Feast with the beast from the east.

Acceptable Use Policy

Our Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what we expect of them while using the service. All users of our services: those who access some of our Services but do not have accounts, as well as those who pay a service fee to subscribe to the Services, must comply with this AUP and our TOS (Terms of Service).

Use of our Service constitutes acceptance and agreement to The AUP as well as The TOS (Terms of Service)

We support the uncensored flow of information and ideas over the Internet and do not actively monitor subscriber activity under normal circumstances. Similarly, we do not exercise editorial control over the content of any web site, e-mail transmission, newsgroups, or other material created or accessible over or through the services, except for certain proprietary Web sites. However, in accordance with our TOS (Terms of Service), we may remove any materials that, in our sole discretion, may be illegal, may subject us to liability, may be harmful to the server or other users, or which may violate this AUP. We may cooperate with legal authorities and/or third parties in the investigation of any suspected or alleged crime or civil wrongdoing. Your violation of this AUP may result in the suspension or immediate termination of either your account or the domains within your account as detailed in Section 3 WITHOUT PRIOR NOTICE.

This document is intended to provide a basic understand of our Acceptable Use Policy. The following are guidelines for the establishment and enforcement of the AUP:  

We intend to provide our customers access to everything the Internet has to offer. While we are firmly committed to the principles of free speech, certain activities that may be damaging to the resources of both us and the Internet and cannot be permitted under the guise of free speech. The resources of us and the Internet are limited, and abuse of these resources by one user has a negative impact on the entire community.

We do not routinely monitor the activity of accounts except for measurements of system utilization and the preparation of billing records. However, in our efforts to promote good citizenship within the Internet community, we will respond appropriately if we become aware of inappropriate use of our service.

You may not use your dedicated rack or and virtual site (this includes shared, reseller and enterprise hosting) to publish material, which we determine, at our sole discretion, to be unlawful, indecent or objectionable. For purposes of this policy, "material" refers to all forms of communications including narrative descriptions, graphics (including photographs, illustrations, images, drawings, and logos), executable programs, video recordings, and audio recordings.

If an account is used to violate the Acceptable Use Policy or our TOS, we reserve the right to terminate your service without notice. We prefer to advise customers of inappropriate behavior and any necessary corrective action, however, flagrant violations of the Acceptable Use Policy will result in immediate termination of service. Our failure to enforce this policy, for whatever reason, shall not be construed as a waiver of our right to do so at any time.

As a member of our network community, you must use your Internet access responsibly. If you have any questions regarding this policy, please contact us.

VIOLATIONS OF The ACCEPTABLE USE POLICY
The following constitute violations of this AUP:

 

1. Illegal use: Our services may not be used for illegal purposes, or in support of illegal activities. We reserve the right to cooperate with legal authorities and/or injured third parties in the investigation of any suspected crime or civil wrongdoing.

2. Harm to minors: Use of our service to harm, or attempt to harm, minors in any way, including, but not limited to child pornography.

3. Threats: Use of our service to transmit any material (by e-mail, uploading, posting or otherwise) that threatens or encourages bodily harm or destruction of property.

4. Harassment: Use of our service to transmit any material (by e-mail, uploading, posting or otherwise) that harasses another.

5. Fraudulent activity: Use of our service to make fraudulent offers to sell or buy products, items, or services, or to advance any type of financial scam such as "pyramid schemes," "phishing schemes," "ponzi schemes," and "chain letters."

6. Forgery or impersonation: Adding, removing or modifying identifying network header information in an effort to deceive or mislead is prohibited. Attempting to impersonate any person by using forged headers or other identifying information is prohibited. The use of anonymous remailers or nicknames does not constitute impersonation.

7. Unsolicited commercial e-mail / Unsolicited bulk e-mail (SPAM) Use of our service to transmit any unsolicited commercial or unsolicited bulk e-mail is expressly prohibited. Violations of this type will result in the immediate termination of the offending account.

IMPORTANT NOTICE:
Anyone hosting websites or services on their server that support spammers or cause any of our IP space to be listed in any of the various Spam Databases will have their server immediately removed from our network. The server will not be reconnected until such time that you agree to remove ANY and ALL traces of the offending material immediately upon reconnection and agree to allow us access to the server to confirm that all material has been COMPLETELY removed. Severe violations may result in immediate and permanent removal of the server from our network without notice to the customer. Any server guilty of a second violation WILL be immediately and permanently removed from our network without notice.

8. E-mail / News Bombing: Malicious intent to impede another person's use of electronic mail services or news will result in the immediate termination of the offending account.  

9. E-mail / Message Forging: Forging any message header, in part or whole, of any electronic transmission, originating or passing through our service is in violation of this AUP.

10. Usenet SPAMing: We have a zero tolerance policy for the use of its network for the posting of messages or commercial advertisements, which violate the rules, regulations, FAQ or charter of any newsgroups or mailing list. Commercial messages that are appropriate under the rules of a newsgroup or mailing list or that are solicited by the recipients are permitted.

11. Unauthorized access: Use of our service to access, or to attempt to access, the accounts of others, or to penetrate, or attempt to penetrate, security measures of ours or another entity's computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in the corruption or loss of data, is expressly prohibited and the offending account is subject to immediate termination.

12. Copyright or trademark infringement: Use of the service to transmit any material (by e-mail, uploading, posting or otherwise) that infringes any copyright, trademark, patent, trade secret or other proprietary rights of any third party, including, but not limited to, the unauthorized copying of copyrighted material, the digitization and distribution of photographs from magazines, books, or other copyrighted sources, and the unauthorized transmittal of copyrighted software.

13. Collection of personal data: Use of the service to collect, or attempt to collect, personal information about third parties without their knowledge or consent.

14. Network disruptions and unfriendly activity: Use of the service for any activity which affects the ability of other people or systems to use our Services or the Internet. This includes "denial of service" (DDOS) attacks against another network host or individual user. Interference with or disruption of other network users, services or equipment is prohibited. It is the Member's responsibility to ensure that their network is configured in a secure manner. A Subscriber may not, through action or inaction, allow others to use their network for illegal or inappropriate actions. A Subscriber may not permit their network, through action or inaction, to be configured in such a way that gives a third party the capability to use their network in an illegal or inappropriate manner. Unauthorized entry and/or use of another company and/or individual's computer system will result in immediate account termination. We will not tolerate any subscriber attempting to access the accounts of others, or penetrate security measures of other systems, whether or not the intrusion results in corruption or loss of data.

15. Fraud: Involves a knowing misrepresentation or misleading statement, writing or activity made with the intent that the person receiving it will act upon it.  

16. Infringement of Copyright, Patent, Trademark, Trade Secret, or Intellectual Property Right: Distribution and/or posting of copyrighted or the aforementioned infringements will not be tolerated.

17. Distribution of Viruses: Intentional distributions of software that attempts to and/or causes damage, harassment, or annoyance to persons, data, and/or computer systems are prohibited. Such an offense will result in the immediate termination of the offending account.

18. Inappropriate Use of Software: Use of software or any device that would facilitate a continued connection, i.e. pinging, while using our services could result in suspension of service.

19. Third Party Accountability: Our subscribers will be held responsible and accountable for any activity by third parties, using their account that violates guidelines created within the Acceptable Use Policy.

20. IRC networks: It is absolutely forbidden to host an IRC server that is part of or connected to another IRC network or server. Servers found to be connecting to or part of these networks in any way will be immediately removed from our network without notice. The account and/or server will not be reconnected to the network until such time that you agree to completely remove any and all traces of the IRC account/server, and agree to let us have access to your server to confirm that the content has been completely removed. Any server guilty of a second violation will result in immediate account termination.

21. Resellers : Resellers are responsible for enforcing the AUP and TOS to all of their clients. If their clients are found to be not following them, we will suspend the offending site and let the reseller know. If the reseller domain is found to be in violation, all domains within the resellers possession will be suspended.  Resellers are responsible for anything their clients do. If you have any questions or concerns in regards to what is allowed and not allowed please contact us. 

22. Streaming Video and Audio: Streaming Video and Audio is not permitted on our servers unless approval is received. You must zip the content to prevent this if you wish to have it hosted, and as everything else this content must be legal content and can not have someone else's copyright.

23. Egg Drop - Egg Drop Scripts are Not allowed, These are grounds for immediate account deletion without a refund.

24. Legal - If it is not legal in the United States of America, It is not permitted to reside on our server. If found, the account will be suspended.

25. Adult Material - Adult Material is not allowed, unless specified in your package you have purchased. Sites that contain adult material that is not on an adult approved server/package, will be suspended.

26. Chinese Forums - Chinese Forums are not allowed on our network. These sites require to much CPU usage. They almost require a dedicated server to run properly. If they are found on any server we will suspend them, and charge an admin fee if they are  the cause of a CPU overloaded. Admin charges are usually about $25 Per Hour.

27. ANIME - Anime Sites are not allowed on our network. If an Anime Site is found we will terminate the account. These sites are not allowed on the server because about 95% of them are illegal.

28. .EXE FILES - .exe files of any kind are not permitted on our servers via shared and reseller accounts.  This restriction is due to the fact that these files often harm the server in various ways depending upon the file. If you need to upload a .EXE file please use WINZIP or and WINRAR to insert your .EXE file.

29. Advance Fee Fraud - Spam to solicit an advance fee in return for monetary gain.

30. Cracking - Brute Force Access of Secured Network Devices.

31. Child Porn Email - Sending email containing or linking to Pornography Involving a Person Under Legal Age. ( See Title 18 USC Chapter 110 SEXUAL EXPLOITATION AND OTHER ABUSE OF CHILDREN § 2256 Definitions and § 2257 Record keeping requirements http://uscode.house.gov/download/pls/18C110.txt )

32. Child Porn Site - Hosting, Distributing, or Linking from a site to Pornography Involving a Person Under Legal Age. ( See Title 18 USC Chapter 110 SEXUAL EXPLOITATION AND OTHER ABUSE OF CHILDREN § 2256 Definitions and § 2257 Record keeping requirements http://uscode.house.gov/download/pls/18C110.txt )

33. Copyright - Hosting, Distributing, or Linking to Copyright Infringed Materials. ( See http://www.copyright.gov/title17/92chap5.html )

34. CPU Overload - Account using to much CPU resources, causing whole server to "lagg" or slow down.

35. DoS - Denial of Service Attack of Network Devices.

36. Embargo - Hosting or Linking to a Site Prohibited by Embargo. ( See http://eastsolid.com/index.php/legal/embargo )

37. Forgery - Faking an IP Address, Hostname, E-Mail Address, or Header.

38. Fraud Site - Hosting or Linking to a Website Intended to Deceive the Public.

39. Hacking - Circumventing Security Systems of Network Devices.

40. HYIP Site - Hosting or Linking to a Website of High Yield Investment Program, Ponzi Scheme, or Pyramid Scheme.

41. ID Theft - Hosting, Distributing, or Linking to Stolen Account Identification Information.

42. Infection - Hosting, Distributing, or Linking to Exploits, Trojans, Viruses, or Worms.

43. Invalid Hostname - A vain, obscene, or malicious host or domain name.

44. IRC Malicious - Malicious Use of Internet Relay Chat.

45. IRC Unregistered - Internet Relay Chat Server (IRC) NOT registered and approved by EastSolid - SolidNetwork, Inc.

46. Leechers - Proxy bases scripts downloading files from 3rd party to server.

47. Open Proxy - Hosting an Open Proxy or and Anonymizers Scripts/Software of Any Type. Proxy is also NOT registered and approved by EastSolid - SolidNetwork, Inc.

49. Open Relay - Hosting an Open Relay of Any Type.

50. Pharmaceuticals - Hosting, Distributing, or Linking to Pharmaceutical/Drug Sites.

51. Phishing - Identity Theft by Email Under False Pretense.

52. Proxy Hijack - Use of a Third Party Proxy Vulnerability or Trojan.

53. ROKSO - ROKSO Blacklisting at www.spamhaus.org of an IP. ( See http://www.spamhaus.org/rokso/index.lasso )

54. Scanning - Probing for Vulnerabilities of Network Devices.

55. Shells - Hosting Accounts PRIMARILY for Shell Access.

56. SORBS - SORBS Blacklisting at www.sorbs.net of an IP.

57. Spam Cannon - Sending High Volume Spam (UBE).

58. Spam Email - Unsolicited Bulk Email (UBE).

59. Spam List - Hosting, Distributing, or Linking to Email Address Lists for Spam.

60. Spam News - Posting the same message repeatedly in any newsgroup or to multiple newsgroups or posting an off-topic message to a newsgroup.

61. Spam Site - Hosting a Site Advertised by Spam Email or Spam Web.

62. Spam Ware - Hosting, Distributing, or Linking to Software Designed for Spamming.

63. Spam Web - Unsolicited, Bulk, or Forged Site Advertisement in Web Logs, Forums, or Guest books.

64. Spamhaus Medium - Spamhaus Blacklisting at www.spamhaus.org of an IP.

65. Terrorist Site High - Hosting or Linking to a Site Advocating Terrorism. ( See http://www.treas.gov/offices/enforcement/ofac/programs/terror/terror.pdf )

67. Tools - Hosting, Distributing, or Linking to Cracking, DoS, Forgery, Infection, or Scanning Software or Instruction.

68. Trademark - Hosting, Distributing, or Linking to Trade Mark Infringed Materials.

69. Upstream AUP Critical - Violation of AUP of the Upstream Provider for EastSolid - SolidNetwork, Inc.

70. Wares Low - Hosting, Distributing, or Linking to Cracks, Hacks, Key Generators, Serials, or Pirated Software.

71. Web Spider Medium - Use of a Web Spider, Crawler, or Bot for Unauthorized Connection to 3rd Party Web Servers.

Opt-In Mailing Lists

Mailing lists must be true opt-in which requires you to provide to the recipient either a confirmation email or a confirmation web page whereby the recipient must have replied with a confirmation email having a unique tracking number or must have clicked a hyperlink in the confirmation email having a unique tracking number maintained in your web server log file or must have clicked the hyperlink in the confirmation web page having a unique tracking number maintained in your web server log file thereby granting verifiable, deliberate, explicit, and revocable permission to be added to the specific opt-in email list at the specific site both of which must be hosted on the network of SolidNetwork, Inc and under your administrative control. You are required to provide the confirmation email reply with unique tracking number or the web server log file line having the unique tracking number as evidence that the recipient did, indeed, opt-in to the email list. You are also required to provide at least one simple method to opt out of the email list which must be honored immediately.

Security

You are responsible for any misuse of your account, even if the inappropriate activity was committed by a friend, family member, guest or employee. Therefore, you must take steps to ensure that others do not gain unauthorized access to your account. In addition, you may not use your account to breach security of another account or attempt to gain unauthorized access to another network or server.

  • Your password provides access to your account. It is your responsibility to keep your password secure.
  • Sharing your password and account access with unauthorized users is prohibited. You should take care to prevent others from using your account since you will be held responsible for such use.
  • Attempting to obtain another user's account password is strictly prohibited, and may result in termination of service.
  • You must adopt adequate security measures to prevent or minimize unauthorized use of your account.
  • You may not attempt to circumvent user authentication or security of any host, network or account. This includes, but is not limited to, accessing data not intended for you, logging into or making use of a server or account you are not expressly authorized to access, or probing the security of other networks. Use or distribution of tools designed for compromising security is prohibited. Examples of these tools include, but are not limited to, password guessing programs, cracking tools or network probing tools.
  • You may not attempt to interfere with service to any user, host or network ("denial of service attacks"). This includes, but is not limited to, "flooding" of networks, deliberate attempts to overload a service, and attempts to "crash" a host.
  • Users who violate systems or network security may incur criminal or civil liability. We will cooperate fully with investigations of violations of systems or network security at other sites, including cooperating with law enforcement authorities in the investigation of suspected criminal violations.

Network Performance  

Our accounts operate on shared resources. Excessive use or abuse of these shared network resources by one customer may have a negative impact on all other customers. Misuse of network resources in a manner which impairs network performance is prohibited by this policy and may result in termination of your account.

You are prohibited from excessive consumption of resources, including CPU time, memory, disk space and session time. You may not use resource-intensive programs which negatively impact other customers or the performances of our systems or networks. We reserve the right to terminate or limit such activities.

As always, EastSolid, Inc. strives for 100% uptime for all services.  All network systems are monitored 24/7 by in-house staff.  We make no guarantee on network uptime.  We are not responsible for losses that may occur due to the downtime of our services.

REPORTING VIOLATIONS OF The AUP

We request that anyone who believes that there is a violation of this AUP direct the information to us by email immediately.

If available, please provide the following information:  

  • The IP address used to commit the alleged violation
  • The date and time of the alleged violation, including the time zone or offset from GMT
  • Evidence of the alleged violation

E-mail with full header information provides all of the above, as do system log files. Other situations will require different methods of providing the above information. We may take any one or more of the following actions in response to complaints:  

  • Issue written or verbal warnings
  • Suspend the Member's newsgroup posting privileges
  • Suspend the Member's account
  • Terminate the Member's account
  • Bill the Member for administrative costs and/or reactivation charges
  • Bring legal action to enjoin violations and/or to collect damages, if any, cause by violations

REVISIONS TO THIS ACCEPTABLE USE POLICY  

We reserve the right to revise, amend, or modify this AUP, our TOS (Terms of Service) and our other policies and agreements at any time and in any manner.  Notice of any revision, amendment, or modification will be posted in accordance with our TOS (Terms of Service).


Copyright © 2004 - 2017 SolidNetwork, Inc. All rights reserved. Privacy Policy | Terms Of Use | Acceptance of Use Policy