Acceptable Use Policy
Tenzing’s customers (each a “Customer”) must exercise a high degree of judgment and responsibility with respect to their use of Tenzing’s services and they must comply at all times with this Acceptable Use Policy (the “Policy”). If a Customer or any third party affiliate of a Customer engages in any of the prohibited conduct identified below, this Policy will be deemed to be violated and Tenzing Managed IT Services reserves the right to terminate its relationship with the Customer, including any Hosting Agreement or Service Agreement then in effect with the Customer. Upon detection or notification of an alleged violation of the Policy and prior to exercising any right of termination, Tenzing Managed IT Services will initiate an immediate investigation into the violation. During the period of investigation, hosting services and outgoing e-mail may be suspended from the offending IP address(s) to prevent further violations. If a Customer is found, in Tenzing’s reasonable determination, to be in violation of this Policy, Tenzing Managed IT Services may, at its discretion and without notice to the Customer, terminate the offending account and all services under any Hosting Agreement or Service Agreement then in effect with the Customer. No refunds or fees shall be repayable to the Customer in the event of such termination or during any period of suspension.
(a) System Abuses
The Customer may not use the Tenzing Managed IT Services network or services in any way that adversely affects other Tenzing Managed IT Services customers. This includes but is not limited to: a) gaining or attempting to gain unauthorized access to servers or services. Such attempts include: “Internet scamming” (tricking other people into releasing their passwords), password robbery, security hole scanning, port scanning, probing, monitoring or testing for system or network vulnerabilities; b) introducing viruses, Trojan horses, trap doors, back doors, Easter eggs, worms, time bombs, packet bombs, cancel bots or other computer programming routines that are intended to damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or personal information; c) intentionally omitting, deleting, forging or misrepresenting transmission information, including headers, return addressing information and IP addresses; d) engaging in any of the foregoing activities using the service of another provider but channeling such activities through a Tenzing Managed IT Services account or re-mailer or using a Tenzing Managed IT Services account as a mail drop for responses to Unsolicited Commercial E mail (“UCE”) or hosting a website that is advertised via UCE or otherwise requiring return transit through Tenzing Managed IT Services’s Internet backbone; e) using IP addresses which were not assigned by Tenzing Managed IT Services; or f) running Internet Relay Chat (“IRC”) servers, bots or clients.
Please note: Busy or poorly scripted online chat systems, bulletin boards and other resource intensive applications may not be suitable for shared hosting services and can adversely affect the service of other customers. To avoid problems please consult with a Tenzing Managed IT Services sales representative before installing these kinds of applications.
(b) Posting of Adult Content and Links
Adult related content including adult-oriented images, text and links ARE permitted on Tenzing Managed IT Services’s eMax Hosting Platform but ARE NOT permitted on Tenzing Managed IT Services’s Synergy Hosting Platform.
(c) Sending Unsolicited Commercial Email or SPAM
The Customer may not send SPAM or UCE over the Tenzing Managed IT Services network. This includes third party “opt-in” lists. Tenzing Managed IT Services’s services must not be used to send UCE and will not host sites or information advertised in UCE. The Customer must also not host a publicly-accessible “open relay” SMTP or anonymous re-mailer service. The Customer is responsible for the actions of its users and must take all reasonable precautions to secure its servers and sites against SPAM exploits.
Please Note: Tenzing Managed IT Services’s email clusters will NOT process email lists. For security reasons, if you need to process a legitimate mail list you may use a Tenzing Managed IT Services dedicated mail list server for this purpose. Please contact a Tenzing Managed IT Services sales representative for more information (firstname.lastname@example.org).
(d) Email Services
The Customer may not use Tenzing Managed IT Services’s email clusters to offer end users email-only services. Unusual or excessive mail usage may be restricted by Tenzing Managed IT Services. Unused email accounts must be deleted from the system. Tenzing Managed IT Services reserves the right to disable email accounts on its email clusters it believes are inactive.
(e) Posting of Illegal Content
The Customer must not include content or have links to content that: a) is unlawful or is reasonably considered offensive by the web community; b) promotes injury or physical harm against any group or individual; c) promotes or teaches illegal activities d) exploits or depicts children in a negative/sexual way; e) infringes on copyright, patents, trademarks, trade secrets, or other intellectual property including pirated computer programs, cracker utilities, warez and software serial numbers or registration codes; f) violates any law, statute, ordinance or regulation governing the Customer’s business or activities, including without limitation the laws and regulations governing export control, unfair competition, false advertising, consumer protection, issuance or sale of securities, trade in firearms, privacy, data transfer and telecommunications.
(f) Tenzing Managed IT Services Administrative Access
The Customer acknowledges that to facilitate efficient server management, inventory and related activities Tenzing Managed IT Services servers may include a Tenzing Managed IT Services administrative account and password and/or a Tenzing Managed IT Services daemon. All reasonable precautions are made by Tenzing Managed IT Services to maintain the security of these tools and the privacy of client data. The Customer will not tamper, hinder, delete or in anyway change the functioning of these tools.
Tenzing Managed IT Services cannot monitor or control all the activities of the Customers. Subject to its right to terminate its agreements with a Customer which has violated this Policy, Tenzing Managed IT Services exercises no control over Customer content and does not actively screen or censor the activities or content of Customers. The Customer, not Tenzing Managed IT Services, assumes all responsibility and liability relating to its Internet activities.