eighty8networks’ Services may only be accessed and used for lawful purposes. All Users are responsible for any transmission it sends, receives, posts, accesses, or stores using the eighty8networks Services, including the content of any communication, with or without the Users consent. Additionally, transmitting, distributing or storing any material that violates any federal or state laws or regulations, or any industry or community standard are strictly prohibited. Accordingly, Users may not:
Attempt to use or gain unauthorized access to data, accounts, hosts, servers, systems or networks of others, nor relay communications through any third party servers without the owner’s authorization.
Probe, scan or test the vulnerability of our system or the eighty8networks Network without eighty8networks’ prior written consent.
Interfere with the eighty8networks Services or another’s use of the Accelerate Technology Services in any way.
Infringe the intellectual property rights or other proprietary rights including, without limitation material protected by copyright, trademark, patent, trade secret or other intellectual property right.
Violate the rules, regulations or policies that apply to any third-party network, server, or computer database that is accessed by any User.
Disseminate or post material that is unlawful, libelous, defamatory, obscene, indecent, explicit, lewd, harassing, threatening, harmful, invasion of privacy or publicity rights, abusive, inflammatory or otherwise objectionable.
Offer or disseminate fraudulent goods, services, schemes, or promotions (e.g.: pyramid schemes)
Disseminate or post harmful content, including, without limitation, Trojan horses, worms, time bombs, zombies, cancelbots or any other computer or other programming routine that may damage, interfere with, secretly intercept or seize any system, program, data, or personal information.
Email spamming (or mailbombing) is strictly prohibited. Accordingly, Users may not transmit (a) unsolicited advertisements, commercial e-mail messages or promotional messages, (b) unsolicited informational announcements of any kind; (c) chain mail, (d) numerous copies of the same or substantially similar messages, (e) messages which contain no substantive content, (f) empty messages, or (g) large messages or files that disrupt a server, account, newsgroup or chat service.
Use eighty8networks Services to violate email, telemarketing or telecommunications laws, rules or regulations, or in a manner that has a negative effect on our network or service delivery (including, without limitation, by the use of mass dial or pre-recorded calling applications in violation of law or regulation; overloading servers; violating caller-ID regulations; causing any portion of eighty8networks’ network to be blocked by other network providers; generating unresolved third-party complaints or complaints, which in eighty8networks’ sole discretion, impose an unreasonable administrative burden on eighty8networks).
Users may not upload, post or otherwise distribute or facilitate distribution of any email that contains any viruses, corrupted files, or any other similar software or programs that may damage the eighty8networks Network or the operation of any other computer.
Use any forged, false or misleading number identity, email header, invalid or non-existent domain names in email or postings or employ techniques to hide, obscure or counterfeit the source of an email or posting.