System abuse is strictly prohibited. may terminate or modify service immediately and may bill for any resulting support charges if the client engages in system abuse. Following is a list of actions which are defined to be system abuse. This list is non-exclusive; any action about which there is any doubt should be referred to evaluation.

Actions which constitute system abuse include, but are not limited to:

  • Attempting to circumvent user authentication or security of any host, network, or account on systems on the Internet at large (“cracking”)
  • Attempting, in any way, to interfere with or deny service to any user of any host on the Internet
  • Forging email or USENET posting header information
  • Sending large numbers of unsolicited mail messages (i.e. “junk email”); this includes adding or attempting to add addresses to any mailing list without explicit positive consent of the addressee.
  • Forwarding or posting “chain letters” (multiple forwarding) of any type
  • Posting inappropriate message to USENET newsgroups e.g. posting large numbers of unsolicited posts indiscriminately (“spamming”), or posting encoded binary files to USENET newsgroups not specifically named for that purpose
  • Attempting to cancel, supersede, or otherwise interfere with email or USENET posts other other than one’s own
  • Engaging in harassment, whether through language, frequency, or size of messages
  • Using an account at another provider to promote a Web site in an abusive manner
  • Using a account or network connection to collect replies to messages sent from another provider which violate these rules or those of that provider
  • Reselling services to third parties who no do abide by these guidelines