Acceptable Use Policy (AUP)
All Mach-4 users, including our clients, the
customers of our reseller clients, and the general public who access our free
resources, must comply with this AUP and our TOS (Terms of Service). If you have any questions regarding this policy, please contact us at
Use of Mach-4 service constitutes acceptance of our AUP
and TOS (Terms of Service)
Our goals are to:
Mach-4 intends to provide its clients access to everything the Internet has to offer. While
we are firmly committed to the principles of free speech, certain activities that may be damaging to the resources of both
Mach-4 and the Internet and cannot be permitted under the guise of free speech. The resources of the
Mach-4 and the Internet are limited, and abuse of these resources by one user has a negative impact on the entire community.
- Ensure reliable service to our clients collectively
- Ensure security and privacy of our systems and network, as well as the networks and systems of others
- Comply with existing laws
- Maintain our reputation as a responsible service provider
- Encourage responsible use of the Internet
- Preserve the spirit of Internet resources as a conduit for free expression and exchange of information
- Preserve the privacy and security of individual users
We do not routinely monitor the activity of accounts except for measurements of
disk and bandwidth utilization for billing purposes. However, in our efforts to promote good citizenship within the Internet community, we will respond appropriately if we become aware of inappropriate use of our service.
You may not use your dedicated rack or virtual site to publish material, which
Mach-4 determines, at its sole discretion, to be unlawful, indecent or objectionable.
These include text, photographs, drawings, executable programs, video, and audio.
If a Mach-4 account is used to violate the AUP or TOS, we reserve the right to terminate your service without notice. We prefer to advise
clients of inappropriate behavior and any necessary corrective action. However,
repeated violations of the AUP will result in immediate termination of service. Our failure to enforce this policy, for whatever reason, shall not
constitute a waiver of our right to do so at any time.
- You must adopt adequate security measures to prevent unauthorized use of your account.
You will be held responsible for such use.
- You may not attempt to circumvent user authentication or security of any host, network or account. This includes, but is not limited to, accessing data not intended for you, logging into or making use of a server or account you are not expressly authorized to access, or probing the security of other networks. Use or distribution of tools designed for compromising security is prohibited. Examples of these tools include, but are not limited to, password guessing programs, cracking tools or network probing tools.
- You may not attempt to interfere with service to any user, host or network ("denial of service attacks"). This includes, but is not limited to, "flooding" of networks, deliberate attempts to overload a service, and attempts to "crash" a host.
- Users who violate systems or network security may incur criminal or civil liability.
Mach-4 will cooperate fully with investigations of violations of systems or network security at other sites, including cooperating with law enforcement authorities in the investigation of suspected criminal violations.
Mach-4 accounts operate on shared resources. Excessive use or abuse of these shared network resources by one
client may have a negative impact on all other clients. Misuse of network resources in a manner which impairs network performance is prohibited by this policy and may result in termination of your account.
You are prohibited from excessive consumption of resources, including CPU time, memory, disk space and session time. You may not use resource-intensive programs which negatively impact other
clients or the performances of Mach-4 systems or networks. Mach-4 reserves the right to terminate or limit such activities.
VIOLATIONS OF Mach-4 ACCEPTABLE USE POLICY
Illegal use: Mach-4's services may not be used for illegal purposes, or in support of illegal activities.
Mach-4 reserves the right to cooperate with legal authorities and/or injured third parties in the investigation of any suspected crime or civil wrongdoing.
Threats: Use of the Mach-4 service to transmit any material (by e-mail, uploading, posting or otherwise) that threatens or encourages bodily harm or destruction of property.
Harassment: Use of the Mach-4 service to transmit any material (by e-mail, uploading, posting or otherwise) that harasses another.
Fraudulent activity: Use of Mach-4 service to make fraudulent offers to sell or buy products, items, or
Forgery or impersonation: Adding, removing or modifying identifying network header information in an effort to deceive or mislead is prohibited. The use of anonymous remailers or nicknames does not constitute impersonation.
Unsolicited commercial e-mail / Unsolicited bulk e-mail (SPAM) Use of the
Mach-4 service to transmit any unsolicited commercial or unsolicited bulk e-mail is expressly prohibited. Violations of this type will result in the immediate termination of the offending
E-mail / News Bombing: Malicious intent to impede another person's use of electronic mail services or news will result in the immediate termination of the offending
Unauthorized access: Attempt to access, the accounts of others, or to penetrate, or attempt to penetrate, security measures of
Mach-4's or another entity's computer software or hardware,
regardless of if the intrusion results in losses, is expressly prohibited.
Copyright or trademark infringement: Transmitting any material that infringes any copyright, trademark, patent, trade secret or other proprietary rights of any third party, including, but not limited to, the unauthorized copying of copyrighted material, the digitization and distribution of photographs from magazines, books, or other copyrighted sources, and the unauthorized transmittal of copyrighted software.
Collection of personal data: Use of the Mach-4 service to collect, or attempt to collect, personal information about third parties without their knowledge or consent.
Network disruptions and unfriendly activity: Use of the
Mach-4 service for any activity which affects the ability of other people or systems to use
Mach-4 Services or the Internet. This includes "denial of service" (DOS) attacks against another network host or individual user. Interference with or disruption of other network users, services or equipment is prohibited. It is the Member's responsibility to ensure that their network is configured in a secure manner. A Subscriber may not, through action or inaction, allow others to use their network for illegal or inappropriate actions.
Distribution of Viruses: Intentional distributions of software that attempts to and/or causes damage, harassment, or annoyance to persons, data, and/or computer systems are prohibited.
Inappropriate Use of Software: Use of software or any device that would facilitate a continued connection, i.e.
Third Party Accountability: Mach-4 subscribers will be held responsible and accountable for any activity by third parties, using their account, that violates guidelines within the
Violation Of Mach-4 Virtual Accounts: Pornographic content or IRC servers
are prohibited on Virtual Server Accounts.
REPORTING VIOLATIONS OF Mach-4 AUP
Mach-4 requests that anyone who believes that there is a violation of this AUP direct the information to the Abuse Department at email@example.com.
If available, please provide the following information:
- The IP address used to commit the alleged violation
- The date and time of the alleged violation, including the time zone or offset from GMT
- Evidence of the alleged violation
REVISIONS TO AUP
Mach-4 reserves the right to revise, amend, or modify this
AUP, our TOS and other policies and agreements at any time and in any manner. Notice of any revision, amendment, or modification will be posted
Copyright 2002 Mach-4 Network