Download CLOUD FASTPATH ACCEPTABLE USE POLICY Tervela, Inc

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Wireless security wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Distributed firewall wikipedia , lookup

Unix security wikipedia , lookup

Security and safety features new to Windows Vista wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Transcript
CLOUD FASTPATH ACCEPTABLE USE POLICY
Tervela, Inc. (“Tervela”) has published this acceptable use policy ("AUP") in an effort to enhance the Cloud FastPath
services (the “Services”) and in an effort to provide a reliable, high-quality service to its customers. In that regard,
Tervela requires customers (collectively, its "Members") to utilize the Services responsibly and in compliance with
all applicable laws and the terms of this AUP.
Tervela reserves the right to modify this AUP at any time, effective upon posting of the modified AUP to
www.tervela.com/aup. By purchasing and using the Services, and thereby accepting the terms and conditions use of
the Services, you agree to abide by this AUP as modified from time to time. Your continued use of the Services after
posting of the modified AUP will be considered acceptance of any and all changes to the AUP.
VIOLATION OF ANY ASPECT OF THIS AUP IS STRICTLY PROHIBITED AND MAY RESULT IN THE
TERMINATION OR SUSPENSION OF THE SERVICES. YOU WILL REMAIN SOLELY LIABLE AND
RESPONSIBLE FOR YOUR, AND YOUR USERS (AS DEFINED BELOW) USE OF THE SERVICES AND ANY
AND ALL CONTENT THAT YOU DISPLAY, UPLOAD, DOWNLOAD OR TRANSMIT THROUGH THE USE
OF THE SERVICES.
“Users” include anyone who may have access to the Services, including, without limitation, employees and also
temporary employees, contractors, agencies, consultants, suppliers, customers and business partners.
The following list sets forth examples of prohibited uses of the Services. This list is not, and is not intended to be,
inclusive of all prohibited uses of the Services. You and all End Users must not:

















probe, scan, or test the vulnerability of any system or network;
breach or otherwise circumvent any security or authentication measures;
access, tamper with, or use non-public areas or parts of the Services, or shared areas of the Services you
haven't been invited to;
interfere with or disrupt any user, host, or network;
disseminate or host harmful content including, without limitation, viruses, Trojan horses, worms, time
bombs, cancelbots or any other computer programming routines that may damage, interfere with,
surreptitiously intercept or expropriate the Services;
access or search the Services by any means other than our publicly supported interfaces (for example,
"scraping");
send unsolicited communications, promotions or advertisements, or spam;
send altered, deceptive or false source-identifying information, including "spoofing" or "phishing";
promote or advertise products or services other than your own without appropriate authorization;
abuse Cloud FastPath referrals or promotions to get more usage than authorized or licensed;
abuse the Services in a manner that circumvents its storage space limits;
sell the Services or Services accounts via unauthorized channels;
use automated or other means to create accounts in bulk or to access the Services other than by using our
documented interface and/or APIs;
transmit, publish, disseminate, sell, store, host or share materials that are unlawful, libelous, defamatory,
obscene, pornographic, indecent, lewd, harassing, threatening, harmful, invasive of privacy or publicity
rights, abusive, inflammatory or otherwise objectionable;
post or send software or technical information in violation of U.S. export laws, including, without limitation,
the Export Administration Act and the Export Administration Regulations maintained by the Department of
Commerce;
violate the law in any way including storing, publishing or sharing material that's fraudulent, defamatory,
misleading, or that violates the privacy or infringes the rights of others; and
infringe the intellectual property rights or other proprietary rights including, without limitation, material
protected by copyright, trademark, patent, trade secret, or other intellectual property right used without proper
authorization.
Tervela Acceptable Use Policy August 2014
Violations of Tervela’s or any third party's server, system or network security through the use of the Services are
prohibited, and may result in criminal and civil liability. Tervela may, in its sole discretion, investigate incidents
involving such violations. Tervela may, in its sole discretion, involve and cooperate with law enforcement if Tervela
suspects a criminal violation. Examples of server, system or network security violations include, without limitation,
the following:

Unauthorized access to or use of data, systems, server or networks, including any attempt to probe, scan or
test the vulnerability of a system, server or network or to breach security or authentication measures without
express written authorization of the owner of the system, server or network.

Unauthorized monitoring of data or traffic on any network, server, or system without express written
authorization of the owner of the system, server, or network.

Interference with service to any user, host or network including, without limitation, mail bombing, news
bombing, other flooding techniques, deliberate attempts to overload a system, broadcast attacks and any
activity resulting in the crash of a host. Intentional interference also means the use of any kind of
program/script/command, or send messages of any kind, designed to interfere with a user's terminal session,
via any means, locally or by the Internet.

Forging of any TCP-IP packet header, e-mail header or any part of a message header. This prohibition does
not include the use of aliases or anonymous remailers.

Using manual or electronic means to avoid any use limitations placed on the Services such as timing out
specifications.

Failing to prevent unauthorized access to accounts, including any account passwords.
Tervela requests that anyone who believes that there is a violation of this AUP direct the information to [email protected]. If available, please provide the following information: IP address used to commit the alleged
violation; date and time of the alleged violation, including the time; evidence of the alleged violation. Tervela may, in
its sole discretion, investigate any violation reported.
Tervela Acceptable Use Policy August 2014