***This message is automatically generated.  Please do not respond to
***this message. The reply-to and from address have been purposely set
***to false addresses to prevent looping.

Thank you for contacting the Advanced Internet Technologies, Inc. Network
Abuse Center.  We work diligently to enforce all the provisions
of our Network's Acceptable Use Policy.

When contacting our network about a problem or complaint, such
as unsolicited email or inappropriate Usenet posting, please 
enclose sample messages, including full headers.  For hacking,
port scanning, denial-of-service attacks, and other illegal 
activities, please include appropriate logs.  In such reports, 
please be sure to indicate what time zone any date stamps in 
your logs may be using.

It is our policy to only take action against our customers.  If 
we receive a complaint about the behavior of a customer of one
of our customers or a reseller, we will forward the complaint
to our customer for action.  It is, however, a violation of our
AUP for our customers to allow their customers to violate our 
AUP.

Although, we are not able to reply to each message individually, 
all complaints are investigated and handled according to our 
network AUP, which is included below.  If you are sending your
message using anonymous or forged headers, please include contact
information in the body of your message, in case we need to ask 
you for additional information.  Otherwise, we may be forced to
disregard your complaint.

Thank you,
Network Abuse Center
Advanced Internet Technologies, Inc. 

NETWORK ABUSE POLICY 

This document sets forth Advanced Internet Technologies, Inc. (AIT, Inc.) Network 
Abuse Policy and supersedes any other written or oral policy. AIT, Inc. may modify 
this Policy from time to time as reasonably
required. The provisions of this Policy are intended as guidelines and are not meant 
to be exhaustive. Any activity or conduct that violates law, regulations or the 
accepted norms of the Internet
community or may harm AIT, Inc. facilities, reputation, goodwill or customer 
relations, whether or not expressly mentioned in this policy, is strictly prohibited. 
AIT, Inc. reserves the right at all
times to revise its Network Abuse Policy and to take appropriate steps to address 
violations of that Policy as outlined in Section V herein. 

I. SYSTEM AND NETWORK SECURITY 

It is AIT, Inc. goal to: (1) protect network resources, (2) preserve the privacy and 
security of AIT, Inc. networks, (3) preserve the privacy and security of AIT, Inc. 
customers' networks,
and (4) maximize the utility of AIT, Inc. and the Internet. 

1.Customers may not: (i) tamper with other customer accounts, (ii) commit unauthorized 
intrusion into any part of AIT, Inc. network or systems; or (iii) use any of AIT, Inc.
machines, files, accounts, or systems to intrude without authorization into any other 
network. 

2.Customer may not use AIT, Inc. services not included in Customer's account, nor 
circumvent security (or assist others to circumvent security) in order to access 
services for which
the person accessing those services has not entered into a binding agreement with AIT, 
Inc.. This includes, but is not limited to, the scanning of AIT, Inc. or other 
networks with
intent to breach and/or evaluate security. 

3.Customer may not use AIT, Inc. network or systems in a manner that encumbers disk 
space, processors or other system resources beyond those allowed by Customer's specific
type of account. Customers may not make deliberate attempts to interfere with a 
service, overload a service, or attempt to disable a host. 

4.The use or attempted use of Internet services or systems without authorization is 
strictly prohibited. This includes, but is not limited to, password cracking, 
defrauding others into
releasing their passwords, denial-of-service attacks (sending packets with an illegal 
packet size, UDP flooding, ping-flooding, half-open TCP connection flooding, etc.). 
Additionally,
Customers may not use programs, scripts, commands, or otherwise send messages with the 
intent to interfere with a Customer's terminal session. 

II.UNLAWFUL, HARMFUL OR OFFENSIVE COMMUNICATIONS 

It is a violation of this policy for Customer's knowingly to use the facilities or 
services of AIT, Inc. to
create, transmit, post or otherwise make available through the Internet any material 
that is unlawful, abusive or harmful to AIT, Inc. facilities, customers, goodwill or 
reputation.
Communications prohibited by this Policy include, but are not limited to materials 
that infringe copyright, trademark or other intellectual property; obscenity, 
indecency, or child
pornography; and defamatory communications. Although it is not AIT, Inc. policy to 
monitor, censor or edit information made available through the use of its facilities, 
AIT, Inc. reserves the
right to take appropriate action, as described in Section V herein, when it becomes 
aware of transmissions, postings or other communications that violate this Policy. 

III.E-MAIL 

1. Customer may not send Unsolicited Commercial E-mail (UCE/UBE) to any other customer 
account that has not specifically requested such information or that causes complaints 
from the
recipients of such unsolicited e-mail. AIT, Inc. services may not be used to send 
unsolicited advertising messages to other network Customers. Customer may not 
flood/spam
newsgroups with commercial or non-commercial postings. 

2. Customers may not continue to send commercial e-mail to a recipient if recipient 
has requested that Customer discontinue such communication. Any use of AIT, Inc. 
property for the
composition, distribution, or collection of bulk e-mail, abusive e-mail, or any form 
of unsolicited, commercial e-mail is strictly prohibited. 

3. AIT, Inc. prohibits the transmission of e-mail to non-consenting recipients that is 
harassing, libelous, defamatory, threatening, abusive or hateful. 

4."Mail-bombing" (i.e. flooding a Customer site with large or numerous e-mail 
messages) is strictly prohibited. 

5. Customers may not forge header information. 

6. AIT, Inc. prohibits the use of Customer's account, or network connection, to 
collect replies of messages sent from any other provider that violate the rules of 
this Policy or those of
the originating provider. 

7. This Policy also applies to other means of Internet-based transmissions, including 
without limitation to Internet fax or Internet phone. 

IV.USENET 

1. It is the responsibility of those persons who post messages to determine a 
newsgroup's etiquette. Customers that submit content to newsgroups should refrain from 
posting
advertisements or other messages that are not expressly permitted by a newsgroup's 
charter of Frequently Asked Questions. Message posters are expected to submit messages
relevant to the newsgroup's topic and agree not to submit the same message to large 
numbers of forums or newsgroups. 

2. Customers are prohibited from forging header information and from posting chain 
letters of any type. 

3. Customers may only post binary files to newsgroups designed for that purpose. 

4. Customers may not cancel or supersede a posting of a message other than their own 
unless they serve as newsgroup moderators in the performance of their on-line 
responsibilities.

5. AIT, Inc. prohibits the use of Customer's account, or network connection, to 
collect replies of messages sent from any other provider that violate the rules of 
this Policy or those of
the originating provider. 


V.ENFORCEMENT 

AIT, Inc. procedure is to deal with each net abuse case on an individual basis. Based 
on an investigation and a determination of the nature and severity of the abuse, AIT, 
Inc. may take
immediate action, without prior notice, against any party or parties found in 
violation of this policy. Such action may include, but is not limited to, blocking of 
access to particular websites,
newsgroups or other material found to violate the Network Abuse Policy, or termination 
of Customer's service with AIT, Inc.. 

Customer agrees that it will take appropriate action against persons who obtain 
Internet access or other Internet based services from Customer and who violate AIT, 
Inc. Network Abuse
Policy. Customer further agrees that it will cooperate fully with AIT, Inc. in any 
actions taken by AIT, Inc. to enforce this Network Abuse Policy.

Reply via email to