(Revised March 15, 2001)
Users of any of Ionix telecommunication and/or network access services ("Services"), including Internet-based services, agree to refrain from performing any and all of the activities listed below. Ionix will notify customers of violations to this policy and will take necessary corrective action, including, but not limited to, immediate termination or suspension of Services.
Compromise of, or damage to hosts, networks, or security systems involving the use of Ionix resources are prohibited and may result in civil or criminal prosecution. Ionix will investigate incidents involving such violations and will cooperate with law enforcement if a criminal violation is suspected. Examples of system or network security violations include, without limitation, attempts, whether or not successful, to do any of the following:
1. Probe hosts or networks without the explicit authorization of the administration of those systems.
2. Breach the security of a host, network component, or authentication system without the explicit permission of the administration of those systems.
3. Monitor data on any network or system without the explicit authorization of the administration of that system or network.
4. Interfere with service to any user, host or network, including deliberate attempts to overload a server, network connected device, or network component.
5. Originate malformed data or network traffic that results in damage to, or disruption of, a service or network connected device.
6. Forgery of data designed to misrepresent the origination user or source.
7. Send unsolicited, mass electronic mail messages to one or more recipients or systems (Spamming), resulting in a complaint from the recipient(s) to Ionix. Any electronic messages, which are sent in an unsolicited manner to 10 or more recipients, or a series of unsolicited electronic messages, qualify as Spamming.
8. Forgery of electronic mail headers (including any portion of the IP packet header and/or electronic mail address), or any other method used to forge, disguise, or conceal the users identity when using Ionix Services (Spoofing).
9. Use of another partys electronic mail server to relay electronic mail without the explicit permission from that third party (E-mail Relay).
10. Conceal, forge or otherwise falsify identity in connection to any Ionix Services, or present a false identity to Ionix when signing up for any Ionix Services.
11. Send mass volumes of data, or any other abusive behavior that is intended to disrupt or disable the recipient system (Denial of Service (DOS) or SYN Flood attacks).
12. Cross-posting of the same or similar messages to two or more USENET newsgroups. All postings to USENET newsgroups by customer or user must comply with that newsgroups charter and other policies.
Ionix reserves the right to terminate any customer without notice upon confirmed violation of any part of the Ionix policy as set forth above. Ionix reserves the right to change this Acceptable Use Policy at any time, without notice.
Every Ionix customer is responsible for the behavior of his or her own end users. It is therefore the responsibility of every Ionix customer to ensure that his or her end users understand and adhere to this policy. Violations of this policy by a third party on behalf of a customer or end user of Ionix will be considered a violation by that customer or end user.
back to top