing an interest in the material, is strictly
prohibited. SPAM activity that does not originate from a
Hosting SuperMarket Server but
attempts to direct recipients via a link or otherwise to a site on the
Hosting SuperMarket network is also a violation of this Policy.
Any bulk e-mail must
contain instructions for the recipient to request removal from the mailing
list. Links and addresses providing such a reply option must be kept
current. A user shall not use another Website’s mail server to relay mail
without the express permission of the Website. Since many Internet users use
a dial-up connection and pay for their online time, it costs them money to
receive e-mail.
It should be noted that a user has not expressed an interest by the mere act
of posting a news article in any particular newsgroup, or by visiting a
Website, unless they have made a specific request for information to be
e-mailed to them.
Unauthorized use of the
Hosting SuperMarket
Network in connection with the transmission
of unsolicited bulk e-mail ("SPAM"), including the transmission of
counterfeit e-mail, may result in civil and criminal penalties against the
sender, including those provided by the Computer Fraud and Abuse Act (18
U.S.C. § 1030 et seq.)
Hosting SuperMarket's response to a first spamming offense is to either terminate the
account immediately or advise and educate the Customer through an e-mail
warning and/or phone call, in
Hosting SuperMarket's sole discretion. A minimum $100 (One
Hundred U.S. Dollars) per hour spam handling fee will be charged to
Customer's account for all valid complaints, as determined by the
Hosting SuperMarket
Abuse Team.
Complaints regarding illegal use or system or Network security issues should
be sent via e-mail to
support@hostingsupermarket.com
Usenet
Posting the same or similar message to one or more newsgroups, off-topic
posting or multiple-posting, may be in violation of the newsgroup charter
and is also considered by
Hosting SuperMarket as internet abuse.
System and Network Security
Violations of system or network security are prohibited, and may result in
criminal and civil liability. Examples of system or network security
violations include, without limitation, the following
Unauthorized access to or use of data, systems or networks,
including any attempt to probe, scan or test the vulnerability of a system
or network or to breach security or authentication measures without express
authorization of the owner of the system or network.
Unauthorized monitoring of data or traffic on any network or
system without express authorization of the owner of the system or network.
Interference with Service to any user, host or network
including, without limitation, electronic junk mailing, flooding, or
deliberate attempts to overload a system and broadcast attacks, forging of
any TCP-IP packet header or any part of the header information in an e-mail
or a newsgroup posting.
Forged
Headers and/or Addresses
Forging headers or messages means sending e-mail so that its origin
appears to be another user or machine, or a nonexistent machine. It is also
forgery to configure the reply to address of the e-mail without the
authorization and permission of the Website. These practices are prohibited.
Mail Bombing
Mail bombing is the sending of multiple e-mails, or one large e-mail,
with the sole intent to overload a system or to seek revenge on a fellow
Internet user. It is wasteful of shared Internet resources and is of no
value to the recipient. This practice is prohibited.
Mailing List Subscriptions
List owners are encouraged to confirm all subscription requests from the
apparent subscriber before starting to send any list e-mail. List owners
must ensure that unsubscribe requests are handled from people who were
unaware that they had joined a mailing list. It is not acceptable to
subscribe people to a list merely because he or she has visited your Website
or used one of your products; the person must make an explicit request to be
listed. However some reports occur because people have genuinely forgotten
that he or she has made such a request.
If you run a mailing list,
Hosting SuperMarket
strongly suggests to keep copies of administrative requests (Web logs, or
e-mails including headers) so that you may demonstrate your subscription
requests were genuine.
|
back
next |
|