Cloud Computing Acceptable Use Policy

Cloud Computing Acceptable Use Policy
Updated: January 14, 2015
Version: 1.2

 

Customer and all Users of the Services must comply with this Acceptable Use Policy.  The direct or indirect use of Company’s services constitutes acceptance and agreement to this Acceptable Use Policy.

Though Company does not monitor Customer Data, Company may identify and notify Customer of any Customer Data that, in Company’s reasonable discretion, may subject Company to liability or which may violate this Acceptable Use Policy.  Company will cooperate with legal authorities and/or third parties in the investigation of any suspected or alleged claim, crime or civil wrongdoing resulting from Customer Data or other acts or omissions of Customer or Users.

Customer’s violation of this Acceptable Use Policy may result in the suspension of Services or removal of Customer Data by Company or by entities other than Company WITHOUT PRIOR NOTICE.  If Services are suspended or terminated due to violations of this Acceptable Use Policy, Service Credits will not be provided for the suspended or terminated service.

Wherever commercially practicable, any suspension or termination of all or part of the Services as a result of violation of this Acceptable Use Policy will be treated as a curable breach of Customer’s Agreement and Company will use reasonable commercial efforts to work with the Customer to resolve the issues causing this breach and will restore Services as quickly as possible thereafter. Any extraordinary expenses incurred by Company in restoring services will be borne by Customer.

1.    VIOLATIONS OF COMPANY’S ACCEPTABLE USE POLICY
Customer may not use its shared, dedicated, co-hosted or other Company provisioned Service to publish or store Customer Data which is unlawful.  For purposes of this Acceptable Use Policy, “material” refers to all forms of communications including narrative descriptions, graphics (including photographs, illustrations, images, drawings, and logos), executable programs, video recordings, and audio recordings.

Use of the Services in any way (e.g., to upload, store, transmit, distribute or publish by any means) for any of the following are strictly prohibited:

1.1     Illegal activities, or use of Services to directly or indirectly support illegal activities;

1.2     Threats or harassment, including encouragement to cause bodily harm or destruction of property;

1.3     Profanity, bigotry, racism or other materials offensive to the general public;

1.4     Pornography of any kind;

1.5     Fraudulent activities of any kind;

1.6     Forgery or impersonation, including removal or modification of network or message headers;

1.7     Unsolicited emails (spam) of any kind, including Usenet or message board spam, in contravention of any applicable anti-spam laws;

1.8     Unauthorized access, including use of the Services to access, or to attempt to access the accounts of others, or to penetrate or attempt to penetrate, security measures of Company or another entity’s computer software or hardware, electronic communications system or telecommunications system;

1.9     Use of the Services or network resources in a manner which impairs network performance, damages, disables, overburdens, or impairs the Services, or interfere with any other party’s use and enjoyment of the Services;

1.10  Infringing materials;

1.11  Collection of personally identifiable information in violation of applicable privacy laws;

1.12  Intentional interference or disruptive activity;

1.13  Attempts to circumvent or violate the security of other accounts or equipment of any kind;

1.14  Use or distribution of tools designed for compromising security;

1.15  Viruses or any other types of malware or malicious code;

1.16  Peer to peer or file sharing software to permit unauthorized sharing, copying or distribution of copyrighted material;

1.17  Any other content or activities that are prohibited at law or in equity, or that may be notified by Company to Customer from time to time in accordance with Section 4 of this Appendix C as being harmful or potentially harmful to the Services or contrary to this Acceptable Use Policy.

Customer shall be responsible and accountable for any activities by its Users that violate this Acceptable Use Policy.

2.    SECURITY
Customer must take reasonable steps to ensure that others do not gain unauthorized access to Customer’s account or to the accounts provided to Customer for use by employees, ex-employees, customers, prospects, friends, family members or guests.

Customer and Users are responsible for preventing others from using their accounts. It is Customer’s and its Users’ responsibility to keep passwords secret and secure.

Customer has overall responsibility for assigning User accounts for use by employees or others, and Customer is responsible for ensuring that these individuals protect their User account information and do not share this information with others.

In the event that an employee leaves Customer’s business, Customer is responsible for ensuring that their User account is removed or deactivated

If this requires co-ordination or actions on the part of Company, Customer is responsible for notifying Company of the change in the account status.

Company cannot guarantee that staff will be available to remove or disable an account at Customer’s immediate request, but Company will remove or disable an account promptly (and in any event within 24 hours notice of Customer’s intent to have Company staff remove or disable an active account).

3.    NETWORK PERFORMANCE
Company accounts operate on shared network resources. Abuse of these shared network resources by one customer may have a negative impact on all other customers.

4.    REVISIONS TO THIS ACCEPTABLE USE POLICY
Company reserves the right to revise, amend, or modify this Acceptable Use Policy at any time and in any manner. Such changes will be communicated to Customer promptly.

Cloud Computing Acceptable Use Policy
Updated: May 26, 2014
Version: 1.1

 

Customer and all Users of the Services must comply with this Acceptable Use Policy.  The direct or indirect use of Company’s services constitutes acceptance and agreement to this Acceptable Use Policy.

Though Company does not monitor Customer Data, Company may identify and notify Customer of any Customer Data that, in Company’s reasonable discretion, may subject Company to liability or which may violate this Acceptable Use Policy.  Company will cooperate with legal authorities and/or third parties in the investigation of any suspected or alleged claim, crime or civil wrongdoing resulting from Customer Data or other acts or omissions of Customer or Users.

Customer’s violation of this Acceptable Use Policy may result in the suspension of Services or removal of Customer Data by Company or by entities other than Company WITHOUT PRIOR NOTICE.  If Services are suspended or terminated due to violations of this Acceptable Use Policy, Service Credits will not be provided for the suspended or terminated service.

Wherever commercially practicable, any suspension or termination of all or part of the Services as a result of violation of this Acceptable Use Policy will be treated as a curable breach of Customer’s Agreement and Company will use reasonable commercial efforts to work with the Customer to resolve the issues causing this breach and will restore Services as quickly as possible thereafter. Any extraordinary expenses incurred by Company in restoring services will be borne by Customer.

1.    VIOLATIONS OF COMPANY’S ACCEPTABLE USE POLICY
Customer may not use its shared, dedicated, co-hosted or other Company provisioned Service to publish or store Customer Data which is unlawful.  For purposes of this Acceptable Use Policy, “material” refers to all forms of communications including narrative descriptions, graphics (including photographs, illustrations, images, drawings, and logos), executable programs, video recordings, and audio recordings.

Use of the Services in any way (e.g., to upload, store, transmit, distribute or publish by any means) for any of the following are strictly prohibited:

1.1    Illegal activities, or use of Services to directly or indirectly support illegal activities;

1.2    Threats or harassment, including encouragement to cause bodily harm or destruction of property;

1.3    Profanity, bigotry, racism or other materials offensive to the general public;

1.4    Pornography of any kind;

1.5    Fraudulent activities of any kind;

1.6    Forgery or impersonation, including removal or modification of network or message headers;

1.7    Unsolicited emails (spam) of any kind, including Usenet or message board spam, in contravention of any applicable anti-spam laws;

1.8    Unauthorized access, including use of the Services to access, or to attempt to access the accounts of others, or to penetrate or attempt to penetrate, security measures of Company or another entity’s computer software or hardware, electronic communications system or telecommunications system;

1.9    Use of the Services or network resources in a manner which impairs network performance, damages, disables, overburdens, or impairs the Services, or interfere with any other party’s use and enjoyment of the Services;

1.10  Infringing materials;

1.11  Collection of personally identifiable information in violation of applicable privacy laws;

1.12  Intentional interference or disruptive activity;

1.13  Attempts to circumvent or violate the security of other accounts or equipment of any kind;

1.14  Use or distribution of tools designed for compromising security;

1.15  Viruses or any other types of malware or malicious code;

1.16  Peer to peer or file sharing software to permit unauthorized sharing, copying or distribution of copyrighted material;

1.17  Any other content or activities that are prohibited at law or in equity, or that may be notified by Company to Customer from time to time in accordance with Section 4 of this Appendix C as being harmful or potentially harmful to the Services or contrary to this Acceptable Use Policy.

Customer shall be responsible and accountable for any activities by its Users that violate this Acceptable Use Policy.

2.    SECURITY
Customer must take reasonable steps to ensure that others do not gain unauthorized access to Customer’s account or to the accounts provided to Customer for use by employees, ex-employees, customers, prospects, friends, family members or guests.

Customer and Users are responsible for preventing others from using their accounts. It is Customer’s and its Users’ responsibility to keep passwords secret and secure.

Customer has overall responsibility for assigning User accounts for use by employees or others, and Customer is responsible for ensuring that these individuals protect their User account information and do not share this information with others.

In the event that an employee leaves Customer’s business, Customer is responsible for ensuring that their User account is removed or deactivated

If this requires co-ordination or actions on the part of Company, Customer is responsible for notifying Company of the change in the account status.

Company cannot guarantee that staff will be available to remove or disable an account at Customer’s immediate request, but Company will remove or disable an account promptly (and in any event within 24 hours notice of Customer’s intent to have Company staff remove or disable an active account).

3.    NETWORK PERFORMANCE
Company accounts operate on shared network resources. Abuse of these shared network resources by one customer may have a negative impact on all other customers.

4.    REVISIONS TO THIS ACCEPTABLE USE POLICY
Company reserves the right to revise, amend, or modify this Acceptable Use Policy at any time and in any manner. Such changes will be communicated to Customer promptly.

Cloud Computing Acceptable Use Policy
Updated: October 1, 2009
Version: 1.0

 

All users of the Services must comply with the Acceptable Use Policy set forth in this Attachment III (“Acceptable Use Policy”).

The direct or indirect use of Company’s services constitutes acceptance and agreement to Company’s Acceptable Use Policy as well as Company’s Terms of Service.

As a general practice Company does not monitor the content of web sites, email transmissions, newsgroups, discussion groups or other materials accessible through the Services except for measurements of system utilization, the preparation of billing records and the verification of Service availability.

However, in accordance with the Agreement, Company may identify and notify Customer of any materials that, in Company’s reasonable discretion, may be illegal, may subject Company to liability or which may violate this Acceptable Use Policy. Company will cooperate with legal authorities and/or third parties in the investigation of any suspected or alleged crime or civil wrongdoing.

Your violation of this Acceptable Use Policy may result in the suspension or immediate termination by entities other than Company of either your Company account and/or other actions WITHOUT PRIOR NOTICE.

In the event that your service is terminated due to violations of this Acceptable Use Policy or of other Company’s Terms of Use, Service Credits will not be provided for the suspended service.

Customer may not use its shared, dedicated, co-hosted or other Company provisioned Service to publish material which is unlawful. For purposes of this Acceptable Use Policy, “material” refers to all forms of communications including narrative descriptions, graphics (including photographs, illustrations, images, drawings, and logos), executable programs, video recordings, and audio recordings.

Any Terminations of all or part of Services as a result of violation of this Acceptable Use Policy will be treated as a Curable Breach of Contract and, where within Company’s control, Company with the Customer to resolve the issues causing this Breach and restore Services as quickly as possible. Any extraordinary expenses incurred by Company in restoring services will be borne by the Customer.

1.    VIOLATIONS OF COMPANY’S ACCEPTABLE USE POLICY
The following activities are prohibited:

1.1 Illegal Activities
Company’s Services may not be used for illegal purposes, or to directly or indirectly to support illegal activities.

Subject to Article 4 of Part I of this Schedule, Company reserves the right to cooperate with law enforcement or other authorities and/or injured third parties in the investigation of any suspected crime or civil wrongdoing.

1.2 Threats or Harassment
Use of the Services to transmit any material (by e-mail, uploading, posting, instant message, voice, video or otherwise) that threatens, encourages bodily harm or the destruction of property, or the harassment of another.

1.3 Profanity, Bigotry or Racism
Use of the Services to transmit material that is offensive to the general public including but not limited to profanity, bigotry, prejudice, racism, hatred, etc. as well as providing materials that promote physical harm or injury against any group or individual, promotes any act of cruelty to animals or which defames any person or group is strictly forbidden.

1.4 Child Pornography
Use of any Services, dedicated server, shared server, virtual server or co-hosted server which hosts, transmits or in any way links to child pornography or to materials that solicit, describe or otherwise depicts sexual contact or harm to minors under 18 years of age is strictly prohibited and will result in the immediate removal from our network of the service, server, host of other connected device without notice until such time as all offending materials or links are removed.

All violations will be reported to appropriate law enforcement agencies.

Use of the Services to display material containing nudity or pornographic material of any kind is forbidden.

1.5 Fraudulent Activity
Use of the Services to make fraudulent offers of any sort, including but not limited to fraudulent offers to sell or buy products, items or services, or to advance any type of financial scam including but not limited to pyramid schemes, bubble scams, ponzi schemes, chain letters, etc. is strictly prohibited. All violations will be reported to the appropriate law enforcement agency.

1.6 Forgery or Impersonation
Adding, removing or modifying identifying network header information in an effort to deceive or mislead is prohibited. Attempting to impersonate any person by using forged headers or other identifying information is prohibited. Forging any email or other message header, in part or whole, of any electronic transmission, originating or passing through the Service is in violation of this Acceptable Use Policy and is strictly prohibited.

1.7 Unsolicited E-Mail (SPAM)
Violation of the Anti-SPAM Policy (https://watserv.com/Legal/Cloud/CloudAntiSpamPolicy.aspx) is expressly prohibited.

1.8 Usenet or Message Board SPAM
Use of Company’s network for the posting of messages or commercial advertisements which violate the rules, regulations, FAQ or charter of any newsgroups, mailing lists or Message Boards is strictly forbidden.

Commercial messages that are appropriate under the rules of a newsgroup, mailing list or Message Board or that are solicited by the recipients are permitted.

1.9 Unauthorized Access
Use of the Services to access, or to attempt to access the accounts of others, or to penetrate or attempt to penetrate, security measures of Company or another entity’s computer software or hardware, electronic communications system or telecommunications system, whether or not the intrusion results in the corruption or loss of data, is expressly prohibited.

1.10 Copyright or Trademark Infringement
Use of the Services to directly or indirectly transmit any material that infringes any copyright, trademark, patent, trade secret or other proprietary rights of any third party, including, but not limited to, the unauthorized copying of copyrighted material, the unauthorized digitization and distribution of photographs from magazines, books or other copyrighted sources, and the unauthorized transmittal of copyrighted software.

1.11 Collection of Personal Data
Use of the Service to collect or attempt to collect personal information about third parties in violation of privacy laws.

1.12 Interference or Disruptive Activity
Intentionally interfering with or disrupting of other network users, services or equipment is prohibited.

Customer may not, through action or inaction, allow others to use the Service for illegal actions.

1.13 Attempts to Violate Account Security
Attempting to obtain another user’s account information or password is strictly prohibited.

Customer may not attempt to circumvent user authentication or security of any host computer, network, customer or end-user account.

This includes, but is not limited to, accessing data not intended for Customer, logging into or making use of a server or account that the  Customer is not expressly authorized to access or probing the security of other networks.

Use or distribution of tools designed for compromising security is prohibited.

Examples of these tools include, but are not limited to, password guessing programs, cracking tools or network probing tools.

Customers or end-users who violate or attempt to violate computer system or network security may incur criminal or civil liability.

Subject to Article 4 of Part I of this Schedule, Company will cooperate fully with investigations of violations of systems or network security at other sites, including cooperating with law enforcement authorities in the investigation of suspected criminal violations.

1.14 Distribution of Viruses
Intentional distributions of software that attempts to and/or causes damage, harassment, or annoyance to persons, data, and/or computer systems is strictly prohibited.

1.15 IRC Networks
It is absolutely forbidden to host an IRC server or service that is part of or connected to another IRC network or server. Services or servers found to be connecting to or part of these networks will be immediately removed from our network without notice.

The server will not be reconnected to the network until such time that you agree to completely remove any and all traces of the IRC server and agree to allow Company access to your server to confirm that the content has been completely removed

1.16 P2P (Peer to Peer) Software
The use of Peer to Peer or file sharing software to permit the unauthorized sharing, copying or distribution of copyrighted material on the Services is prohibited.

1.17 User Accountability
Customer agrees to be held responsible and accountable for any activity by its authorized users, using its account that violates guidelines created within the Acceptable Use Policy.

1.18 Security
Customer must take reasonable steps to ensure that others do not gain unauthorized access to Customer’s account or to the accounts provided to Customer for use by employees, ex-employees, customers, prospects, friends, family members or guests.

In addition, Customer may not use your account to breach security of another account or attempt to gain unauthorized access to another network or server.

Customer is responsible for preventing others from using its account. Customer’s password provides access to its account. It is Customer’s responsibility to keep its password secret and secure.

If Customer has been assigned user accounts for use by employees or others, Customer is responsible for ensuring that these individuals protect their user account information and do not share this information with others.

In the event that an employee leaves Customer’s business, Customer is responsible for ensuring that their user account is removed or deactivated.

If this requires co-ordination or actions on the part of Company, Customer are responsible for notifying Company of the change in the account status.

Company cannot guarantee that staff will be available to remove or disable an account at Customer’s immediate request, but Company will remove or disable an account promptly (and in any event within 24 hours notice of Customer’s intent to have Company staff remove or disable an active account).

1.19 Network Performance
Company accounts operate on shared network resources. Abuse of these shared network resources by one customer may have a negative impact on all other customers.

Misuse of network resources in a manner which impairs network performance is prohibited by this Acceptable Use Policy.

2.    REVISIONS TO THIS ACCEPTABLE USE POLICY
Company reserves the right to revise, amend, or modify this Acceptable Use Policy and our Anti-SPAM policies and other policies at any time and in any manner. Such changes will be communicated to the Customer in a prompt fashion.