System and Network Security
Violations of system or network security are strictly prohibited, and may result in criminal and civil liability. RC investigates all incidents involving such violations and will cooperate with law enforcement if a criminal violation is suspected. Examples of system or network security violations include, without limitation, the following:
- Introduction of malicious programs into the network or server (example: viruses, worms, Trojan Horses and other executables intended to inflict harm).
- Effecting security breaches or disruptions of Internet communication and/or connectivity. Security breaches include, but are not limited to, accessing data of which the Customer is not an intended recipient or logging into a server or account that the Customer is not expressly authorized to access. For purposes of this section, "disruption" includes, but is not limited to port scans, flood pings, email-bombing, packet spoofing, IP spoofing and forged routing information.
- Executing any form of network activity that will intercept data not intended for the Customer's account.
- Circumventing user authentication or security of any account.
- Denial of service attack or distributed denial of service attack.
- Use of an account to gain passwords, encryption codes, or other security information of the provider or other sites on any computer network
Violators of the policy are responsible, without limitations, for the cost of labor to correct all damage done. No service credits will be issued to Customers disconnected for network violations.
All services provided by RC may be used for lawful purposes only. Transmission, storage, or presentation of any information, data or material in violation of any United States Federal, State or City law is prohibited. This includes, but is not limited to: copyrighted material, material we judge to be threatening, obscene or illegal (child pornography, threatening messages, fraudulent activities) or material protected by trade secret and other statute. The subscriber agrees to indemnify and hold harmless RC and its employees from any claims resulting from the use of the service which damages the subscriber or any other party.
Also prohibited are sites that promote any illegal activity or present content that may be damaging to our servers or any other server on the Internet. Links to such materials are also prohibited.
RC will be the sole arbiter as to what constitutes a violation of this provision.
Pornography and sex-related merchandising is prohibited on all RC servers. This includes sites that may infer sexual content, or link to adult content elsewhere.
RC provides web hosting to many clients, and we have a responsibility to protect each client and to provide the best services available. When you abide by these guidelines, you help ensure that our obligations to you and our other customers are met.
When you employ services such as Link Exchange or a CGI host who lets 1000s of others link to their site, it is important that you require any sites you exchange ads with to display your ad on their server. Not only will not abiding to this guideline cause your site to load slowly, you will be responsible for the data transfer used in this process.
Company will not censor any content on the INTERNET. It will be the client's responsibility for the usage of his account and any consequences of this usage.
IRC - Company does not allow any type of IRC services on our network.
Email & Bulk Email
Spamming, or the sending of unsolicited e-mail including, without limitation, commercial advertising and informational announcements, from an RC server or using an e-mail address or domain that is maintained on an RC machine as reference is STRICTLY prohibited. A user shall not use another site's mail server to relay mail without the express permission of the site.
We also monitor "Bulk E-mail". While we offer mailing lists as part of our reseller hosting accounts, any mailing over 2500 messages must be pre-approved. In addition, any site sending over 5000 messages per month will be considered "Bulk". Bulk e-mail ties up the mail queue and delays messages for other users. Therefore, we must limit the amount of use on any shared server. There are some arrangements that can be made to accommodate a user with a large list which includes extra fees and special mail scheduling software.
We may allow programs to run continually in the background. These are considered on a case-by-case basis and an extra charge will be incurred based on system resources used and operational maintenance needed.
Company will require customer to take corrective measures (modify, remove scripts) on sites using more than 10% of total system resources. Upon notice from company, customer shall promptly eliminate any program, script or service obstruction.
Customer resources impacting server performance, stability or availability are subject to immediate suspension until corrective action is taken, such as presence of malware, extreme CPU usage, spam resulting from an account compromise, etc....
We will not tolerate any abusive behavior towards our staff or systems. Abusive behavior may consist of: inappropriate language, threats, support flooding, etc...
Company retains the right to change any or all of the above Policies, Guidelines, and Disclaimer without notification.