quote

Acceptable Use Policy

Binhost Technologies strives to provide high quality services to its customers at an affordable price. In order to accomplish this goal and maintain its status as a responsible and trusted citizen of the Internet, Binhost Technologies has established the following guidelines, setting out the acceptable use of its systems.

Customers who choose to violate the AUP will be terminated immediately and will not be entitled to any refund. Specific AUP violations may result in additional charges assessed against the customer.

Specifics

  1. Unsolicited Commercial Email (UCE): Unsolicited Commercial Email is advertising material received by email without the recipient either requesting such information or otherwise expressing an interest in the material advertised.Sending unsolicited mails to a large list of recipients (guideline: 100 names) which provokes complaints from the recipients is considered as UCE.While Binhost does not permit UCE over its servers, it charges $1 per message delievered to customers who make use of the server for the sending of UCE. The account will also be promptly terminated. All account details will be made available as part of the abuse analysis found at http://www.binhost.com/abuse following a UCE incident.
  2. Illegal/Criminal Activity:Binhost does not permit use of facilities in connection with criminal or civil violations of local, state, federal, national, or international laws, regulations, or other government requirements. Such violations include, but are not limited to, theft or infringement of copyrights, trademarks, trade secrets, or other types of intellectual property; fraud; forgery; theft or misappropriation of funds, credit cards, or personal information; and threats of physical harm or harassment.
  3. Security Violations:Binhost facilities may not be used in connection with attempts – whether or not successful – to violate the security of a network, service, or other system. Examples of prohibited activities include hacking, cracking into, monitoring, or using systems without authorization; scanning ports; conducting denial of service attacks; and distributing viruses or other harmful software.Binhost customers are responsible for maintaining the basic security of their systems to prevent their use by others in a manner that violates this Policy. Examples include improperly securing a mail server so that it may be used by others to distribute spam, and improperly securing an FTP server so that it may be used by others to illegally distribute licensed software. Customers are responsible for taking corrective actions on vulnerable or exploited systems to prevent continued abuse.

All customers agree to comply with Binhost’s Acceptable Use Policy

newspaper templates - theme rewards