Edgeuno is committed to respecting your privacy. Once you choose to provide personally identifiable information, it will be used only in the context of your relationship with Edgeuno. Edgeuno will not give, sell, share, rent or lease your personal identifiable information with others unless otherwise required by law or without your prior permission.
Acceptable Use Policy
This Acceptable Use Policy (“AUP”) is intended to help enhance the use of the Internet by preventing unacceptable use. Please refer to your Terms of Service for terms and conditions applicable to your Internet Service.
PLEASE READ THIS POLICY CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE, YOU AGREE TO BE BOUND BY THIS POLICY. IF YOU DO NOT WISH TO BE BOUND BY THIS AUP, YOU MAY NOT ACCESS OR USE THE SERVICE.
This AUP applies to Managed Services, Connectivity, IaaS, Datacenter and Professional Services (“Services”) provided by EDGEUNO and its affiliates (“Service Provider”). Your use of these Services indicates your acceptance of and agreement to abide by this Acceptable Use Policy. It is designed to help protect the Service, Service Provider employees, customers, and community from irresponsible or illegal activities. Service Provider may modify this AUP from time to time. In the event of any inconsistency between Service Provider Acceptable Use Policy and the terms of any service agreement, this Acceptable Use Policy shall govern and control.
1. GENERAL POLICY
Service Provider reserves the right in its sole discretion to deny or restrict your use of the Services, or immediately to suspend or terminate your Services, if the use of your Services by you or anyone using it, in our sole discretion violates your Terms of Service or other Service Provider policies, is objectionable or unlawful, interferes with the functioning or use of the internet or Service Provider network by Service Provider or other users or violates the terms of this AUP.
2. ILLEGAL AND PROHIBITED USE
This section is used to address actions, content and or practices that are prohibited by law and by rules set forth by the Service Provider. Please review the sections below before using Service Provider’s Services or networks. The restrictions are not negotiable. Not all Services provided by Service Provider are listed or mentioned but are bound by this document.
Users found to engage in activities that Service Provider determines, in its sole discretion, are in violation of this AUP will have their accounts terminated. Violators may also be subject to any appropriate legal action and/or consequences. Service Provider reserves the right to cooperate with legal authorities and/or injured third parties in the investigation of any suspected illegal activity or civil wrong. Activities or use of Services considered by Service Provider to be a violation of this AUP include but are not limited to the following:
- Post or transmit information or communications that, whether explicitly stated, implied, or suggested through use of symbols, are obscene, indecent, pornographic, sadistic, cruel, or racist in content, or of a sexually explicit or graphic nature; or which espouses, promotes or incites bigotry, hatred, terrorism or racism; or which might be legally actionable for any reason;
- Post, transmit, download or view any material whatsoever pornographic in natüre involving actual images of children or minors or digitally or otherwise artificially created or manipulated images of children or minors, or any material whatsoever that may be deemed obscene under applicable law;
- Access or attempt to access the accounts of others, to spoof or attempt to spoof the URL or DNS or IP addresses of Service Provider or any other entity, or to attempt to penetrate or penetrate security measures of Service Provider or other entities’ systems (“hacking”) whether or not the intrusion results in corruption or loss of data,
- Introduce viruses, worms, harmful code and/or Trojan horses on the Internet.
- Violate Service Provider or any third party’s copyright, trademark, proprietary or otherintellectual property rights, including trade secret rights.
- Use any name or mark of Service Provider, its parent, affiliates or subsidiaries, as a hypertext link to any Web site or in any advertising publicity or other commercial manner.
- Use the Service or the Internet in a manner intended to threaten, harass, intimidate or terrorize.
- Make false or unverified complaints against any Service Provider subscriber, or otherwise abusing any of Service Provider complaint response procedures,
- Indirect or attempted violations of this AUP,
- Reselling of service provided by Service Provider without the Service Provider´s prior authorization.
- Services used to transmit, retransmit, distribute, post, or store any material that in the judgment of Service Provider is threatening, libelous, defamatory, or otherwise objectionable including but not limited to child pornography and advocating unlawful activity against any persons, animals, governments or businesses. Harassment of users, employees, or of others will not be tolerated.
- Actions and/or Services prohibited by federal, state and local law.
- Distribution, posting, copying or dissemination of copyrighted material including but not limited to movies and/or music.
- Inhibiting any other person’s use of the service provided by Service Provider is prohibited. o Participation in illegal gambling, lottery or other similar activities.
- Transmission of scams such as “Make Money Fast” schemes. o Making fraudulent offers.
- The attempt to access the accounts of other or other computers and/or networks to penetrate security measures, whether or not the intrusion results in damage. Service Provider reserves the right to limit, restrict and/or prohibit Services it provides to customers, as Service Provider determines necessary. The restrictions mentioned apply to all users unless specifically documented.
Service Provider reserves the right to limit the file size of individual email mailboxes at its sole discretion. Individual email mailboxes found over the limit will be subject to deletion without notice. Deleted email will not be restored or saved. Service Provider reserves the right to limit the maximum transfer limit of any one message in its sole discretion. Service Provider reserves the right to reject or filter email based on source address and content. Examples are, but are not limited to, virus filtering and blocking open relay mail servers.
The Services may not be used to transmit, retransmit, or distribute by e-mail or any other method any material that violates any condition of this AUP in the sole judgment of ISP.
Activities considered by Service Provider to be a violation of this AUP are as follows, but are not limited to:
- Any unsolicited e-mail, whether commercial or otherwise, including, but not limited to, bulk mailing of commercial advertising, informational announcements, and political tracts.
- Solicited e-mail that contains material that otherwise violates this AUP or any e-mailthat falsifies the address or other information; harassing e-mail, whether through language, frequency, or size of messages.
- Any e-mail “chain letters” or other “pyramid schemes.”
- E-mail relayed without the express permission of that site, service, system or network. o E-mailing the same or similar messages to one or more newsgroups (also known as “crossposting” or “multiple posting”).
- E-mail containing false or misleading statements, claims, or representations.
- Forging header information including, but not limited to, any attempt to circumvent the approval process for posting to a moderated newsgroup.
Service Provider has a “zero tolerance” policy for SPAM. Any User of Service Provider Services found to be actively distributing or engaged in the mass distribution of unsolicited emails without consent of the intended receiver may have their account(s) terminated and all future access to Service Provider’s Services and network revoked.
You may not use the Service or any Equipment or Software provided by Service Provider:
(a) To send e-mail of a personal, bulk or commercial nature, including, without limitation, bulk mailings of commercial advertising, informational announcements, charity requests, political or religious messages, and petitions for signatures, except to those who have requested such e- mails via a confirmed opt-in subscription process maintained by You.
(b) To send e-mail or other messages to someone who has indicated that he or she does not want to receive messages from You.
(d) To conduct “mail bombings” (e.g., to send more than ten copies of the same or substantially similar message, or to send very large messages or files, with the intent of disrupting a server or account).
(e) To send or forward make-money-fast schemes or chain/pyramid letters (whether or not the recipient requests it).
(f) To harvest e-mail addresses or personal information of other Service Provider subscribers or the subscribers of any other network.
(g) To use another Internet site’s mail server to relay mail without the express permission of the owner of that Internet site.
(h) To use e-mail or the internet in violation of federal law or the rules of the Federal Communications Commission.
5. UNAUTHORIZED SHARING
6. COMMERCIAL USE
Privacy & Policy Page 6 of 10 Re-selling Service Provider’s Services or offering use of Service Provider’s Services for adding value to a commercial entity without Service Provider’s authorization is prohibited. Service Provider’s Services are designed for the account holder’s use of the Internet and may not be used for commercial purposes without the Service Provider’s explicit consent.
You also agree not to use Service Provider’s Services for operation as an Internet Service Provider (ISP), or for any other business enterprise including, without limitation, IP address translation or similar facilities intended to provide access, operating or allowing others to operate servers of any type, or any other device, equipment and/or software providing server- like functionality in connection with Service Provider’s Services, unless expressly authorized.
Other Services not specifically listed in this AUP but that are provided by Service Provider are bound by this AUP.
8. COMPLIANCE WITH THE AUP OF UPSTREAM PROVIDERS
The AUP of Service Provider’s upstream providers also binds Service Provider users. An “upstream provider” is any company that provides Service Provider bandwidth and/or other Services.
9. SYSTEM & NETWORK SECURITY
Violations of system or network security are prohibited and may result in criminal and çivil liability. Service Provider will investigate incidents involving such violations and may involve and will cooperate with law enforcement if a criminal violation is suspected. Examples of system or network security violations include, without limitation, the following:
- Port scanning, probes, data capture, denial of service, access of restricted systems. o Attempted access of systems not previously given access to.
- Anything deemed “hacking” or “cracking” to the systems, network or users.
- Unauthorized access to or use of data, including any attempt to circumvent user authentication or security of any host, network, or account (hacking, cracking, port scans, or flood pings).
- Unauthorized monitoring of data or traffic.
- Interfering with service to any user, host, system or network. o Conducting denial of service attacks.
- Any attempt to disrupt service including, but not limited to, distributing or introducing viruses, worms, or other harmful software.
- Access by using artificial means, involving software, programming, or any other method.
10. COPYRIGHT INFRINGEMENT/REPEAT INFRINGER POLICY
Service Provider respects the intellectual property rights of third parties, including those granted under LATAM and US copyright laws, and the interests of its subscribers and content providers on the Internet. You may not store material of any type or in any format on, or disseminate such material over, Service Provider ‘ systems or servers in any manner that constitutes an infringement of third party intellectual property rights, including rights granted under LATAM and US copyright laws. In accordance with the Digital Millennium Copyright Act (DMCA) and other applicable law, it is the policy of Service Provider to terminate, in appropriate circumstances, the Service provided to any subscriber or account holder who is deemed to infringe third party intellectual property rights, including repeat infringers. Appropriate circumstances may exist where:
(i) A Subscriber or account holder has been found by a court of competent jurisdiction to have infringed the copyrights of a third party on two or more occasions, i.e., a repeat infringer,
(ii) Where a valid, effective and uncontested notice has been provided to Service Provider alleging facts which are a violation by the Subscriber or account holder of Service Provider Copyright Policy prohibiting infringing activity involving Service Provider systems or servers, or
(iii) In other cases of repeated flagrant abuse of access to the Internet (e.g., willful commercial piracy or malicious attempts to destroy the value of copyrighted works). In addition, Service Provider expressly reserves the right to terminate or suspend the Service of any Subscriber or account holder if Service Provider, in its sole judgment, believes that circumstances relating to the infringement of third party intellectual property rights warrant such action. These policies are in addition to and do not affect or modify any other rights Service Provider may have under law or contract.
You shall comply with all applicable local, state, national and international laws and regulations, including those related to data privacy, international communications, and exportation or technical or personal data. You represent that you are not a specifically designated individual or entity under any US embargo or otherwise the subject, either directly or indirectly (by affiliation, or any other connection with another party) to any order issued by any agency of LATAM and US Government limiting, barring, revoking or denying, in whole or in part your US export privileges. You agree to notify Service Provider if you become subject to any such order.
You shall not delete any proprietary designations, legal notices or other identifiers belonging to third parties from any information obtained or sent using the Service and shall not impersonate any person or use a false name while using the Service. You agree to obtain all required permissions if you use the Service to receive, upload, download, display, distribute, or execute Software or perform other works protected by intellectual property laws including copyright, trademark, trade secret and patent laws. You agree to cooperate with Service Provider and provide requested information in connection with all security and use matters. You agree to notify Service Provider promptly if you suspect unauthorized use of the Service or of your UserID. Service Provider reserves the right to cooperate with legal authorities and/or injured third parties in the investigation of any suspected crime or civil wrong. Such cooperation may include, but not be limited to, provision of account or user information or email as well as monitoring of the Service Provider network.
11. USER RESPONSIBILITY
Users need to be aware that they do not operate in a vacuum. Safe practices need to be taken by the users to protect themselves and others.
Users are accountable and responsible for account passwords and should keep them safe.
Do NOT share account information.
Do NOT leave username and passwords in the open.
If a user feels that the account was compromised, the username and or password should be changed at once.
Do NOT “save” usernames or passwords. Each should be entered at each login.
Users are responsible for protecting their equipment. Anti-virus software and firewalls are required for Company.
Users are accountable and responsible for any misuse of Service Provider Services that occurs through user’s account.
Users are responsible for protecting their accounts and must take steps to insure that others do not gain unauthorized access to user’s account or misuse Service Provider’s Services.
12. ADMINISTRATIVE DISCRETION
Service Provider administrators, staff, and executives have sole and final discretion over all aspects of service, the network, and this AUP. Service Provider reserves the right to terminate any account or service without cause or prior notice.
13. VIOLATIONS AND MONITORING
Service Provider can intend to actively monitor the content of web sites, e-mail, news groups, or material created or accessible over its Services of work. Service Provider reserves the right to monitor such Services or any Services on or within our network.
Reporting Violations and complaints:
Violations, attempted violations, and/or concerns should be addressed to firstname.lastname@example.org via Email.
When reporting anything to Service Provider please include:
- The internet protocol address used to commit the alleged violation.
- The date, time and time zone of such violation.
- Evidence of the violation, including, if applicable, full headers from emails, firewall logs, traffic dumps (example, the *.enc files generated by Network Ice’s Black Ice program or “hex” dump from any other firewall or IDS system) or information pertaining to the events in question.
- Do not send excerpted parts of a message; sending the entire message with full headers helps prevent misunderstandings based on incomplete information or information taken out of context. Service Provider has sole judgment and discretion on how we enforce this AUP. Guidelines as to punishment and legal action will be within the Service Provider’s legal department and administrative department discretion.
Changes to this AUP are considered effective immediately and it is the end user’s responsibility to stay current. Service Provider can make changes to the AUP at any time without notice. Changes to this document will be available on Service Provider’s web page.
Service Provider may, but is not required to, monitor your compliance, or the compliance of other subscribers, with this Acceptable Use Policy.
If you have questions please contact us.
For more information please write to email@example.com