Abuse Policy | Host Cafe Day


Abuse Policy

System (network) abuse is strictly prohibited. Host Cafe Day its sole discretion may terminate or modify service immediately and may bill you for any resulting support charges if you or someone who uses your Host Cafe Day engages in system abuse. Following is a list of actions, which are defined to be system abuse. This list is non-exclusive; any action about which there is any doubt should be referred to Network Abuse for evaluation.

Actions which constitute abuse include, but are not limited to:

Attempting to circumvent user authentication or security of any host, network, or account on Host Cafe Day systems or the Internet at large.
Attempting, in any way, to restrict, inhibit, interfere with, or degrade or deny service to any user, any host or any server on the Internet.
Falsifying, altering, or removing message headers.
Violating the regulations, rules or policies applicable to any network, server, computer database, or web site that you access.
Unauthorized port scanning. Using or distributing devices used for compromising security, such as password gatherers or password guessing programs, decoders, encryption circumvention devices, packet sniffers, unauthorized keystroke loggers, analyzers, cracking tools, or Trojan Horse programs.
Posting inappropriate messages to USENET newsgroups, e.g. posting large numbers of unsolicited posts indiscriminately or posting encoded binary files to USENET newsgroups not specifically named for that purpose.
Attempting to cancel, supersede, or otherwise interfere with email or USENET posts other than one’s own.
Engaging in harassment, whether through language, frequency, or size of messages. Using an account at another service provider to promote a Host Cafe Day web site in an abusive manner.
Using a Host Cafe Day account or network connection to collect replies to messages sent from another provider which violate these rules or those of that provider or to participate in an illegal scheme.
Reselling Host Cafe Day services to third parties who do not abide by these guidelines.
Using Host Cafe Day’s system or equipment in support of activities that would, if conducted on Host Cafe Day’s system, violate Host Cafe Day’s Network Abuse Policies.
Making any entry into Host Cafe Day’s websites or system to extract data is unauthorized and prohibited, unless it relates directly to evaluating or using Host Cafe Day’s commercial or residential services.
Accessing any other person’s computer or computer system, network, software, or data without his or her knowledge and consent.
Automated or manual generation of network traffic to simulate hits to blogs or other web-sites for reasons other than the good-faith intention of an Internet user to visit a web site to purchase goods or services or to obtain information, or with the intent to promote an unrelated web site. Examples: Click Fraud, Referrer Log Spamming, web-based comment spam.
Damage to any Host Cafe Day equipment in the customer’s possession will void the warranty on that piece of equipment and the customer will be responsible for paying for any resulting repairs or replacements.
Excessive bandwidth usage; defined as using more than 75% of the maximum allowed bandwidth for more than 72 hours in any month. If a customer’s use of the service is found to be excessive, Host Cafe Day may, in its sole discretion, place additional restrictions on the customer’s service, and suggest an upgrade of the customer’s service plan.
Using any telephony devices connected to the integrated telephone ports on the customer’s network which do not comply with FCC standards for operation on US telephone networks. Use of telephony equipment not designed for US telephone networks is expressly forbidden. Customer will be responsible for paying for any resulting repairs or other losses resulting from non-conforming equipment.
Storing any material or content on, or disseminate any material or content over, Host Cafe Day’s system in any manner that constitutes an infringement of third party intellectual property rights, including rights granted by U.S. copyright law. Owners of copyrighted works who believe that their rights under U.S. copyright law have been infringed may take advantage of certain provisions of the Digital Millennium Copyright Act of 1998 (the “DMCA”) to report alleged infringements. It is Host Cafe Day’s policy in accordance with the DMCA and other applicable laws to reserve the right to terminate service provided to any customer or user who is either found to infringe third party copyright or other intellectual property rights, or who One Server Hosting, in its sole discretion, believes is infringing these rights. One Server Hosting may terminate service at any time with or without notice for any affected customer or user.
Configuring the Host Cafe Day service or any related equipment to access or use a static IP address or use any protocol other than dynamic host configuration protocol unless you have a One Server Hosted with Host Cafe Day service plan that expressly permits you to do so.
Engaging in any activity which Host Cafe Day believes, in its sole judgment, to be in support of spamming or bulk e-mail activities, including forwarding or posting “chain letters” (multiple forwarding) of any type.