Acceptable Use Policy
By using Online Media’s services, you agree to comply with this Policy. You are expected to use the Internet with respect, courtesy, and responsibility, giving due regard to the rights of other Internet users. We expect you to have a basic knowledge of how the Internet functions, the types of uses, which are generally acceptable, and the types of uses, which are to be avoided. Common sense is the best guide as to what is considered acceptable use. The following are unacceptable uses:
Illegality in any form, including but not limited to activities such as unauthorized distribution or copying of copyrighted software, violation of U.S. export restrictions, harassment, fraud, trafficking in obscene material, drug dealing, and other illegal activities.
The provisions of this Policy are intended as guidelines and are not meant to be exhaustive. Generally, conduct that violates law, regulation, or the accepted norms of the Internet community, whether or not expressly mentioned in this Policy, is prohibited. Online Media reserves the right at all times to prohibit activities that damage its commercial reputation and goodwill.
Online Media’s servers may be used only for lawful purposes. Transmission, distribution or storage of any material in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property right used without proper authorization, and material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws. Examples of non-acceptable content or links: "Pirated software", "Hackers programs or archives", "Warez Sites", "Irc Bots", "Mp3".
Online Media will be the sole arbiters as to what constitutes a violation of this provision, provided that all such determinations shall be made reasonably in good faith based on applicable law, regulation and the accepted norms of the Internet community.
System and Network Security
Violations of system or network security are prohibited, and may result in criminal and civil liability. Examples include, but are not limited to the following: Unauthorized access, use, probe, or scan of a systems security or authentication measures, data or traffic. Interference with service to any user, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks, forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting.
It is a violation for anyone to post information or to include programs on the web space provided through the Online Media services which consume excessive bandwidth, CPU time or storage space.
No one shall post unlawful or defamatory information about a person without their consent, intentionally inflicting emotional distress, or violating trademarks, copyrights, or other intellectual property rights.
Sending unsolicited mail messages, including, without limitation, commercial advertising and informational announcements, is explicitly prohibited. A user shall not use another site's mail server to relay mail without the express permission of the site.