WSW3 Networks Acceptable Use Policy

WSW3 NETWORKS
ACCEPTABLE USE POLICY
Last update: August 28, 2017

 

All WSW3 Networks (hereinafter “WSW3 Networks”) customers are responsible for reviewing and complying with this Acceptable Use Policy. WSW3 Networks customers who provide services to their own users must affirmatively and contractually pass on the restrictions of this Acceptable Use Policy to their users, and take steps to ensure compliance by their users with this Acceptable Use Policy including, without limitation, termination of users who violate this policy. For this Policy, “Customer” shall be defined to include WSW3 Networks’ customers and also a customer’s users and account holders. This Policy is subject to change with notice by publication on this website; Customers are responsible for monitoring this website for changes. WSW3 Networks reserves the right to deny or terminate service to a Customer based on the results of a security/abuse confirmation process used by WSW3 Networks. Such confirmation process uses publicly available information to primarily examine Customer’s history in relation to its prior or current use of services similar to those being provided by WSW3 Networks and Customer’s relationship with previous providers.

 

The actions described below are defined by WSW3 Networks as “network abuse” and are strictly prohibited under this Policy. The examples named below are not exhaustive and are provided solely for guidance to Customers. If any Customer is unsure of whether a contemplated use or action is permitted, it is Customer’s responsibility to determine whether the use is permitted by contacting WSW3 Networks via electronic mail. The following activities are expressly prohibited, and WSW3 Networks expressly reserves the right, at its discretion, to pursue any remedies that it believes are warranted which may include, but is not limited to, the issuance of written or verbal warnings, filtering, blocking, suspending, or terminating accounts, billing Customer for administrative costs and/or reactivation charges or bringing legal action to enjoin violations and/or to collect damages, if any, caused by Customer violations. Such actions may be taken by WSW3 Networks without notice to Customer. In general, WSW3 Networks Customers may not use WSW3 Networks’ network, machines, or services in any manner which:

 

Violates any applicable law, regulation, treaty, or tariff, including but not limited to data privacy laws;

 

Violates the acceptable use policies of any networks, machines, or services which are accessed through WSW3 Networks’ network;

 

Infringes on the intellectual property rights of WSW3 Networks or others;

 

Violates the privacy of others;

 

Involves the resale of WSW3 Networks products or services, unless specifically documented in a separate written agreement or in the initial Customer contract with WSW3 Networks;

 

Involves deceptive online marketing practices including, without limitation, practices that violate the United States Federal Trade Commission’s guidelines for proper online marketing schemes;

Violates any specific instructions given by WSW3 Networks for reasons of health, safety or quality of any other telecommunications services provided by WSW3 Networks or by reason of the need for technical compatibility of equipment attached to the WSW3 Networks Network;

Materially affects the quality of any telecommunications services provided by WSW3 Networks; or

Otherwise, violates this Acceptable Use Policy.

Prohibited activities also include, but are not limited to, the following:

 

Unauthorized use (or attempted unauthorized use) or sabotage of any computers, machines or networks;

 

Attempting to interfere with or denying service to any user or host (e.g. denial of service attacks and/or DNS spoofing attacks);

 

Falsifying header information or user identification information;

 

Introduction of malicious programs into the network or Server (e.g. viruses, worms, Trojan horses, etc.);

 

Monitoring or scanning the networks of others without permission;

 

Attempted or successful security breaches or disruption of Internet communication including, but not limited to, accessing data of which Customer is not an intended recipient or logging into a Server or account that Customer is not expressly authorized to access;

 

Executing any form of network monitoring (e.g. packet sniffer) which will intercept data not intended for the Customer;

 

Attempting to circumvent Customer authentication or security of any host, network, or account (“cracking”);

 

Hijacking of IP space;

 

Using any program/script/command, or sending messages of any kind, designed to interfere with a third party customer terminal session, via any means, locally or via the Internet;

 

Sending unsolicited (“opt-out”) bulk email;

 

Maintaining an open mail relay and/or an open proxy;

 

Collecting email addresses from the Internet for the purpose of sending unsolicited bulk email or to provide collected addresses to others for that purpose;

 

Transmitting or receiving, uploading, using or reusing material which is abusive, indecent, defamatory, obscene or menacing, or in breach of copyright, confidence, privacy or similar third party rights;

 

Furnishing false or incorrect data on the signup form; or

Attempting to circumvent or alter the process or procedures to measure time, bandwidth utilization, or other methods to document “use” of WSW3 Networks’ products and services.

 

IP Transit, Dedicated Internet Access, and Colocation Customers

 

WSW3 Networks IP transit, dedicated Internet access and collocation Customers who provide services to their own users must affirmatively and contractually pass on the restrictions of this Acceptable Use Policy to its users, and take steps to ensure compliance by their users with this Acceptable Use Policy including, without limitation, termination of the user for violations of this policy. WSW3 Networks IP transit, dedicated Internet access and collocation Customers who provide services to their own users also must maintain valid postmaster and abuse addresses for their domains, comply with all applicable Internet RFCs, maintain appropriate reverse DNS information for all hosts receiving connectivity through WSW3 Networks’s network for which DNS responsibility has been delegated to the Customer, maintain accurate contact information with the InterNIC and any other appropriate domain, IP and AS registrars, take reasonable steps to prevent IP spoofing by their users and downstream customers, provide a 24/7 contact address to WSW3 Networks for dealing with security and abuse issues, and act promptly to ensure that users are in compliance with WSW3 Networks’ Acceptable Use Policy. Reasonable steps include, but are not limited to, using IP unicast reverse-path forwarding (“uRPF”) wherever appropriate and using IP address filtering wherever appropriate.

 

Email

 

Generally, the following actions are prohibited:

 

Using email to engage in harassment, whether through language, frequency, or size of messages. Continuing to send someone email after being asked to stop is considered harassment;

 

Using email to disrupt (e.g., email bombing, “flashing,” etc.) is prohibited;

Sending email with falsified header information;

Sending email with falsified or obscured information (e.g., encoded or “obfuscated URLs”) designed to hinder identification of the location of what is advertised;

Creating or forwarding chain letters, pyramid schemes, and hoaxes; and

Using the WSW3 Networks or Customer account to collect replies to messages sent from another provider which violate these rules or those of the other provider.

Bulk Email

 

Customers sending bulk email, using WSW3 Networks services, may only engage in such activity through the use of “closed-loop opt-in” lists. Such Customers who send bulk email through “closed-loop opt-in” lists must have a method of confirmation or verification of subscriptions and be able to show evidence of subscription for users who complain about receiving unsolicited email.

 

Sending unsolicited (“opt-out”) bulk email is prohibited and is grounds for termination of those services to Customers who engage in the practice. Sending “opt-out” bulk email from another provider advertising or implicating, directly or indirectly, the use of any service hosted or provided by WSW3 Networks, including without limitation, email, web, FTP, and DNS services, is prohibited. Customers may not advertise, distribute, or use software intended to facilitate sending “opt-out” email or harvest email addresses from the Internet for that purpose. In addition, Customers may not sell or distribute lists of harvested email addresses for the purpose of “opt-out” email. Customers who provide or make use of a service employing referral IDs will be considered responsible for unsolicited bulk email sent by members of the referral ID service that makes reference to services hosted by WSW3 Networks. Customers who engage in the practice of unsolicited bulk email, as set forth above, from WSW3 Networks accounts will be charged the cost of labor to respond to complaints, with a minimum charge of $200.

 

If a Customer has been listed on an industry recognized spam abuse list, such Customer will be deemed to be in violation of WSW3 Networks’ Acceptable Use Policy.

 

No illegal content, including pyramid/Ponzi schemes, infringing materials, or child pornography, is permitted;

 

The World Wide Web and Secure FTP

 

The web space and private secure FTP space included with web hosting accounts may not be resold or used for adult-oriented material. WSW3 Networks reserves the right to require that sites using web or FTP space which receives high amounts of traffic be moved to other servers. Web pages and FTP files may not contain any material, text, or images, whether hosted on WSW3 Networks servers or “transclusion” (images from another site displayed on the page) which violate or infringe any copyright, trademark, patent, statutory, common law, or proprietary rights of others. Web pages and FTP files may not contain links that initiate downloads of copyright-infringing or other illegal material.

 

Routing Protocols and Route Exchange

 

In the event WSW3 Networks identifies the Customer is sending excessive or unnecessary route publications, WSW3 Networks reserves the right to limit the number or routes that will be accepted.

 

Digital Millennium Copyright Act Policy

 

It is the policy of WSW3 Networks to respond expeditiously to claims of intellectual property infringement. WSW3 Networks will promptly process and investigate notices of alleged infringement and will take appropriate actions under the Digital Millennium Copyright Act (“DMCA”) and other applicable intellectual property laws. Upon receipt of notices complying or substantially complying with the DMCA, when it is under its control, WSW3 Networks will act expeditiously to remove or disable access to any material claimed to be infringing or claimed to be the subject of infringing activity and will act expeditiously to remove or disable access to any reference or link to material or activity that is claimed to be infringing. WSW3 Networks will terminate access for Customers who are repeat infringers. For our IP transit, dedicated Internet access, and collocation Customers, you must adopt and implement a Digital Millennium Copyright Act policy that reserves the necessary rights to remove or disable infringing material. If you believe that a copyrighted work has been copied and is accessible on our site in a way that constitutes copyright infringement, you may notify us by providing our registered copyright agent with the following information:

 

Electronic or physical signature of the person authorized to act on behalf of the owner of the copyright interest;

 

A description of the copyrighted work that you claim has been infringed;

A description of where the material that you claim is infringing is located on the site;

Your address, telephone number, and email address;

A statement by you that you have a good-faith belief that the disputed use is not authorized by the copyright owner, its agent, or the law; and

A statement by you, made under penalty of perjury, that the above information in your notice is accurate and that you are the copyright owner or authorized to act on the copyright owner’s behalf.

 

Notices of claimed infringement should be directed toabuse@wsw3.com. When WSW3 Networks removes or disables access to any material claimed to be infringing, WSW3 Networks may attempt to contact the Customer who has posted such material in order to give that Customer an opportunity to respond to the notification. Any and all counter notifications submitted by the Customer will be furnished to the complaining party. WSW3 Networks will give the complaining party an opportunity to seek judicial relief in accordance with the DMCA before WSW3 Networks replaces or restores access to any material as a result of any counter notification.

 

Servers and Proxies

 

Customers may not run on WSW3 Networks servers any program which makes a service or resource available to others, including but not limited to, port redirectors, proxy servers, chat servers, MUDs, file servers, and IRC bots. Customers may not run such programs on their own machines to make such services or resources available to others through a WSW3 Networks dial-up account; a dedicated access account is required for such purposes. Customers are responsible for the security of their own networks and machines. WSW3 Networks will assume neither responsibility nor accountability for failures or breach of Customer-imposed protective measures, whether implied or actual. The abuse that occurs as a result of a compromised Customer’s system or account may result in suspension of services or account access by WSW3 Networks, for example, if a system is abused after becoming infected with a worm or trojan horse program as a result of an Internet download or executing an email attachment. (See www.microsoft.com/security/articles/virus101.asp) Any programs, scripts, or processes which generate excessive server load on WSW3 Networks servers are prohibited, and WSW3 Networks reserves the right to terminate or suspend any such program, script, or process.

 

Storing Files

 

The storage of any program, utility or file on WSW3 Networks’ servers, the use of which would constitute a violation of this Acceptable Use Policy, is prohibited. For example, it is a violation to store hacker scripts, IRC bots, or spamming software on WSW3 Networks’ servers.

 

Determinations of Violations

 

WSW3 Networks has absolute discretion in determining whether a Customer’s activities or use of WSW3 Networks services are in violation of this WSW3 Networks Acceptable Use Policy.

 

Information Accuracy

 

While WSW3 Networks uses reasonable efforts to provide accurate and up-to-date information on this Website, WSW3 Networks makes no warranty or representation as to its accuracy. Moreover, information that may have been accurate at the time of posting may have changed and therefore may no longer be accurate or in effect. WSW3 Networks undertakes no duty to update such information.

 

How to Contact Us

 

To contact us with questions or comments regarding this Acceptable Use Policy, please email support@wsw3.com. To contact us with claimed violations of this Policy, please email abuse@wsw3.com.

  • 0 Users Found This Useful
Was this answer helpful?