Acceptable Use Policy

Customer services may be suspended or terminated for violation of this AUP in accordance with the service agreement between customer and CyberFortress.

“You” refers to the person using CyberFortress’ services and includes CyberFortress customers, their end customers, and all individual users.  Other capitalized terms used in this AUP have the meaning given in the CyberFortress Master Services Agreement at https://cyberfortress.com/ie/master-services-agreement/.

Inquiries regarding this policy should be directed to [email protected]

Abuse

You may not use CyberFortress’s Services to engage in, foster, or promote illegal, abusive, or irresponsible behavior, either alone or in combination with other services or systems.  For example, you may not the Services as part of any activity that involves:

  • Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network;
  • Monitoring data or traffic on any network or system without the express authorization of the owner of the system or network;
  • Interference with service to any user of the CyberFortress or other network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks;
  • Use of an Internet account or computer without the owner’s authorization;
  • Collecting or using email addresses, screen names or other identifiers without the consent of the person identified (including, without limitation, phishing, Internet scamming, password robbery, spidering, and harvesting);
  • Collecting or using information without the consent of the owner of the information;
  • Use of any false, misleading, or deceptive TCP-IP packet header information in an email or a newsgroup posting;
  • Use of the service to distribute software that covertly gathers information about a user or covertly transmits information about the user;
  • Use of the service for distribution of advertisement delivery software unless: (i) the user affirmatively consents to the download and installation of such software based on a clear and conspicuous notice of the nature of the software, and (ii) the software is easily removable by use of standard tools for such purpose included on major operating systems; (such as Microsoft’s “ad/remove” tool); or
  • Any conduct that is likely to result in retaliation against the CyberFortress network or website, or CyberFortress’s employees, officers or other agents, including engaging in behavior that results in any server being the target of a denial of service attack (DoS) or provoking a termination or threatened termination of CyberFortress’ public cloud services account.

Excessive Use of System Resources

You may not use your Service in a way that unnecessarily interferes with the normal operation of the CyberFortress services generally.

Vulnerability Testing

You may not attempt to probe, scan, penetrate or test the vulnerability of a CyberFortress system or network or to breach CyberFortress’s security or authentication measures, whether by passive or intrusive techniques, without CyberFortress’s express written consent.

Offensive Content

You may not publish, transmit or store on or via CyberFortress’s network and equipment any content or links to any content that CyberFortress reasonably believes:

  • Constitutes, depicts, fosters, promotes or relates in any manner to child pornography, bestiality, or non-consensual sex acts;
  • Is excessively violent, incites violence, threatens violence or contains harassing content or hate speech;
  • Is unfair or deceptive under the consumer protection laws of any jurisdiction, including chain letters and pyramid schemes;
  • Is defamatory or violates a person’s privacy;
  • Creates a risk to a person’s safety or health, creates a risk to public safety or health, compromises national security or interferes with an investigation by law enforcement;
  • Improperly exposes trade secrets or other confidential or proprietary information of another person;
  • Is intended to assist others in defeating technical copyright protections;
  • Infringes on another person’s copyright, trade or service mark, patent or other property right;
  • Promotes illegal drugs, violates export control laws, relates to illegal gambling or illegal arms trafficking;
  • Is otherwise illegal or solicits conduct that is illegal under laws applicable to you or to CyberFortress; or
  • Is otherwise malicious, fraudulent or may result in retaliation against CyberFortress by offended viewers.

Content “published or transmitted” via CyberFortress’s network or equipment includes Web content, email, bulletin board postings, chat and any other type of posting or transmission that relies on the Internet.

Copyrighted Material

You may not use CyberFortress’s network or Services to download, publish, distribute, or otherwise copy or use in any manner any text, music, software, art, image or other work protected by copyright law unless:

  • You have been expressly authorized by the owner of the copyright for the work to copy the work in that manner; or
  • You are otherwise permitted by established copyright law to copy the work in that manner.

It is CyberFortress’s policy to terminate in appropriate circumstances the services of customers who are repeat infringers.

Export Restrictions

The Services may be subject to export laws and regulations of the United States and other jurisdictions. Customer may not use or permit users to access or use the Services in violation of a U.S. export law or the applicable export laws of any other jurisdiction.  For example, Customer may not or authorize the use the Services in a U.S. -embargoed country or by a person who is national of a U.S.-embargoed country, any person who is on the list of Specially Designated Nationals and Blocked Persons issued by the U.S. Treasury Department’s Office of Foreign Asset Control (OFAC).  Customer may not use or authorize the use of the Services to process or store any content that is subject to the International Traffic in Arms Regulations maintained by the U.S. Department of State, or permit the use of the services by any person who Customer knows or have reason to know will utilize them in the design, manufacture, production, stockpiling or use of nuclear, chemical or biological weapons, or weapons of mass destruction. 

Quarantine

You agree that we may quarantine or delete any data stored on a shared system if the data is infected with a virus, or is otherwise corrupted, and has the potential to infect or corrupt the system or other customers’ data that is stored on the same system.

Share this on:

Type and hit ‘Enter’ to search.