TERMS OF SERVICE AND PRIVACY
These are the terms and conditions under which
AA TECH DESIGN provides
Internet hosting services ("service" or "services"). These
Terms of Service act as a fully binding agreement between
AA TECH DESIGN.
("AA TECH DESIGN") and each of its customers
("Customer").
ACCEPTABLE
USE POLICY
This Acceptable Use Policy has been formulated with the following goals in
mind:
This Acceptable Use Policy in no way supercedes or overrides
AA TECH DESIGN's Terms of Service.
1. Sending unsolicited bulk e-mail (UBE) which advertises a Web site, e-mail
account, or other service provided by or through
AA TECH DESIGN.
2. Making Usenet postings which advertise a Web site, e-mail account, or other
service provided by or through AA TECH
DESIGN, to any newsgroup whose
charter does not specifically allow such advertisements.
3. Sending UBE or posting advertisements to Usenet (except where specifically
allowed by newsgroup charters) from a service provided by or through
AA TECH DESIGN.
4. Hosting "spam-friendly" Web sites, including spam software sites.
5. Harassment, whether through content, frequency, or size of e-mail or Usenet
messages.
6. Sending e-mail to any person who does not wish to receive it. If a recipient
asks to stop receiving email, the Customer must immediately and permanently
cease to send that individual any further e-mail.
7. Forwarding or otherwise propagating chain letters or "e-mail
hoaxes," whether or not the recipient wishes to receive them, unless such
propagation is both solicited and in the clear context of debunking or
discrediting chain letters/hoaxes.
8. Transmitting any electronic communication, including e-mail, using the name
or address of another person or organization, for purposes of deception.
9. Impersonating another individual by altering source IP address information,
or forging e-mail/Usenet headers or other identifying information.
10. Any attempt to fraudulently conceal, forge, or otherwise falsify one's
identity in connection with use of the service.
11. Any use of another party's electronic mail server to relay e-mail without
express permission.
12. Collecting replies to messages sent from another Internet service provider,
where those messages violate this Acceptable Use Policy or any applicable
policies of the other provider.
13. Denial of Service, including, but not limited to, any form of Internet
packet flooding, packet corruption, or abusive attack intended to impact the
proper functioning of any party's Internet servers or services.
14. Using AA TECH DESIGN's network, services, or systems to store or send
content which is illegal according to the laws of United States of America, the
state of California, the city of Los Angeles, or any International treaties
respected by the United States of America, is not permitted for any reason.
Storing or sending any material deemed either illegal or inappropriate for our
networks, including but not limited to child pornography related material,
pirated software or music, all spam-related materials including e-mail lists,
is grounds for immediate termination. Note also that any child pornography
related material, whether it is determined to be legal or not. This includes
simulated child pornography, non-nude child pornography, or sites linking to
such material. Offenses of this nature will be reported to the federal
authorities and prosecuted to the fullest extent of the law.
15. Using or storing any type of software which is designed to or is likely to
abuse or negatively impact Internet service, including, but not limited to,
portscanners, hacking tools, ping flooding programs, security/root exploits,
packet sniffers, and spam software.
16. Modifying, changing, or obscuring the MAC (Media Access Control) or IP
(Internet Protocol) address(es) of servers or services. Doing so may be
considered cause for service suspension or termination.
17. Intercepting or attempting to intercept, through any method, network
traffic intended for other customers.
18. Any previous or current behavior, such as the sending of unsolicited
e-mail, that results in the addition of
AA TECH DESIGN to any e-mail
blackhole lists, otherwise negatively impacts the overall services of
AA TECH DESIGN,
or is in violation of our upstream providers Acceptable Use Policy
is grounds for termination.
19. All e-mail lists operated by our customers, either advertising
resources on our networks or being sent through our networks, must conform to
the double opt-in standards. For more information regarding double opt-in lists
and standards, please
System Security and Responsibilities Security
is an important part of your Internet-based business, and it is important that
our customers understand the security policies we apply to the servers at
AA TECH DESIGN. Every server our customers sign up for is built using our
latest operating system builds, and contain the latest vendor-supplied patches.
While our builds provide the initial security to keep your company secure, new
security problems arise with all server types every day, and we cannot maintain
the security of all of the systems operated by our customers. The only
exception to this case is servers that are directly maintained by our company.
In the event of a system compromise on
a host we are not maintaining, it is the responsibility of the customer to
back-up his data and contact us to take action. Our policy is to
immediately re-install any compromised servers on our network, as they
pose a threat to all of our systems. We can perform a re-install for a $50
consulting fee. The typical downtime during one of these re-installs is
about ten minutes. Confirmed Opt-In (also known as Double Opt-in), is the
only method we allow for the e-mail lists operated by our customers. To
better explain why we require this, it should should be explained what
Opt-In and Confirmed Opt-In mean.
Opt-In:
An opt-in list is such that a user adds his name to a list
by entering his e-mail address into the system, whether through a form on
a webpage or entry into a contest or some other method. After his address
is entered, the user is signed up to receive e-mails from the list
operator. This method is not secure, however, as any rogue user can add as
many e-mail addresses into the list as he or she wishes, effectively
spamming the recipients of the bulk e-mail. For this reason, we do not
allow singe opt-in lists.
Confirmed Opt-In:
This method of adding users begins just as the previous: a
user enters his e-mail address into the list operator's system. However,
instead of immediate mailings being sent out, the e-mail list software
sends out a confirmation message, asking for the user to confirm his
addition to the list. If the user replies to that message, from the e-mail
address that was signed up, he will be subscribed to the list. If the user
does not reply to that message, he will receive no further mailings at
all. This method drastically reduces the number of unwanted e-mails being
sent to unhappy recipients, and that is why we require it for all e-mail
lists operated by our customers.
These methods help keep our networks and the entire Internet
spam-free, and we hope you find them to be agreeable. If you have any
questions regarding these policies, feel free to contact us and ask about
them. We'll be happy to point you in the right direction for information
on converting your list to confirmed opt-in
AA TECH DESIGN Copyright ©2005 All rights reserved.
|