Cybercon Acceptable Use Policies
This Acceptable Use Policy specifies the actions prohibited by Cybercon to users of Cybercon Network. By using the Network, you acknowledge that you and users that have gained access to the network through your account, have read, understood, and agree to abide by the Policies. You are responsible for violations of these Policies by any User. While it is not our intent to control or monitor your on-line communications, we may block services that we deem to be in violation of the Policies or that we otherwise deem harmful or offensive. Cybercon reserves the right to modify the Policy at any time, effective upon posting of the modified Policy to this URL: http://www.Cybercon.com/aup
Cybercon Network may only be used for lawful purposes. Use of the Service for transmission, distribution, retrieval, or storage of any information, data, or other material in violation of any applicable law or regulation (including, where applicable any tariff or treaty) is prohibited. This includes, without limitation, the use or transmission of any data or material protected by copyright, trademark, trade secret, patent, or other intellectual property right without proper authorization and the transmission of any material that constitutes an illegal threat, violates export control laws, or is obscene, defamatory, or otherwise unlawful.
Network and System Security Violations of system or network security are prohibited, and may result in criminal and civil liability. Cybercon will investigate incidents involving such violations and may involve and will cooperate with law enforcement if a criminal violation is suspected. Examples of system or network security violations include, without limitation, the following:
– Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network.
– Unauthorized probing and/or scanning of any system without prior consent of the owner or system administrator. This includes, but is not limited to, “dictionary attacks” and/or attempts to harvest or verify email addresses.
– Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network.
– Interference with service to any user, host or network including, without limitation, mail-bombing, flooding, deliberate attempts to overload a system and broadcast attacks.
– Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting.
– Attempt to gain unauthorized access to, or attempt to interfere with or compromise the normal functioning, operation, or security of any network, system, computing facility, equipment, data, or information.
– Engage in any activities that may interfere with the ability of others to access or use the Service or the Internet.
Sending unsolicited mail messages, including, without limitation, commercial advertising and informational announcements, is explicitly prohibited. A user shall not use another site’s mail server to relay mail without the express permission of the site. Sending mails from a third party host with the intent to drive traffic to our network is also strictly prohibited. All postings to Usenet must comply with that group’s usage policies. Cross-posting and/or off topic messages, including commercial messages, is explicitly prohibited.
Nothing contained in this policy shall be construed to limit Cybercon’s actions or remedies in any way with respect to any of the foregoing activities, and Cybercon reserves the right to take any and all additional actions it may deem appropriate with respect to such activities, including without limitation taking action to recover the costs and expenses of identifying offenders and removing them from the Cybercon service, and levying cancellation charges to cover Cybercon’s costs in the event of disconnection of dedicated access for the causes outlined above.
If you become aware of any violation of these Policies by any person, including Users that have accessed the Service through your account, please notify us at . We will notify you, our Customer, of complaints received by us regarding each incident of alleged violation these Policies by your Users of the Service. You agree to promptly investigate all such complaints and take all necessary actions to remedy any actual violations of these Policies. We may identify to the complainant that you are investigating the complaint and may provide the complainant with the necessary information to contact you directly to resolve the complaint. You shall identify a representative for the purposes of receiving such communications. Additionally, any data sent to Cybercon, by either the complaintant or our client or any other party sending data to us, including but not limited to header information, logfile information, alleged UCE, and any personal subscriber or alleged subscriber information, becomes the intellectual property of Cybercon for its use however Cybercon determines necessary, including but not limited to, providing that information to either the complaintant, our client, or other party that Cybercon deems as qualified in assisting in the resolution in such disputes. We also reserve the right to install and use, or to have you install and use, any appropriate devices to prevent violations of these Policies, including devices designed to filter or terminate access to the Services provided by us.