Acceptable Use Policy (AUP)
This Acceptable Use Policy (AUP) governs the use of the Services provided by DNTL Agency, and is effective upon acceptance and/or service activation. By activating the service or signing this Policy, you acknowledge and agree to be bound by this Policy, along with our Agreement and General Terms and Conditions Agreement, as well as any other agreements or policies expressly incorporated herein.
This Policy establishes the guidelines for your use of the Services, and any violation of this Policy may result in suspension or termination of the Services. The terms “service provider”, “we”, “us” or “our” refer to DNTL Agency, while the terms “you”, “your”, “User” or “customer” refer to any individual or entity who accepts this Agreement. This Policy does not confer any third-party rights or benefits.
At our sole discretion, we reserve the right to modify or change this Policy, as well as any agreements or policies incorporated herein, and any limitations or restrictions on the Services. These changes or modifications will be effective immediately upon being posted on the Site. Your continued use of the Services following such changes or modifications indicates your acceptance of this Policy and any Service limitations as last revised. If you do not agree with the revised Policy or Service limitations, you may terminate the service within 30 days, subject to the termination fees as specified in the incorporated agreements. We may, at our sole discretion, choose to notify you of changes or modifications to this Agreement via email. It is your responsibility to keep your account information current, and we assume no liability or responsibility if you fail to receive email notifications due to an inaccurate email address.
The following activities are considered as violations of this AUP and are prohibited on the SERVICE PROVIDER Consumer Services:
It is a violation of this AUP to transmit, upload, post, receive, store or present material or data that intentionally or unintentionally violates any local, state, national or international law or any rules or regulations with the force of law. Such material or data includes, but is not limited to, information about illegal goods or services, illegal substances, prostitution, illegal drugs, illegal weapons, terrorism, or any other conduct that constitutes a criminal offense.
Engaging in fraudulent financial activity, which includes offering to buy or sell products or services in a fraudulent manner or promoting illegal financial schemes such as pyramid schemes, Ponzi schemes, or unauthorized credit card charges.
Gambling: Engaging in or promoting gambling in violation of any laws.
Harm to Minors: Harming, attempting to harm, or exploiting minors in any way, including the use of SERVICE PROVIDER Consumer Services (i) to receive, distribute, solicit, present, or store illegal images or URLs containing child pornography, or (ii) to post or disclose personal identifiable information or private information of individuals under the age of 13 or in connection with materials directed towards children under the age of 13 without verifiable parental consent.
Threats and Harassment: Uploading, transmitting, or posting any material that (i) threatens, harasses, or defames individuals or encourages bodily harm or destruction of property, or (ii) espouses, promotes, or incites racism or bigotry towards governments, groups, organizations, or individuals.
Spamming: Sending or facilitating the sending of unsolicited commercial or bulk emails, including redirecting users to the CUSTOMER site hosted on or through SERVICE PROVIDER’s network through the use of another Internet service, whether or not the emails originated from CUSTOMER, were under CUSTOMER’s direction, or were sent by a third party under any direction.
Phishing: Attempting to impersonate any person or entity, falsifying sender addresses or network headers, or forging anyone else’s digital or manual signature.
Copyright or Trademark Infringement: Transmitting, uploading, or posting any material that infringes upon the copyrights, trademarks, patents, trade secrets, or other proprietary rights of any third party, including unauthorized copying of copyrighted material, incorporating a third party’s trademark in an email address without their prior permission, digitizing and distributing copyrighted material such as photographs from magazines, books, or other sources, and unauthorized transmission of copyrighted software.
Collecting Personal Data without Consent: Gathering or attempting to gather personal information about individuals without their knowledge or consent, or through deceptive means.
Email Tampering: Interfering with or canceling email messages that do not belong to the customer.
Unauthorized Access: Accessing or attempting to access other users’ accounts without their consent or knowledge, and attempting to breach the security of SERVICE PROVIDER’s or another entity’s or person’s computer systems, electronic communication systems or telecommunication systems. This includes misusing or abusing other users’ account access and passwords, distributing tools intended to compromise computer system or network security, and compromising the security of any Internet account or website.
Activities that Compromise Security. Engaging in activities that disrupt or degrade the use of, or interfere with the ability of others to effectively use the network, or any connected network system, service, or equipment, including the use or distribution of Internet viruses, worms, Trojan Horse programs, password guessing programs, decoders, keystroke loggers, cracking tools, packet sniffers, flooding of a network, encryption circumvention devices, or unauthorized port scanning.
Unauthorized Collection of Personal Identifiers. Collecting a large number of email addresses, screen names, or other identifiers of others without their prior consent or participating in the use of software, including spyware, designed to facilitate this activity.
Denial of Service Attacks. Routing or relaying traffic between unknown third parties or acting as a source of denial of service attacks, worms, or other service sending traffic to unknown third parties. CUSTOMER may not allow their network, through action or inaction, to be configured in such a way that gives a third party the ability to use the network in an illegal or inappropriate manner.
Personal Account Usage. The use of a personal account for high volume or commercial purposes is strictly prohibited. The SERVICE PROVIDER Consumer Services are designed for periodic, active usage of email, newsgroups, file transfers, internet chat, games, and web browsing. CUSTOMER may stay connected as long as they are actively using the connection for the aforementioned purposes. The SERVICE PROVIDER Consumer Services may not be used for standby or inactive purposes solely to maintain a connection, and pinging is expressly forbidden.
Network Investigation. Any form of investigative network activity, including port scanning and pinging, is prohibited.
Newsgroups. Any violation of the policies or terms of use of a newsgroup is strictly prohibited.
Furthermore, any material or activity related to the use of the SERVICE PROVIDER Consumer Services that SERVICE PROVIDER deems unlawful, offensive, or harmful will be regarded as a breach of this AUP.