CIIC Web Site Acceptable Uses Policy.
Welcome to CIIC Web Hosting and Design. We are pleased that you chose CIIC’s web hosting service to for your website.
If you are unclear or do not agree with the terms and conditions included in the Agreement for CIIC Services or would like to cancel your CIIC account, please contact CIIC at (818) 591-7825.
Attention: Michael Aronoff
140 Orange Paseo #4102
Pasadena, CA 91105
Phone: 818-591-7825
This Acceptable Use Policy (this “AUP”) describes material and activities that are not allowed in connection with the Services offered by CIIC. This AUP is not exhaustive, and CIIC reserves the right to take remedial action in connection with content or uses that are not specifically described below. You are responsible for violations of this AUP by anyone using your account with your permission or on an unauthorized basis. You are also responsible for violations of this AUP by Your Users. Your use of the Services to assist another person in an activity that would violate this AUP if performed by you is a violation of the AUP. We may modify this AUP at any time by posting a revised version on the CIIC website.
WHEREAS, CIIC distributes and provides various products and services that enable entities to publish and maintain World Wide Web pages by way of CIIC web hosting services.
WHEREAS, Customer desires to utilize the CIIC services to develop Customer’s presence on the World Wide Web.
NOW, THEREFORE, in consideration of the mutual promises set forth herein, the parties hereto agree as follows:
Abusive or Illegal Activity or Content
You may not use our services for any unlawful or abusive purpose. Prohibited activities include:
- Illegal Activities. Any use of the Services to engage in, further, promote, or encourage illegal conduct or activities.
- Fraudulent or Harmful Activities. Engaging in activities that is deceptive or harmful to others, or that would harm CIIC’s operations or reputation, including offering or disseminating fraudulent goods, services, schemes, or promotions (e.g., make-money-fast schemes, Ponzi and pyramid schemes, phishing, etc), deceptively impersonating another person or entity, or engaging in other fraudulent or misleading practices.
- Violation of Intellectual Property Rights. Using the Services in a manner that violates, infringes on or misappropriates the intellectual property or proprietary rights of any third party, including without limitation any rights in or to copyright, patent, trademark, trade secret, privacy or publicity, and publishing content intended to assist others in unlawfully circumventing technical measures intended to protect any such rights.
- Unlawful Pornography. Disseminating child pornography or depictions of nudity or sexual activity obtained or disseminated without the consent of those depicted (e.g., “revenge pornography”).
- Violent, Harassing, or Abusive Content. Content that incites or threatens violence against any person, promotes terrorism, is intended to harass, abuse or invade the privacy of any individual, creates a risk to the physical safety or health of any individual or to public safety or health, or that threatens or encourages harm on the basis of race, ethnicity, national origin, religion, caste, sexual orientation, sex, gender, gender identity, serious disease or disability, or immigration status.
- Controlled Substances. Unlawfully selling or distributing controlled substances, including but not limited to any illegal or prescription drugs.
Security Violations
You may not use our services to violate the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a “System”). Prohibited activities include:
- Harmful Software. Software, Content or any other technology that may damage, surreptitiously intercept, interfere with, or expropriate any computer system, program, or data, including any viruses, malware, spyware, adware, Trojan horses, or worms.
- Unauthorized Access. Accessing or using any system without permission, including attempting to scan, probe, or test the vulnerability of a system or to breach any authentication or security measures used by a system.
- Interception. Monitoring of traffic or data on a system without permission.
- Falsification of Origin. Using fake or misleading network packet headers, e-mail headers, or any part of a message describing its origin or route.
Network Abuse
You may not make network connections to any hosts, users, or networks unless you have permission to communicate with them. Prohibited activities include:
- Deceitful Actions. Introducing intentionally, knowingly or recklessly, any virus or other contaminating code into the service, or transmitting, collecting, or using information, including screen names email addresses, or other identifiers, by covert means (such as phishing, scamming, password theft, and harvesting).
- Intentional Interference. Interfering with the proper functioning of any system, including any attempt to overload a system by email bombing, broadcast attacks, packet flooding, or conducting a denial of service (“DoS”) attack.
- Monitoring or Crawling. Monitoring or crawling of a system that impairs or disrupts the system being monitored or crawled, or other scraping of any content.
- Operation of Certain Network Services. Operating open proxies, open mail relays, open recursive domain name servers, Tor exit nodes, VPN, or other similar network services.
- Avoiding System Restrictions. Using manual or electronic means to avoid any use limitations placed on a system, such as access limits and storage restrictions.
- Retaliation Against CIIC. Any conduct that is likely to result in retaliation against CIIC, including the services, or employees, including engaging in behavior that results in any CIIC server being the target of a DoS attack.
- Withholding Identity. Any activity intended to withhold or cloak identity or contact information, including the omission, deletion, forgery or misreporting of any transmission or identification information, such as return mailing and IP addresses.
- Mining of Cryptocurrencies. Mining any cryptocurrency, including but not limited to BitCoin or any similar currency, without explicit written permission.
E-Mail and Other Message Abuse; Spamming
You may not publish, send, distribute, or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations (like “spam”), including commercial advertising and informational announcements. You may not alter or obscure mail headers or assume a sender’s identity without the sender’s explicit permission. You will not collect replies to messages sent from another internet service provider if those messages violate this AUP or the acceptable use policy of that provider. You must use reasonable efforts to secure any device or network within your control against being used in breach of the applicable laws against spam and unsolicited email, including where appropriate by the installation of antivirus software, firewall software and operating system and application software patches and updates. You will not take any action which directly or indirectly results in any of our IP addresses being listed on any abuse database (e.g., Spamhaus).
You must comply with the laws and regulations applicable to bulk or commercial email in your jurisdiction. In addition, your bulk or commercial email must meet the following requirements:
- You must have a privacy policy or similar disclosure posted for each domain associated with the mailing;
- You must have the means to track anonymous complaints;
- You must not obscure the source of your e-mail in any manner;
- You must post an email address for complaints (such as abuse@yourdomain.com) in a conspicuous place on any website associated with the email, and you must promptly respond to messages sent to that address;
- Your intended recipients have given their consent to receive e-mail via some affirmative means, such as an opt-in procedure, and you can produce the evidence of such consent within 72 hours of receipt of a request by the recipient or CIIC;
- You must use reasonable means to ensure that the person giving consent is the owner of the e-mail address for which the consent is given;
- You must include the recipient’s e-mail address in the body of the message or in the “TO” line of the e-mail; and
- You must honor revocations of consent.
These e-mail policies apply to messages sent using the services, or to messages sent from any system by you or any person on your behalf that directly or indirectly refer the recipient to a site hosted via the services. In addition, you may not use a third-party e-mail service that does not practice similar procedures for all of its customers. These requirements apply to distribution lists created by third parties to the same extent as if you created the list.
Other
You must have valid and current information on file with your domain name registrar for any domain hosted on the CIIC network. You may only use IP addresses assigned to you by CIIC.
Consequences of Violation of AUP
If we determine that you have violated this AUP, we may remove, disable access to, or modify any content or resource and/or to suspend or terminate your use of the services. We also may block any content or traffic belonging to you or to users where the services are being used unlawfully or not in accordance with this AUP. Our right to terminate or suspend your use of the services applies even if a violation is committed unintentionally or without your authorization. Such right is not an obligation on us to act at any given time or with respect to any given customer, and we may exercise such right at any time.
Reporting of Violations of this AUP
If you become aware of any suspected violation of this AUP, please notify us by providing a full explanation of the bases for the violation. To report any violation of this AUP or make related inquiries, please contact us here.
You acknowledge that you have read this agreement and agree to abide by its terms. You agree that this agreement constitutes the entire agreement between you and CIIC and supersedes any other agreements (verbal or written) or statements. You give CIIC the permission to either move your existing domain to our servers or establish a new domain name on your behalf, as indicated above.