ACCEPTABLE USE POLICY
ITECS ACCEPTABLE USE POLICY STATEMENT
This Acceptable Use Policy specifies the actions prohibited by ITECS Outsourcing LLC. (“ITECS”) to users of the Itecs hosting services. ITECS reserves the right to modify the Policy at any time, effective upon posting of the modified Policy to this URL: https://itecsonline.com/legal-aup
ILLEGAL USE
ITECS network may be used only for lawful purposes. Transmission, distribution or storage of any material in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property right used without proper authorization, and material that is obscene, defamatory, constitutes an illegal threat or violates export control laws.
SYSTEM AND NETWORK SECURITY
Violations of system or network security are prohibited and may result in criminal and civil liability. ITECS will investigate incidents involving such violations and may involve and will cooperate with law enforcement if a criminal violation is suspected. Examples of system or network security violations include, without limitation, the following:
- Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network.
- Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network.
- Interference with service to any user, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks.
- Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting.
- Using ITECS virtual or dedicated server for cryptocurrency mining.
- Using ITECS virtual or dedicated servers for email spam or like services.
- Using ITECS virtual or dedicated server for P2P networks such as torrent sharing or like services.
Sending unsolicited mail messages, including, without limitation, commercial advertising and informational announcements, is explicitly prohibited. A user shall not use another site’s mail server to relay mail without the express permission of the site.
USENET
Posting the same or similar message to one or more newsgroups (excessive cross-posting or multiple-posting, also known as “SPAM”) is explicitly prohibited. INDIRECT OR ATTEMPTED VIOLATIONS OF THE POLICY, AND ACTUAL OR ATTEMPTED VIOLATIONS BY A THIRD PARTY ON BEHALF OF A ITECS CUSTOMER OR A CUSTOMER’S END USER, SHALL BE CONSIDERED VIOLATIONS OF THE POLICY BY SUCH CUSTOMER OR END USER.
Partners