Agreement and Acceptable Use Policy

This Agreement and Acceptable Use Policy specifies certain actions prohibited by TigerEcomm for users of the TigerEcomm Network. TigerEcomm reserves the right to modify this Policy at any time to stay in compliance with any laws, regulations and security requirements. By using TigerEcomm services, any customer, employee or third party unconditionally accepts the terms of this policy. 

ILLEGAL USE

The TigerEcomm Network may be used only for lawful purposes. Transmission, distribution or storage of any material in violation of any applicable law or regulation coming to or from any unauthorized network or system is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property rights used without proper authorization; government and military data protected by law and national security; university and academic data protected by public policy; and material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws. Any violation of the above which compromises the integrity of the TigerEcomm Network or any other network is strictly prohibited. 

NETWORK AND MACHINE RESOURCES

TigerEcomm reserves the right to monitor and allocate network and machine resources. IP addresses are allocated per server and according to virtual server specifications. Cgi resources are allocated one per domain (a virtual host is required for each cgi-bin and is considered a virtual host). TigerEcomm in its sole discretion and upon reasonable notice to customer reserves the right to discontinue any hosting account and/or any script which causes excessive server load and/or uses excessive server and network resources. 

SYSTEM AND NETWORK SECURITY

Violations of system or network security are prohibited, and may result in criminal and civil liability. TigerEcomm will investigate incidents involving such violations and may involve and cooperate with law enforcement authorities if a criminal violation is suspected. TigerEcomm respects the privacy of customer data and vigilantly protects that data and ALL customers who host with TigerEcomm. If any violation of the law or this AUP is suspected, TigerEcomm reserves the right to investigate. Use of the TigerEcomm network constitutes consent to monitoring. Examples of unlawful acts, system, or network security violations include, without limitation, the following: 

Unauthorized access to or use of data, systems or networks, including any attempt to probe, damage, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network. 

Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network. Interference with service to any user, host or network including, without limitation, mailbombing, flooding, deliberate attempts to overload a system and broadcast attacks.

Unauthorized access to any data, system, or network from an unauthorized system or network for any purpose which is not lawful or which is intended to do harm. 

Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting. Electronic forging of any kind to include but not limited to IP addresses, domains, business names, etc. 



EMAIL

Sending unsolicited mail messages, including, without limitation, unwanted advertising and informational announcements, is explicitly prohibited. A user shall not use another site's mail server to relay mail without the express permission of the site owner. Legitimate mailing lists and subscriber lists are acceptable. Otherwise, it is spam.

USENET

Posting the same messages to multiple newsgroups (excessive cross-posting or multiple-posting, also known as "SPAM") is expressly prohibited. 


INDIRECT OR ATTEMPTED VIOLATIONS OF THE POLICY, AND ACTUAL OR ATTEMPTED VIOLATIONS BY A THIRD PARTY ON BEHALF OF AN TigerEcomm CUSTOMER OR A CUSTOMER'S END USER, SHALL BE CONSIDERED VIOLATIONS OF THE POLICY BY SUCH CUSTOMER OR END USER. 

For Example: 

If you are hosting a bulk email site on TigerEcomm servers and you use another ISP to SPAM from in order to reference your TigerEcomm site by IP address or domain name, you are violating TigerEcomm policy and possibly the law. 

If you have been granted telnet access to TigerEcomm servers, multiple telnet log-ons are strictly prohibited and you must come from a valid IP address. Forgery is against the law. 

Any type of denial of service attack from valid or invalid addresses is a violation of TigerEcomm security policy and against the law. 

If you have been granted password privileges for FTP or telnet, sharing your password with an unauthorized user or third party is strictly prohibited. 

Complaints regarding illegal Use or System or Network Security issues should be sent to network@tigerecomm.com 

Complaints regarding email abuse should be sent to abuse@tigerecomm.com

Complaints regarding USENET abuse or SPAM should be sent to abuse@tigerecomm.com 

COPYRIGHT INFRINGEMENT 

The Digital Millennium Copyright Act provides limitations for service provider liability relating to material online with regard to information residing, at the discretion of the user, on a system or network that the service provider controls or operates. 17. U.S. 512(c). The designated agents for notification of claimed infringement are: 

TigerEcomm Corporation
7709 San Felipe; No. 203
Houston, TX 77063 

For other legal issues or concerns contact: 
TigerEcomm Corporation
7709 San Felipe; No. 203
Houston, TX 77063 



TigerEcomm does not tolerate any pornographic material or spamming and both infringements will result in an investigation and possible termination and removal of the site and/or virtual server without a refund. TigerEcomm prides itself as a responsible member of the Internet community and is committed to protecting the data of and providing quality service to all TigerEcomm customers all of the time. 

INTERACTION WITH TigerEcomm STAFF

Any threat, vulgar and profane language directed at any TigerEcomm staff member through phone or email may result in immediate termination of an account. Any violation of this policy by any employee, contractor or third party programmer of TigerEcomm should be reported immediately. Bottom line is let's work together toward a mutually beneficial relationship and create a prosperous and responsible Internet community.