Home About us Contact us Forum Support Control Panel
DVK Hosting
Acceptable Use Policy
 
Back
Start
Light
Medium
Pro
XLPro
XXLPro
Options
Acceptable Use Policy


Acceptable use policy

When there are questions or remarks about the content of this aup, please contact us via the "Contact us" link on top of this page.

Violations may be reported to abuse@dvkhosting.be


Acceptable Use Policy (AUP)

General

bullet

DVK Systems & Consultancy BVBA customers found to be in violation of this policy in the sole and final determination of DVK Systems & Consultancy BVBA will be subject to immediate suspension and eventual termination of the customer's account without refund for pre-paid services.

bullet

DVK Systems & Consultancy BVBA may subject the customer to liability for damages caused and costs incurred by enforcing this policy.

bullet

Any act which results in the disruption of service to other DVK Systems & Consultancy BVBA customers or to other Internet users will subject the customer to immediate account cancellation without refund for pre-paid services, and may subject the customer to liability for the cost of services lost, plus the costs of investigation.

bullet

Any attempt to gain unauthorized access to any system, either on DVK Systems & Consultancy BVBA network or any other network, will subject the customer to disciplinary action up to and including, but not limited to, immediate account cancellation without refund for pre-paid services, and may subject the customer to liability for damages caused and costs incurred by the unauthorized access or attempt to gain unauthorized access.

bullet

Customer agrees to reimburse DVK Systems & Consultancy BVBA costs associated with investigating and resolving any incident covered by this AUP.

Accounts and passwords

bullet

Customer shall handle identification data (user names,passwords), address data and/or codes with utmost care.

bullet

Identification data, address data and/or codes are not to be shared with any other party without prior consent by DVK Systems & Consultancy BVBA.

bullet

Customer shall be held responsible and liable for any misuse carried out using identification data belonging to customer, regardless of the identity of the actual person carrying out this misuse.

Network usage

Customers are not allowed to use DVK Systems & Consultancy BVBA systems or networks to:

bullet

disrupt the network host systems. B. disrupt network services or net communications.

bullet

attempt security breaches on any system connected to the Internet.

bullet

damage or impair the DVK Systems & Consultancy BVBA equipment, hardware, software, data, or operations.

bullet

use the system for illegal or criminal purposes.

bullet

carry out deceptive on-line marketing practices.

bullet

violate the privacy of individual users on the Internet by reading their E-mail or private communications to other users.

bullet

introduce viruses and other types of malicious programs into any network or system.

bullet

use the system as a means to improperly gain access to other computer systems, networks, or programs.

bullet

gain or try to gain unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network.

bullet

perform unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network.

bullet

interfere with service to any user, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks.

bullet

intentionally seek information on, obtain copies of, or modify files, other data, or passwords belonging to others, or represent themselves as another user unless explicitly authorized to do so by that user.

bullet

disrespect legal protection provided by copyright and license to programs and data.

bullet

disrespect the integrity of computing and network systems; for example, users shall not intentionally develop or use programs that harass other users or infiltrate a computer, computing system or network and/or damage or alter the software components of a computer, computing system or network.

bullet

transmit any material (by email, uploading, posting, or otherwise) that, intentionally or unintentionally, violates any applicable national or international law, or any rules or regulations promulgated there under.

bullet

transmit any material (by email, uploading, posting, or otherwise) that threatens or encourages bodily harm or destruction of property.

bullet

transmit any material (by email, uploading, posting, or otherwise) that harasses another Internet user.

bullet

make fraudulent offers to sell or buy products, items, or services or to advance any type of financial scam such as (but not limited to) "pyramid schemes", "get rich quick schemes" and "chain letters".

bullet

add, remove or modify identifying network header information in an effort to deceive or mislead.

bullet

attempt to impersonate any person by using forged headers or other identifying information.

bullet

access, or attempt to access, the accounts of others, or to penetrate, or attempt to penetrate, security measures of DVK Systems & Consultancy BVBA or another entity's computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in the corruption or loss of data.

bullet

transmit any material (by email, uploading, posting, or otherwise) that infringes any copyright, trademark, patent, trade secret, or other proprietary rights of any third party, including, but not limited to, the unauthorized copying of copyrighted material, the digitization and distribution of photographs from magazines, books, or other copyrighted sources, and the unauthorized transmittal of copyrighted software.

bullet

collect, or attempt to collect, personal information about third parties without their knowledge or consent.

E-mail

Customers are not allowed to:

bullet

transmit unsolicited commercial email ("UCE") or unsolicited bulk email ("UBE") messages to any Internet user via their DVK Systems & Consultancy BVBA account or via any other Internet connection that in any way implicates DVK Systems & Consultancy BVBA.

bullet

use e-mail, anonymous or otherwise, to send threatening or harassing messages.

bullet

send e-mail to more than 10 addresses at the same time (using the To, Cc, or Bcc headers), with the exception of mailing lists hosted by DVK Systems & Consultancy BVBA.

bullet

send e-mail to more than 200 addresses in total without prior permission from DVK Systems & Consultancy BVBA; previous item still applies when permission is granted.

bullet

forge any part of the header information in an e-mail message.

bullet

temporarily or permanently connect an insufficiently secured mail server to the DVK Systems & Consultancy BVBA network. Your mail server is only allowed to accept incoming e-mail that is destined for your own e-mail domain(s), and it is only allowed to transmit outgoing e-mail that originates inside your own IP range or local network. Under no circumstance is your mail server allowed to accept e-mail from outside your network for subsequent delivery outside your network. In short: your mail server must be either a starting point or an end point for e-mail, not a transit point. DVK Systems & Consultancy BVBA explicitly reserves the right to block an insufficiently secured mail server without advance notice. Any kind of mailing list use by any customer within the DVK Systems & Consultancy BVBA network must follow the guidelines available at MAPS http://mail-abuse.org/manage.html, and RFC 3098 http://www.faqs.org/rfcs/rfc3098.html. These guidelines are considered an integral part of this AUP.

WWW

DVK Systems & Consultancy BVBA reserves the right to remove from its servers any customer-produced information found to be offensive by members of the Internet Community, or unlawful by national or international regulations (specifically, but not only, protected material). 'Offensive' includes advertising the website by means disallowed by chapters 3 and 4 of this AUP ('spamvertizing'), regardless of the actual ISP used to advertise the website. Repeated complaints may result in the termination of a customer's account and removal of stored data without prior notice.

Previous
Copyright 2003-2007 DVK Systems & Consultancy BVBA. All rights reserved