FUSEMETRIX Acceptable Use Policy (AUP)
This AUP is a description of types of activities that are not allowed on our network. The Internet is still evolving, and the ways in which the Internet may be abused are also still evolving. Therefore, we may from time to time amend this AUP to further detail or describe reasonable restrictions on your use of our services. Your continued use of the services will be an acceptance of the AUP as it is changed from time to time
This AUP forms part of the terms of your Master Services Agreement with us and your service may be suspended or terminated for breach of this AUP in accordance with the Master Services Agreement. You are responsible for violations of this policy by you or anyone using your service, whether authorized by you or not.
If you have any questions, please contact us.
1. INTERNET ABUSE1.1. You may not use our network to engage in illegal, abusive, or irresponsible behaviour, including:
- 1.1.1. Unauthorized access to or use of data, services, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network;
- 1.1.2. monitoring data or traffic on any network or system without the authorization of the owner of the system or network;
- 1.1.3. Interference with service to any user, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks;
- 1.1.4. Use of an Internet account or computer without the owner's authorization, including, but not limited to Internet scanning (tricking other people into releasing their passwords), password robbery, security hole scanning, and port scanning;
- 1.1.5. Forging of any TCP-IP packet header or any part of the header information in an e-mail or a newsgroup posting; or
- 1.1.6. Any activity or conduct that is likely to result in retaliation against our network.
2. SECURITY2.1. You must take reasonable security precautions. 2.2. Passwords should consist of at least 8 mixed alpha and numeric characters with case variations. You should not permit a common word to be used as a password. You must protect the confidentiality of your password, and you should change your password regularly.
3. BULK COMMERCIAL E-MAIL3.1. You must obtain our advance approval for any bulk commercial e-mail, for which you must be able to demonstrate the following to our reasonable satisfaction:
- 3.1.1. Your intended recipients have given their consent to receive e-mail via some affirmative means, such as an opt-in procedure;
- 3.1.2. Your procedures for soliciting consent include reasonable means to ensure that the person giving consent is the owner of the e-mail address for which the consent is given;
- 3.1.3. You retain evidence of the recipient's consent in a form that may be promptly produced within 72 hours of receipt of recipient's or our requests to produce such evidence.
- 3.1.4. The body of the e-mail must include information about where the e-mail address was obtained, for example, .You opted in to receive this e-mail promotion from our Web site or from one of partner sites,. and information on how to request evidence of the consent, for example, .If you would like to learn more about how we received your email address please contact us at firstname.lastname@example.org.
- 3.1.5. You have procedures in place that allow a recipient to easily revoke their consent . such as a link in the body of the e-mail, or instructions to reply with the word .Remove. in the subject line and such evocations of consent are actioned within 72 hours;
- 3.1.6. You must post an email@example.com e-mail address on the first page of any Web site associated with the e-mail, you must register that address at abuse.net, and you must promptly respond to messages sent to that address;
- 3.1.8. You have the means to track anonymous complaints.
- 3.1.9. You may not obscure the source of your e-mail in any manner. Your e-mail must include the recipients e-mail address in the body of the message or in the .TO. line of the e-mail.
- 3.2. These policies apply to messages sent using your FuseMetrix service or network, or to messages sent from any network by you or any person on your behalf that directly or indirectly refer the recipient to a site hosted via your FuseMetrix service. Neither may you use third party e-mail services that do not practice similar procedures for all its customers.
- 3.3. We may test and monitor your compliance with these requirements, including requesting opt-in information from a random sample of your list at any time.
4. UNSOLICITED E-MAIL4.1. You may not send any unsolicited e-mail, whether commercial or non-commercial in nature, to any person who has indicated that they do not wish to receive it.
5. NEWSGROUP, CHAT FORUMS, OTHER NETWORKS5.1. You must comply with the rules and conventions for postings to any bulletin board, chat group or other forum in which you participate within the FuseMetrix system.
6. OFFENSIVE CONTENT6.1. You may not publish, display or transmit via our network and equipment any content that we reasonably believe:
- 6.1.1. constitutes child pornography or is otherwise obscene, sexually explicit or morally repugnant;
- 6.1.2. is excessively violent, incites violence, threatens violence, or contains harassing content or hate speech;
- 6.1.3. is unfair or deceptive under the consumer protection laws of any jurisdiction, including chain letters and pyramid schemes;
- 6.1.4. is defamatory or violates a person's privacy;
- 6.1.5. creates a risk to a person's safety or health, creates a risk to public safety or health, compromises national security, or interferes with a investigation by law enforcement;
- 6.1.6. improperly exposes trade secrets or other confidential or proprietary information of another person;