Agreement and Acceptable Use Policy
This Agreement and Acceptable Use Policy specifies certain actions prohibited by
TigerEcomm for users of the TigerEcomm Network. TigerEcomm reserves the right to modify this Policy at any time to stay in compliance with any laws, regulations and security requirements. By using
TigerEcomm services, any customer, employee or third party unconditionally accepts the terms of this policy.
ILLEGAL USE
The TigerEcomm Network may be used only for lawful purposes. Transmission, distribution or storage of any material in violation of any applicable law or regulation coming to or from any unauthorized network or system is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property rights used without proper authorization; government and military data protected by law and national security; university and academic data protected by public policy; and material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws. Any violation of the above which compromises the integrity of the
TigerEcomm Network or any other network is strictly prohibited.
NETWORK AND MACHINE RESOURCES
TigerEcomm reserves the right to monitor and allocate network and machine resources. IP addresses are allocated per server and according to virtual server specifications. Cgi resources are allocated one per domain (a virtual host is required for each cgi-bin and is considered a virtual host).
TigerEcomm in its sole discretion and upon reasonable notice to customer reserves the right to discontinue any hosting account and/or any script which causes excessive server load and/or uses excessive server and network resources.
SYSTEM AND NETWORK SECURITY
Violations of system or network security are prohibited, and may result in criminal and civil liability.
TigerEcomm will investigate incidents involving such violations and may involve and cooperate with law enforcement authorities if a criminal violation is suspected.
TigerEcomm respects the privacy of customer data and vigilantly protects that data and ALL customers who host with
TigerEcomm. If any violation of the law or this AUP is suspected, TigerEcomm reserves the right to investigate. Use of the
TigerEcomm network constitutes consent to monitoring. Examples of unlawful acts, system, or network security violations include, without limitation, the following:
Unauthorized access to or use of data, systems or networks, including any attempt to probe, damage, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network.
Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network. Interference with service to any user, host or network including, without limitation, mailbombing, flooding, deliberate attempts to overload a system and broadcast attacks.
Unauthorized access to any data, system, or network from an unauthorized system or network for any purpose which is not lawful or which is intended to do harm.
Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting. Electronic forging of any kind to include but not limited to IP addresses, domains, business names, etc.
EMAIL
Sending unsolicited mail messages, including, without limitation, unwanted advertising and informational announcements, is explicitly prohibited. A user shall not use another site's mail server to relay mail without the express permission of the site owner. Legitimate mailing lists and subscriber lists are acceptable. Otherwise, it is spam.
USENET
Posting the same messages to multiple newsgroups (excessive cross-posting or multiple-posting, also known as "SPAM") is expressly prohibited.
INDIRECT OR ATTEMPTED VIOLATIONS OF THE POLICY, AND ACTUAL OR ATTEMPTED VIOLATIONS BY A THIRD PARTY ON BEHALF OF AN
TigerEcomm CUSTOMER OR A CUSTOMER'S END USER, SHALL BE CONSIDERED VIOLATIONS OF THE POLICY BY SUCH CUSTOMER OR END USER.
For Example:
If you are hosting a bulk email site on TigerEcomm servers and you use another ISP to SPAM from in order to reference your
TigerEcomm site by IP address or domain name, you are violating TigerEcomm policy and possibly the law.
If you have been granted telnet access to TigerEcomm servers, multiple telnet log-ons are strictly prohibited and you must come from a valid IP address. Forgery is against the law.
Any type of denial of service attack from valid or invalid addresses is a violation of
TigerEcomm security policy and against the law.
If you have been granted password privileges for FTP or telnet, sharing your password with an unauthorized user or third party is strictly prohibited.
Complaints regarding illegal Use or System or Network Security issues should be sent to
network@tigerecomm.com
Complaints regarding email abuse should be sent to abuse@tigerecomm.com
Complaints regarding USENET abuse or SPAM should be sent to abuse@tigerecomm.com
COPYRIGHT INFRINGEMENT
The Digital Millennium Copyright Act provides limitations for service provider liability relating to material online with regard to information residing, at the discretion of the user, on a system or network that the service provider controls or operates. 17. U.S. 512(c). The designated agents for notification of claimed infringement are:
TigerEcomm Corporation
7709 San Felipe; No. 203
Houston, TX 77063
For other legal issues or concerns contact:
TigerEcomm Corporation
7709 San Felipe; No. 203
Houston, TX 77063
TigerEcomm does not tolerate any pornographic material or spamming and both infringements will result in an investigation and possible termination and removal of the site and/or virtual server without a refund.
TigerEcomm prides itself as a responsible member of the Internet community and is committed to protecting the data of and providing quality service to all
TigerEcomm customers all of the time.
INTERACTION WITH TigerEcomm STAFF
Any threat, vulgar and profane language directed at any TigerEcomm staff member through phone or email may result in immediate termination of an account. Any violation of this policy by any employee, contractor or third party programmer of
TigerEcomm should be reported immediately. Bottom line is let's work together toward a mutually beneficial relationship and create a prosperous and responsible Internet community.