Professional Documents
Culture Documents
Acceptable Use Policy - 2010 - 05 - 06
Acceptable Use Policy - 2010 - 05 - 06
The policies set forth in this Acceptable Use Policy (AUP) describe prohibited uses of the
Services(s) and are intended to maintain the integrity, reliability, security, and privacy of PLUG &
PLAYs customers. The examples described in this AUP are not exhaustive. PLUG & PLAY reserves
the right to modify this AUP at any time, without prior notice or consent, and by using the
Service(s), you agree to the latest version. Your Service(s) may be suspended or terminated for
violation of any of the terms of this AUP.
For purposes of this AUP, content "published or transmitted" via PLUG & PLAY's network or
equipment includes but is not limited to web content, emails, bulletin board postings, blogs, chats,
tweets, or any other type of posting or transmission that relies on the Internet.
The Following are Prohibited Activities:
Infringing upon the intellectual property rights of PLUG & PLAY or others, including but
not limited to copyrights, trademarks, patents or trade secrets;
Using your Service(s) or PLUG & PLAY's network to download, publish, distribute, or
otherwise copy or use any music, software, art, text, image, or any other work
protected by copyright law unless you have obtained the prior authorization from the
owner of the copyright to copy the work in that manner or you are otherwise
permitted by established copyright law to copy the work in that manner;
Any illegal activities, including advertising, transmitting or otherwise making available
gambling sites or services or disseminating, promoting or facilitating child
pornography;
Monitoring of data or traffic on a system or network without permission;
Attempting to probe, scan, penetrate or test the vulnerability of PLUG & PLAYs
systems or networks, or to breach PLUG & PLAY's security or authentication measures;
Using your Service(s) to distribute, send, or facilitate unsolicited mass e-mailings,
promotions, advertising, or solicitations (like Spam);
Unauthorized access to or use of data, systems or networks, including any attempt to
probe, scan or test the vulnerability of a system or network or to breach security or
authentication measures without the prior authorization of the owner of the system or
network;
Using your Service(s) to transmit, store, display or otherwise make available content
that is defamatory, obscene, abusive, invasive of privacy, or otherwise objectionable,
including content that constitutes child pornography, relates to bestiality, or depicts
non-consensual sex acts;
Any activities that may be harmful to PLUG & PLAYs users, including but not limited to
offering or disseminating fraudulent goods, services, schemes, or promotions (such as
ponzi and pyramid schemes, phishing or pharming), or engaging in other deceptive
practices;
Using your Service(s) to transmit, store, display or otherwise make available content or
other computer technology that may damage, interfere with, intercept, or
PLUG & PLAY
ACCEPTABLE USE POLICY
expropriate any system , program, or data, including viruses, Trojan horses, worms, time
bombs, or cancel bots.
Using any false, misleading, or deceptive TCP-IP packet header information in an
email or newsgroup posting;
Using any shared system provided by PLUG & PLAY in a way that interferes with the
normal operation of the shared system, or that consumes a disproportionate share of
the resources of the system;
Monitoring or crawling of a system that impairs or disrupts the system being monitored
or crawled.
Inundating a target with communications requests so the target either cannot
respond to legitimate traffic or responds so slowly that it becomes ineffective.
Intentionally interfering with the proper functioning of any system, including any
deliberate attempt to overload a system by mail bombing, news bombing, broadcast
attacks, or flooding techniques.
Operating network services like open proxies, open mail relays, or open recursive
domain name servers.
Using manual or electronic means to avoid any use limitations place on a system, such
as access and storage restrictions.
Any and all conduct that may result in retaliation against PLUG & PLAYs network,
website, employees, managers, officers or other agents.