SQI Acceptable Usage Policy
Of the On-Demand Applications
August 1, 2005 Update
Spamming -- Sending unsolicited bulk and/or commercial messages over the Internet (known as "spamming"). Also, maintaining an open SMTP relay is prohibited. When a complaint is received, SQI has the discretion to determine from all of the evidence whether the email recipients were from an "opt-in" email list.
Intellectual Property Violations -- Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including copyrights, trademarks, service marks, trade secrets, software piracy, and patents held by individuals, corporations, or other entities. Also, engaging in activity that violates privacy, publicity, or other personal rights of others. SQI is required by law to remove or block access to customer content upon receipt of a proper notice of copyright infringement. It is also SQI's policy to terminate the privileges of customers who commit repeat violations of copyright laws.
Obscene Speech or Materials -- Using SQI on-demand applications to advertise, transmit, store, post, display, or otherwise make available child pornography or obscene speech or material. SQI is required by law to notify law enforcement agencies when it becomes aware of the presence of child pornography on or being transmitted through Verio's network.
Defamatory or Abusive Language -- Using SQI's on-demand applications as a means to transmit or post defamatory, harassing, abusive, or threatening language.
Forging of Headers -- Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.
Illegal or Unauthorized Access to Other Computers or Networks -- Accessing illegally or without authorization computers, accounts, or networks belonging to another party, or attempting to penetrate security measures of another individual's system (often known as "hacking"). Also, any activity that might be used as a precursor to an attempted system penetration (i.e. port scan, stealth scan, or other information gathering activity).
Distribution of Internet Viruses, Worms, Trojan Horses, or Other Destructive Activities -- Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mailbombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the network or any connected network, system, service, or equipment.
Export Control Violations -- Exporting encryption software over the Internet or otherwise, to points outside the United States.
Other Illegal Activities -- Engaging in activities that are determined to be illegal, including advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, and pirating software.