








 |
Acceptable
use policy
When there are questions or remarks about the
content of this aup, please contact us via the
"Contact us" link on top of this page.
Violations may be
reported to abuse@dvkhosting.be
|
|
 |
|
 |
Acceptable Use Policy (AUP)
General
 |
DVK Systems & Consultancy BVBA customers found to be in violation of
this policy in the sole and final determination of DVK Systems & Consultancy BVBA
will be subject to immediate suspension and eventual
termination of the customer's account without refund for
pre-paid services.
|
 |
DVK Systems & Consultancy BVBA may subject the customer to liability for
damages caused and costs incurred by enforcing this
policy.
|
 |
Any act which results
in the disruption of service to other DVK Systems & Consultancy BVBA
customers or to other Internet users will subject the
customer to immediate account cancellation without
refund for pre-paid services, and may subject the
customer to liability for the cost of services lost,
plus the costs of investigation.
|
 |
Any attempt to gain
unauthorized access to any system, either on DVK Systems & Consultancy BVBA
network or any other network, will subject the customer
to disciplinary action up to and including, but not
limited to, immediate account cancellation without
refund for pre-paid services, and may subject the
customer to liability for damages caused and costs
incurred by the unauthorized access or attempt to gain
unauthorized access.
|
 |
Customer agrees to
reimburse DVK Systems & Consultancy BVBA costs
associated with investigating and resolving any incident
covered by this AUP.
|
Accounts and
passwords
 |
Customer shall handle
identification data (user names,passwords), address data
and/or codes with utmost care.
|
 |
Identification data,
address data and/or codes are not to be shared with any
other party without prior consent by DVK Systems &
Consultancy BVBA.
|
 |
Customer shall be held
responsible and liable for any misuse carried out using
identification data belonging to customer, regardless of
the identity of the actual person carrying out this
misuse.
|
Network usage
Customers are not allowed
to use DVK Systems & Consultancy BVBA systems or networks to:
 |
disrupt the network
host systems. B. disrupt network services or net
communications.
|
 |
attempt security
breaches on any system connected to the Internet.
|
 |
damage or impair the
DVK Systems & Consultancy BVBA equipment, hardware,
software, data, or operations.
|
 |
use the system for
illegal or criminal purposes.
|
 |
carry out deceptive
on-line marketing practices.
|
 |
violate the privacy of
individual users on the Internet by reading their E-mail
or private communications to other users.
|
 |
introduce viruses and
other types of malicious programs into any network or
system.
|
 |
use the system as a
means to improperly gain access to other computer
systems, networks, or programs.
|
 |
gain or try to gain
unauthorized access to or use of data, systems or
networks, including any attempt to probe, scan or test
the vulnerability of a system or network or to breach
security or authentication measures without express
authorization of the owner of the system or network.
|
 |
perform unauthorized
monitoring of data or traffic on any network or system
without express authorization of the owner of the system
or network.
|
 |
interfere with service
to any user, host or network including, without
limitation, mail bombing, flooding, deliberate attempts
to overload a system and broadcast attacks.
|
 |
intentionally seek
information on, obtain copies of, or modify files, other
data, or passwords belonging to others, or represent
themselves as another user unless explicitly authorized
to do so by that user.
|
 |
disrespect legal
protection provided by copyright and license to programs
and data.
|
 |
disrespect the
integrity of computing and network systems; for example,
users shall not intentionally develop or use programs
that harass other users or infiltrate a computer,
computing system or network and/or damage or alter the
software components of a computer, computing system or
network.
|
 |
transmit any material
(by email, uploading, posting, or otherwise) that,
intentionally or unintentionally, violates any
applicable national or international law, or any rules
or regulations promulgated there under.
|
 |
transmit any material
(by email, uploading, posting, or otherwise) that
threatens or encourages bodily harm or destruction of
property.
|
 |
transmit any material
(by email, uploading, posting, or otherwise) that
harasses another Internet user.
|
 |
make fraudulent offers
to sell or buy products, items, or services or to
advance any type of financial scam such as (but not
limited to) "pyramid schemes", "get rich quick schemes"
and "chain letters".
|
 |
add, remove or modify
identifying network header information in an effort to
deceive or mislead.
|
 |
attempt to impersonate
any person by using forged headers or other identifying
information.
|
 |
access, or attempt to
access, the accounts of others, or to penetrate, or
attempt to penetrate, security measures of DVK Systems &
Consultancy BVBA or another entity's computer software
or hardware, electronic communications system, or
telecommunications system, whether or not the intrusion
results in the corruption or loss of data.
|
 |
transmit any material
(by email, uploading, posting, or otherwise) that
infringes any copyright, trademark, patent, trade secret,
or other proprietary rights of any third party,
including, but not limited to, the unauthorized copying
of copyrighted material, the digitization and
distribution of photographs from magazines, books, or
other copyrighted sources, and the unauthorized
transmittal of copyrighted software.
|
 |
collect, or attempt to
collect, personal information about third parties
without their knowledge or consent.
|
E-mail
Customers are not allowed to:
 |
transmit unsolicited
commercial email ("UCE") or unsolicited bulk email ("UBE")
messages to any Internet user via their DVK Systems &
Consultancy BVBA account or via any other Internet
connection that in any way implicates DVK Systems &
Consultancy BVBA.
|
 |
use e-mail, anonymous
or otherwise, to send threatening or harassing messages.
|
 |
send e-mail to more
than 10 addresses at the same time (using the To, Cc, or
Bcc headers), with the exception of mailing lists hosted
by DVK Systems & Consultancy BVBA.
|
 |
send e-mail to more
than 200 addresses in total without prior permission
from DVK Systems & Consultancy BVBA; previous item still
applies when permission is granted.
|
 |
forge any part of the
header information in an e-mail message.
|
 |
temporarily or
permanently connect an insufficiently secured mail
server to the DVK Systems & Consultancy BVBA network.
Your mail server is only allowed to accept incoming
e-mail that is destined for your own e-mail domain(s),
and it is only allowed to transmit outgoing e-mail that
originates inside your own IP range or local network.
Under no circumstance is your mail server allowed to
accept e-mail from outside your network for subsequent
delivery outside your network. In short: your mail
server must be either a starting point or an end point
for e-mail, not a transit point. DVK Systems &
Consultancy BVBA explicitly reserves the right to block
an insufficiently secured mail server without advance
notice. Any kind of mailing list use by any customer
within the DVK Systems & Consultancy BVBA network must
follow the guidelines available at MAPS http://mail-abuse.org/manage.html,
and RFC 3098 http://www.faqs.org/rfcs/rfc3098.html.
These guidelines are considered an integral part of this
AUP.
|
WWW
DVK Systems & Consultancy BVBA reserves the right to remove
from its servers any customer-produced information found to
be offensive by members of the Internet Community, or
unlawful by national or international regulations (specifically,
but not only, protected material). 'Offensive' includes
advertising the website by means disallowed by chapters 3
and 4 of this AUP ('spamvertizing'), regardless of the
actual ISP used to advertise the website. Repeated
complaints may result in the termination of a customer's
account and removal of stored data without prior notice.
|
|
 |