c. Threats. Using the
Services to transmit any material (by email uploading, downloading,
posting or otherwise) that threatens or encourages bodily
harm or destruction of property.
d. Harassment. Using
the Services to transmit any material (by email, uploading,
downloading or otherwise) that harasses another.
e. Sexually Explicit Material.
Using the Services to transmit any material (by email,
uploading, downloading or otherwise) that contains
explicit or graphic descriptions or accounts of sexual
acts including but not limited to sexual language
of a violent or threatening nature directed at another
individual or group of individuals.
Using the Services to discriminate against, victimize,
harass, degrade or intimidate an individual or group
of individuals on the basis of religion, gender, sexual
orientation, race, ethnicity, age or disability.
g. Libel or Defamation.
Using the Service to make libelous or defamatory
remarks about another person or entity.
h. Fraudulent Activity.
Using the Services to make fraudulent offers to sell
or buy products, items or services or to advance any
type of financial scam such as "pyramid schemes,"
"Ponzi schemes,", "chain letters,"
and other forms of business fraud.
i. Forgery or Impersonation.
You may not impersonate any person or entity, including
any employee or representative of AFMT/ATC. Adding,
removing or modifying identifying network header information
in an effort to deceive or mislead is prohibited.
Attempting to impersonate any person or entity by
using forged headers or other identifying information
j. Unsolicited Commercial
Email/Unsolicited Bulk Email. Using the Services
to transmit any unsolicited commercial email or unsolicited
bulk email (also known as "Spamming"). Users
may not transmit such email even if the transmission
provides an electronic email address to which the
recipient may send a request for declining such electronic
mail. Activities that have the effect of facilitating
unsolicited commercial email or unsolicited bulk email
whether or not that email is commercial in nature,
k. Unauthorized Access.
Using the Services to access, or to attempt to access,
the accounts of others, or to penetrate, or attempt
to penetrate, security measures of Ayrshire Communications' or another
entity's computer software or hardware, electronic
communications system, or telecommunications system,
whether or not the intrusion results in the corruption
or loss of data.
l. Copyright or Trademark
Infringement. Using the Services to transmit
any material (by email, uploading, downloading, posting
or otherwise) that infringes any copyright, trademark,
patent, trade secret, or other proprietary rights
of any third party, including, but not limited to,
the unauthorized copying of copyrighted material,
the digitization and distribution of photographs from
magazines, books, or other copyrighted sources, and
the unauthorized transmittal of copyrighted software.
m. Collection of Personal
Data. Using the Services to collect or attempt
to collect, personal information about third parties
without their knowledge or consent. All Users further
agree they will not attempt to collect or use any
personal information from a minor (anyone under 18
years old) without appropriate prior verifiable parental
n. Reselling the Services.
Reselling the Services without Ayrshire Communications' authorization.
The Services are for your use only.
o. Network Disruptions and
Unfriendly Activity. Using the Services for
any activity which adversely affects the ability of
other people or systems to use Ayrshire Communications' Services
or the Internet. This includes "denial of service"
attacks against another network host or individual
user. Interference with or disruption of other network
users, network services or network equipment is prohibited.
This includes but is not limited to software viruses
or any other computer code, files or programs that
are designed or intended to disrupt, damage, or limit
the functioning of any software, hardware, or telecommunications
equipment or damage or obtain unauthorized access
to any data or information of any third party. It
is the User's responsibility to ensure that their
network is configured in a secure manner. A User may
not, through action or inaction, allow others to use
their network for illegal or inappropriate actions.
A User may not permit their network, through action
or inaction, to be configured in such a way that gives
a third party, the capability to use their network
in an illegal or inappropriate manner.
p. News. Ayrshire Communications'
Users should use their best judgment when posting
to any newsgroup. Many groups have charters, published
guidelines, FAQ's or community standards describing
what is and is not considered appropriate. The continued
posting of off-topic articles is prohibited. Commercial
advertisements are off-topic in most newsgroups.
q. Excessive Bandwidth Use.
Ayrshire Communications reserves the right to monitor bandwidth use
of its customers and may suspend or terminate the
account of any customer using excessive bandwidth,
excessive downloads, uploads and/or file transfers,
servers other than Ayrshire Communications or hosting websites which
are not hosted by Ayrshire Communications. Ayrshire Communications provides its
service based on standard Internet burst speeds and
is not intended for continual, maximum upload or download
usage. If a customer has excessive downloads, uploads
and/or file transfers, Ayrshire Communications may suspend or terminate
use of the services immediately or additional charges
r. Compromising Security.
Using or distributing tools designed or used for compromising
security, which includes but is not limited to: password
guessing programs, decoders, password gatherers, analyzers,
cracking tools, packet sniffers, encryption circumvention
devices, or Trojan Horse programs. Network probing
or port scanning tools are only permitted when used
in conjunction with a residential home network, or
if explicitly authorized by the destination host and/or
network. Unauthorized port scanning, for any reason,
is strictly prohibited.
s. Network content or services
to others. Running programs or servers from
a customer's premises which provide network content
or any other services to others. Examples include
but are not limited to: peer-to-peer file sharing,
mail, ftp, http, game, newsgroup, proxy, IRC servers
and multi-user interactive forums.
t. Multiple or simultaneous
Log-ins. Multiple log-ins or simultaneous
log-ins are prohibited. This means that customers
may not dial into the same account with multiple computers
at the same time. Please note that a customer is responsible
for recognizing when more than one person is logged
in at the same time.
Ayrshire Communications requests that anyone who
believes that there is a violation of this Acceptable
Use Policy please report such information to Ayrshire Communications
Customer Service, PO Box 248, Ayrshire, IA 50515
Ayrshire Communications may take any one or more
of the following actions in response to complaints:
You agree to indemnify, defend and
hold harmless Ayrshire Communications, its officers, directors, employees,
agents, licensors, suppliers and any third party information
providers to the Service from and against all losses,
expenses, damages and costs, including reasonable attorneys'
fees, resulting from any violation of this Acceptable
Use Policy by you. Each of these individuals or entities
shall have the right to assert and enforce the provisions
directly against you on its own behalf. This provision
shall survive the termination of your service.
Ayrshire Communications reserves the right to modify
or amend this Acceptable Use Policy, our Terms of Service
and our other policies and agreements at any time and
in any manner. Notice of any modification or amendment
will be posted and/or distributed in accordance with
the Internet Service Agreement.
Questions about this policy should
be sent via e-mail to firstname.lastname@example.org
Reports of activity in violation of
this policy may be sent in e-mail to email@example.com.