> Weather


Local Access, Inc. Acceptable Use Policy  (Page 1)

We strongly recommend that you review and follow Netiquette Guidelines. This will save you from many problems and make your experience on the Internet much more enjoyable.
 


This document is a short list of Local Access Rules. Any user of Local Access must follow them. They are intended to protect us, our users, and the Net.
Failure to comply may result in immediate termination of your account without refund. Please do not try to be creative about circumventing our rules.
 

Remember this:

You are responsible for your account. This means that we expect you to maintain a reasonable degree of security and not to share your password or leave it where others can make use of it. Unless we have some reason to believe that your account has been broken into by means essentially beyond your control, we have to hold you responsible for anything done under your login or from your dialup-IP host.
 


You may not:

  1. Do anything illegal or anything that adversely affects Local Access's legal interests. This includes violations of copyright, license, and other applicable legal devices to programs, communications, and data.
  2. Use Local Access's network for transmission of threatening, or harassing materials.
  3. Share your password with anyone or allow anyone else to use your personal use account except in your immediate presence, nor login more than once at a time on your personal account.
  4. Impersonate another user, or falsify one's own username in e-mail, USENET postings, Internet Relay Chat (IRC), or any other Internet service. This policy does not preclude the use of nicknames on IRC.
  5. Tamper with other accounts, or commit unauthorized intrusion into any part of Local Access's system or use any of Local Access's machines, files or accounts to intrude without authorization into any other system (cracking).
  6. Use Local Access services not included in your subscription or devise ways to circumvent security so you have access to services you haven't paid for (theft of services).
  7. Use the system (willfully or negligently) in a manner that encumbers disk space, processors or other system resources so as to interfere with others' normal use of services on Local Access or on other systems (a "denial of services" attack).
  8. Create or participate in chain letters or pyramid schemes.
  9. Harass users (on Local Access or elsewhere). Sending email or real-time messages to a user who has asked explicitly and unambiguously that you not do this is harassment. In some cases, a harassing user may be warned against engaging in similar behavior with other users as well. Publishing someone's real-world data (phone number, address, social security number, etc.) in a newsgroup or on the web, etc. in such a way as to cause the person trouble or to incite others to do so (even if you don't do it yourself) is also forbidden.
  10. Spam the `net with commercial or non-commercial postings. This is intended to include crossposings and to apply without limitation to usenet and email.

Next Page>>



Copyright © 1995-2001 Local Access, Inc.




Register your domain name NOW at 1995domain! It's quick and easy!

Assess 125x125

Protect your computer from Hackers with ZONE ALARM PRO!!


Use Trend-Micro's free online scanner to keep your computer virus free!