Acceptable Use Policy (AUP)
By using our web hosting services, you agree to comply with our policies. You are expected to use the Internet with respect, courtesy, and responsibility, giving due regard to the rights of other Internet users. We expect you to have a basic knowledge of how the Internet functions, the types of uses which are generally acceptable, and the types of uses which are to be avoided. Common sense is the best guide as to what is considered acceptable use. The following are unacceptable uses:
Illegality in any form, including but not limited to activities such as unauthorized distribution or copying of copyrighted software, violation of U.S. / Indian export restrictions, harassment, fraud, trafficking in obscene material, drug dealing, and other illegal activities.
The provisions of this Policy are intended as guidelines and are not meant to be exhaustive. Generally, conduct that violates law, regulation, or the accepted norms of the Internet community, whether or not expressly mentioned in this Policy, is prohibited. SHIMAS Networks Pvt. Limited reserves the right at all times to prohibit activities that damage its commercial reputation and goodwill.
SHIMAS Networks Pvt. Limited' servers may be used only for lawful purposes. Transmission, distribution or storage of any material in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property right used without proper authorization, and material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws. Examples of non-acceptable content or links: "Pirated software", "Hackers programs or archives", "Warez Sites", "Irc Bots", "Mp3".
We will be the sole arbiters as to what constitutes a violation of this provision.
System and Network Security
Violations of system or network security are prohibited, and may result in criminal and civil liability. Examples include, but are not limited to the following: unauthorized access, use, probe, or scan of a systems security or authentication measures, data or traffic. Interference with service to any user, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks. Forging of any TCP-IP packet header or any part of the header information in an e-mail or a newsgroup posting.
Misuse of System Resources
It is a violation for anyone who, including but not limited to, employs posts or programs which consume excessive CPU time or storage space, permits the use of mail services, mail forwarding capabilities, POP accounts, or auto responders other than for their own account; or resale of access to CGI scripts installed on our servers.
No one shall post defamatory, scandalous, or private information about a person without their consent, intentionally inflicting emotional distress, or violating trademarks, copyrights, or other intellectual property rights.
Sending unsolicited mail messages, including, without limitation, commercial advertising and informational announcements, is expressly prohibited. A user shall not use another site's mail server to relay mail without the express permission of the site.
It is contrary to SHIMAS Networks Pvt. Limited policy for customers to use our servers to effect or participate in any of the following activities:
- To post to any Usenet or other newsgroup, forum, e-mail mailing list or other similar group or list articles which are off-topic according to the charter or other owner-published FAQ or description of the group or list.
- To send unsolicited mass e-mailings, if such unsolicited e-mailings provoke complaints from the recipients
- To engage in any of the foregoing activities using the service of another provider, but channeling such activities through a SHIMAS Networks Pvt. Limited provided server, or using a SHIMAS Networks Pvt. Limited provided server as a maildrop for responses
- To falsify user information provided to SHIMAS Networks Pvt. Limited or to other users of the service in connection with use of a SHIMAS Networks Pvt. Limited service.
Consequences of Violation
When SHIMAS Networks Pvt. Limited becomes aware of an alleged violation of its Acceptable Use Policy, SHIMAS Networks Pvt. Limited will initiate an investigation. During the investigation SHIMAS Networks Pvt. Limited may restrict Customer 's access in order to prevent further possible unauthorized activity. Depending on the severity of the violation, SHIMAS Networks Pvt. Limited may, at its sole discretion, restrict, suspend, or terminate Customer's account and/or pursue other civil remedies. If such violation is a criminal offence, SHIMAS Networks Pvt. Limited will notify the appropriate law enforcement department of such violation.
SHIMAS Networks Pvt. Limited does not issue service credits for any outages incurred through service disablement resulting from Policy violations.
SHIMAS Networks Pvt. Limited reserves the right to add, delete, or modify any provision of this Policy at any time without notice. Reporting Network Abuse: Any party seeking to report any violations of SHIMAS Networks Pvt. Limited’ policy may contact via e-mail: firstname.lastname@example.org or email@example.com .
This document was last modified on Wednesday, May 27, 2009
SHIMAS Networks launches Messaging Support Service for corporate clients. Multilayered email security clubbed with 24/7 premium support are part of the new offerings.