Local Access,
Inc. Acceptable Use Policy (Page 1) We strongly recommend
that you review and follow Netiquette Guidelines. This will save you
from many problems and make your experience on the Internet much more
enjoyable.
This document is a
short list of Local Access Rules. Any user of Local Access must
follow them. They are intended to protect us, our users, and the Net.
Failure to comply may result in immediate termination of your
account without refund. Please do not try to be creative
about circumventing our rules.
Remember this:
You are responsible for
your account. This means that we expect you to maintain a reasonable
degree of security and not to share your password or leave it where
others can make use of it. Unless we have some reason to believe that
your account has been broken into by means essentially beyond your
control, we have to hold you responsible for anything done under your
login or from your dialup-IP host.
You may not:
- Do anything
illegal or anything that adversely affects Local Access's legal
interests. This includes violations of copyright, license, and other
applicable legal devices to programs, communications, and data.
- Use Local
Access's network for transmission of threatening, or harassing
materials.
- Share your
password with anyone or allow anyone else to use your personal use
account except in your immediate presence, nor login more than once
at a time on your personal account.
- Impersonate
another user, or falsify one's own username in e-mail, USENET
postings, Internet Relay Chat (IRC), or any other Internet service.
This policy does not preclude the use of nicknames on IRC.
- Tamper with
other accounts, or commit unauthorized intrusion into any part of
Local Access's system or use any of Local Access's machines, files
or accounts to intrude without authorization into any other system
(cracking).
- Use Local
Access services not included in your subscription or devise ways to
circumvent security so you have access to services you haven't paid
for (theft of services).
- Use the system
(willfully or negligently) in a manner that encumbers disk space,
processors or other system resources so as to interfere with others'
normal use of services on Local Access or on other systems (a
"denial of services" attack).
- Create or
participate in chain letters or pyramid schemes.
- Harass users
(on Local Access or elsewhere). Sending email or real-time messages
to a user who has asked explicitly and unambiguously that you not do
this is harassment. In some cases, a harassing user may be warned
against engaging in similar behavior with other users as well.
Publishing someone's real-world data (phone number, address, social
security number, etc.) in a newsgroup or on the web, etc. in such a
way as to cause the person trouble or to incite others to do so
(even if you don't do it yourself) is also forbidden.
- Spam the `net
with commercial or non-commercial postings. This is intended to
include crossposings and to apply without limitation to usenet and
email.
Next
Page>> |