Acceptable Use Policy
This is Impulse Advanced Communications, LLC (“The Company”) Acceptable Use Policy. This document contains information about what type of behavior is and is not allowed on The Company Network. If you have any questions, please contact us
From time to time The Company may impose reasonable rules and regulations regarding the use of its services. Such rules and regulations are called Acceptable Use Policies (AUPs) and are posted on the Internet at http://www.impulse.net/customer-support/terms-conditions/acceptable-use-policy/. The AUPs are not exhaustive and The Company reserves the right to modify the AUPs at any time, effective upon either the posting of the modified AUPs to http://www.impulse.net/customer-support/terms-conditions/acceptable-use-policy/ or notification of the modified AUPs. By registering for and using the services, and thereby accepting the terms and conditions of the Master Services Agreement or its equivalent, you agree to abide by the AUPs as modified from time to time. Any violation of the AUPs may result in the suspension or termination of your account or such other action as The Company deems appropriate. An unlisted activity may also be a violation of the AUPs if it is illegal, irresponsible, or disruptive use of the Internet. No credits will be issued for any interruption in service resulting from policy violations.
VIOLATION OF ANY AUP IS STRICTLY PROHIBITED AND MAY RESULT IN THE IMMEDIATE TERMINATION OR SUSPENSION OF THE SERVICES YOU RECEIVE FROM The Company. YOU SHALL REMAIN SOLELY LIABLE AND RESPONSIBLE FOR YOUR USE OF THE SERVICES AND ANY AND ALL CONTENT THAT YOU DISPLAY, UPLOAD, DOWNLOAD OR TRANSMIT THROUGH THE USE OF THE SERVICES. “CONTENT” INCLUDES, WITHOUT LIMITATION, YOUR E-MAIL, WEB PAGES, PERSONAL HOME PAGES, AND DOMAIN NAMES. IT IS The Company’s POLICY TO TERMINATE REPEAT OFFENDERS. The Company RESERVES THE RIGHT TO REFUSE SERVICE TO ANYONE AT ANY TIME.
CUSTOMER SECURITY RESPONSIBILITY
The customer is solely responsible for any breaches of security affecting servers under customer control. If a customer’s server is involved in an attack on another server or system, it will be shut down and an immediate investigation will be launched to determine the cause/source of the attack. In such event, the customer is responsible for the cost to rectify any damage done to the customer’s server and any other requirement affected by the security breach. The labor used to rectify any such damage is categorized as emergency security breach recovery and is currently charged at $250 USD per hour. Enquiries regarding security matters may be directed to email@example.com
SYSTEM AND NETWORK SECURITY
Violations of system or network security are prohibited, and may result in criminal and civil liability. The Company may investigate incidents involving such violations and may involve and will cooperate with law enforcement if a criminal violation is suspected. Examples of system or network security violations include, without limitation, the following:
Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network. Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network. Interference with service to any user, host or network including, without limitation, mailbombing, flooding, deliberate attempts to overload a system and broadcast attacks. Forging of any TCP-IP packet header or any part of the header information in an e-mail or a newsgroup posting. Violators of the policy are responsible, without limitations, for the cost of labor to clean up and correct any damage done to the operation of the network and business operations supported by the network, and to respond to complaints incurred by The Company. Such labor is categorized as emergency security breach recovery and is currently charged at $250 USD per hour required. Enquiries regarding security matters may be directed to
firstname.lastname@example.org The Company is concerned with the privacy of online communications and web sites. In general, the Internet is neither more nor less secure than other means of communication, including mail, facsimile, and voice telephone service, all of which can be intercepted and otherwise compromised. As a matter of prudence, however, The Company urges its customers to assume that all of their online communications are insecure. The Company cannot take responsibility for the security of information transmitted over The Company’s facilities.
The customer is responsible for protecting customer’s password and for any authorized or unauthorized use made of customer’s password. The customer will not use or permit anyone to use The Company’s service to guess passwords or to access other systems or networks without authorization. The Company will fully cooperate with law enforcement authorities in the detection and prosecution of illegal activity.
The customer is expected to be familiar with and to practice good Internet etiquette (Netiquette). The customer will comply with the rules appropriate to any network to which The Company may provide access. The customer should not post, transmit, or permit Internet access to information the customer desires to keep confidential. The customer is not permitted to post any material that is illegal, libelous, tortious, indecently depicts children or is likely to result in retaliation against The Company by offended users. The Company reserves the right to refuse or terminate service at any time for violation of this section. This includes advertising services or sites via IRC or USENET in clear violation of the policies of the IRC channel or USENET group.
COPYRIGHT INFRINGEMENT – SOFTWARE PIRACY POLICY
The Company network may only be used for lawful purposes. Transmission, distribution, or storage of any information, data or material in violation of United States or state regulation or law, or by the common law, is prohibited. This includes, but is not limited to, material protected by copyright, trademark, trade secret, or other intellectual property rights.
Making unauthorized copies of software is a violation of the law, no matter how many copies you are making. If you copy, distribute or install the software in ways that the license does not allow, you are violating federal copyright law. If caught with pirated software, you or your company may be liable under both civil and criminal law, and you may be fined up to $250,000 and/or receive up to 5 years in jail.
In compliance with the Digital Millennium Copyright Act (the “DMCA”), please send DMCA notifications of claimed copyright infringements to:
Department of Security Operations Impulse Advanced Communications 5383 Hollister Avenue, Suite 240 Santa Barbara, CA 93111
or by e-mail to email@example.com
The Company will cooperate fully with any civil and/or criminal litigation arising from the violation of this policy.
Customers have a responsibility to use The Company network responsibly. This includes respecting the other customers of The Company. The Company reserves the right to suspend and or cancel service with any Customer who uses The Company network in such a way that adversely affects other The Company customers. This includes but is not limited to:
- Attacking or attempting to gain unauthorized access to servers and services that belong to The Company or its customers (i.e. computer hacking), and/or
- Participating in behavior, which result in reprisals that adversely effect The Company network or other customers’ access to The Company network.
The Company will react strongly to any use or attempted use of an Internet account or computer without the owner’s authorization. Such attempts include, but are not limited to, “Internet Scanning” (tricking other people into releasing their passwords), password robbery, security hole scanning, port scanning, etc. Any unauthorized use of accounts or computers by a The Company customer, whether or not the attacked account or computer belongs to The Company, will result in severe action taken against the attacker. Possible actions include warnings, account suspension or cancellation, and civil or criminal legal action, depending on the seriousness of the attack. Any attempt to undermine or cause harm to a server, or customer, of The Company is strictly prohibited.
Violations of this policy may be reported directly to the FBI’s Infrastructure Protection & Computer Intrusion Squad at http://www.nipc.gov/sites/ipcis/ipcis.htm. The Company will cooperate fully with any civil and/or criminal litigation arising from the violation of this policy.
All services may be used for lawful purposes only. Transmission, storage, or presentation of any information, data or material in violation of any applicable law, regulation, or AUP is prohibited. This includes, but is not limited to: copyrighted material or material protected by trade secret and other statute or dissemination of harmful or fraudulent content.
Using any The Company service or product for the purpose of participating in any activity dealing with subject matters that are prohibited under applicable law is prohibited.
Any conduct that constitutes harassment, fraud, stalking, abuse, or a violation of federal export restriction in connection with use of The Company services or products is prohibited. Using The Company network to solicit the performance of any illegal activity is also prohibited, even if the activity itself is not performed. In addition, knowingly receiving or downloading a file that cannot be legally distributed, even without the act of distribution, is prohibited.
Servers hosted within The Company network are open to the public. You are solely responsible for your usage of The Company network and servers and any statement you make on servers hosted within The Company network may be deemed “publication” of the information entered. Acknowledging the foregoing, you specifically agree not to use our service in any manner that is illegal or libelous.
CHILD PORNOGRAPHY ON THE INTERNET
The Company will cooperate fully with any criminal investigation into a Customer’s violation of the Child Protection Act of 1984 concerning child pornography. Customers are ultimately responsible for the actions of their clients over The Company network, and will be liable for illegal material posted by their clients.
According to the Child Protection Act, child pornography includes photographs, films, video or any other type of visual presentation that shows a person who is or is depicted as being under the age of eighteen years and is engaged in or is depicted as engaged in explicit sexual activity, or the dominant characteristic of which is the depiction, for a sexual purpose, of a sexual organ or the anal region of a person under the age of eighteen years or any written material or visual representation that advocates or counsels sexual activity with a person under the age of eighteen years.
Violations of the Child Protection Act may be reported to the U.S. Customs Agency at 1-800-BEALERT
UNSOLICITED COMMERCIAL EMAIL (UCE) / UNSOLICITED BULK EMAIL (UBE)
Unsolicited commercial email (UCE) is defined by The Company as any electronic communication (e-mail, ICQ, IRC, Instant Messenger, etc.) sent for purposes of distributing commercial information of any kind, soliciting the purchase or sale of products or services or soliciting any transfer of funds to a recipient who has not agreed to receive such communication.
Unsolicited bulk e-mail (UBE) is defined by The Company as any electronic communication (e-mail, ICQ, IRC, Instant Messenger, etc.) to multiple recipients who have not agreed to receive such communication.
Use of The Company network, servers or services to transmit any unsolicited commercial or unsolicited bulk-e-mail is expressly prohibited, as is hosting web sites or services on a server, which are advertised in any UCE/UBE. The Company also prohibits the sending of any fraudulent, malicious, harassing, false or misleading electronic communications, including, without limitation, chain letters, pyramid schemes, or e-mails with forged headers. Posting off-topic advertisements to Usenet discussion groups, ICQ, Instant Messenger, etc., is also expressly prohibited. Additionally, The Company customers are expressly prohibited from sending any UCE/UBE from our network or any email from another network that in any way references a document, image, or Web site that resides on The Company network or in one of our data centers. Violations of this type may result in the termination of the offending The Company account. Our customers are ultimately responsible for any violations of the AUP by their clients, and any violation of the AUP by a client of a The Company customer shall be deemed a violation of the AUP by such The Company customer.
Customers whose actions directly or indirectly result in The Company IP space being listed in any of the various abuse databases may be subject to having the offending domain(s), server(s), or user(s) immediately removed from our network. In addition, if The Company in its sole discretion determines that a customer is in violation of our AUP, The Company may, at its sole discretion, restrict, suspend or terminate a customer’s account. The Company will, in most cases, attempt to contact a customer prior to suspension or termination of a server(s), but cannot guarantee prior notification. Any server suspended or terminated for AUP violations will be reconnected only after the customer agrees to cease all activities that violate The Company AUP and pays all applicable reconnect fees and related charges. Any server suspended a second time for AUP violations WILL be immediately and permanently removed from our network.
Customers that The Company determines in its sole discretion to be in violation of The Company AUP may be subject to additional fees or fines including, without limitation, any applicable reconnect fees.
Violation of The Company’s UCE/UBE policy may be reported to firstname.lastname@example.org.
GUIDELINES FOR PERMISSION-BASED EMAIL
While The Company prohibits the use of its systems or network to send unsolicited email (UCE/UBE) as described above, customers may send permission-based email marketing, subject to the guidelines provided herein. Permission-based marketing is defined as electronic marketing that an end user agrees to receive. This is often referred to as ‘opt-in’ electronic marketing. All recipient information for such marketing conducted by The Company customers must be documented and cataloged by the customer. This information is to include date, time, originating IP and the location from which the email address or other recipient information was obtained. Additionally, a customer must at a minimum comply with the following guidelines, and any additional guidelines established by The Company from time to time in its sole discretion, to engage in permission-based email marketing without violating the AUP:
- All commercial or bulk email originating from a The Company customer on The Company network must have a working unsubscribe link. The customer must honor all requests to unsubscribe within 72 hours. Additionally, there must be text in the email stating that while all requests to unsubscribe are honored, it may take up to 72 hours to process.
- All commercial or bulk email originating from a The Company customer on The Company network must clearly list the email address to which the email was originally sent (the intended recipient’s email address) in the body of the message OR in the ‘TO:’ line of the email.
- All The Company customers sending commercial or bulk email must have a working email@example.com address from EVERY domain associated with the email campaign. Customers must regularly answer any messages sent to the abuse@ address.
- All The Company customers sending commercial or bulk email must register the abuse@ address for every domain associated with commercial email they send at abuse.net.
- All commercial or bulk email sent must include information about where the email address was obtained in the body of the email. For example: “You opted-in to receive this email promotion from our web site or from one of our partner sites.”
- All The Company customers sending commercial or bulk email must answer all complainants’ requests for details regarding where the complainant “opted-in” to receive electronic marketing within 72 hours. This information must include the date, time, originating IP and the location from which the email address or other recipient information was obtained. Instructions on how to get this information must be stated clearly in the body of the email. For example, a statement similar to the following must be present in the body of the email: If you would like to learn more about how we received your email address, please contact us firstname.lastname@example.org. Requests for “opt-in” information must be responded to within 72 hours.
- All The Company customers sending commercial or bulk email must be able to track and identify anonymous complainants. There are several software packages (such as RoboMail) that can help accomplish this.
- If a The Company customer is using an affiliate program to send commercial or bulk email through The Company network and the affiliate program becomes subject to repeated abuse by users, the customer must discontinue use of the affiliate program or be subject to immediate suspension or cancellation.
- All customers of The Company are required to have up-to-date and valid contact information on file with their registrar for any domain hosted on The Company network. Disclaimer
- The Company reserves the right to test portions of any customer’s email list in response to complaints and request opt-in information from a random sample of that list at any time.
- The Company reserves the right to determine in its sole discretion the validity of any customer’s email list. Any list The Company determines in its sole discretion to be in violation of this AUP must be removed immediately or the customer will be subject to immediate suspension or termination. Repeated violations will result in permanent suspension.
- The Company reserves the right to test and otherwise monitor customer’s compliance with the above guidelines and requirements at any time during the customer’s term of service at The Company.
- The Company determines in its sole discretion that the customer is not in strict compliance with the guidelines for permission-based e-mail marketing, then The Company may immediately suspend or terminate the customer’s service.
IP ADDRESS OVERLAP
The Company administers the network on which customer servers reside. The customer cannot use IP addresses, which were not assigned to them by The Company staff. Any server found using IPs that were not officially assigned will be suspended from network access until such time as the IP addresses overlap can be corrected.
The Company allows the use of IRC inside The Company network as long as the use of IRC on a The Company server does not violate any of the other terms of this AUP. As a policy, The Company will not provide vanity IRC reverse DNS records. To enforce this policy The Company does not turn the reverse address of IPs over to the customer. Authority over this information remains with The Company.
The customer understands that the customer is responsible for paying for any network resources that are used to connect the customer’s server to the Internet. The customer may request that the customer’s server be disconnected from the Internet, but the customer will still be responsible for paying for any network resources used up to the point of suspension or cancellation. Unless otherwise stated in the Master Services Agreement or its equivalent, all customer cancellations require a minimum of 60-day notice.
If The Company in its sole discretion determines that a customer’s server has become the source or target of any violation concerning The Company Acceptable Use Policy (AUP), The Company reserves the right to suspend network access to that server. While The Company will attempt to contact the customer before suspending network access to the customer’s server(s), prior notification to the customer is not assured. In certain cases, The Company will contact law enforcement and other agencies regarding these activities. Customers are responsible for all charges, as well as any fees relating to the investigation, suspension, administration and handling of their servers before, during and after the suspension period.
The Company reserves the right to cancel service at any time. If inappropriate activity is detected, all accounts of the customer in question will be deactivated until an investigation is complete. Prior notification to the Customer is not assured. In extreme cases, law enforcement will be contacted regarding the activity. All fees paid in advance of cancellation will not be prorated and paid by The Company unless The Company institutes its right of cancellation. Any violation of policies, which results in extra costs will be billed to the customer (i.e. transfer, space etc.). Customer elected cancellations must be in writing either by mail, fax or email email@example.com) and provide a minimum 60 day notice.
The Company wishes to emphasize that in signing the Master Services Agreement or its equivalent, customer indemnifies The Company for any violation of the Master Services Agreement or its equivalent, law or AUP that results in loss to The Company or the bringing of any claim against The Company by any third-party. This means that if The Company is sued because of a customer’s or a customer of a customer’s activity, the customer will pay any damages awarded against The Company, plus costs and reasonable attorney’s fees.
DISCLAIMER OF RESPONSIBILITY
The Company is under no duty to look at each customer’s or user’s activities to determine if a violation of the AUPs has occurred, nor do we assume any responsibility through our AUPs to monitor or police Internet-related activities. The Company disclaims any responsibility for any such inappropriate use and any liability to any person or party for any other person’s or party’s violation of this policy.
All Sub-Networks, resellers and managed servers of The Company must adhere to the above policies. Failure to follow any term or condition will be grounds for immediate Cancellation.
INDIRECT OR ATTEMPTED VIOLATIONS OF THE AUPs AND ACTUAL OR ATTEMPTED VIOLATIONS BY A THIRD PARTY ON YOUR BEHALF SHALL BE CONSIDERED VIOLATIONS OF THESE AUPs BY YOU.