The following constitute violations of this Acceptable Use Policy (AUP):
Illegal use. Using the Services to transmit or obtain any material (by email, uploading, downloading, posting, or otherwise) that, intentionally or unintentionally, violates any applicable local, state, national or international law.
Harm to minors. Using the Services to harm, or attempt to harm, minors in any way, including but not limited to, hosting, possessing, disseminating, transmitting, or knowingly receiving material that is unlawful, including child pornography or obscene material.
Threats. Using the Services to transmit or obtain any material (by email, uploading, downloading, posting, or otherwise) that threatens or encourages bodily harm or destruction of property.
Harassment. Using the services to transmit or obtain any material (by email, uploading, downloading, posting, or otherwise) that harasses another.
Objectionable content. Using the services to post, transmit, obtain, or disseminate any content that is, in our opinion, abusive, libelous, slanderous, defamatory, incites hatred or is otherwise offensive or objectionable.
Fraudulent activity. Using the Services to make fraudulent offers to sell or buy products, items, or services or to advance any type of financial scam or scheme, including but not limited to “pyramid schemes”, “Ponzi schemes”, “chain letters”, and “phishing” schemes.
Forgery or impersonation. Adding, removing or modifying identifying network header information in an effort to deceive or mislead is prohibited. Attempting to impersonate any person by using forged headers or other identifying information is prohibited.
Unsolicited commercial email/Unsolicited bulk e-mail. Using the Services to transmit any unsolicited commercial e-mail or unsolicited bulk e-mail (‘spam’) is prohibited. Activities that have the effect of facilitating unsolicited commercial e-mail or unsolicited bulk e-mail, whether or not that e-mail is commercial in nature, are also prohibited. The Services may not be used to collect responses from unsolicited email sent from accounts on other Internet hosts or email services. Additionally, “mail bombing,” the sending of numerous copies of the same or substantially similar messages or very large messages or files, with the intent to disrupt a server or account, is prohibited.
Unauthorized access/hacking/circumvention. Using the Services to attempt to access, the accounts of others without their knowledge and consent, or to circumvent, penetrate, or attempt to circumvent or penetrate, security measures of Black Box or another entity’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in the corruption or loss of data. Use or distribution of tools designed to compromise security, such as password guessing programs, cracking tools, packet sniffers or network probing tools, is strictly prohibited.
Copyright or trademark infringement. Using the Services to transmit or obtain any material (by email, uploading, downloading, file sharing, posting, or otherwise) that infringes any copyright, trademark, patent, trade secret, or other proprietary rights of any third party, including, but not limited to, the unauthorized copying of copyrighted material, the digitization and distribution of photographs from magazines, books, or other copyrighted sources, the unauthorized transmittal of copyrighted software, and the unauthorized uploading and downloading of music and/or video. We reserve the right to suspend or terminate the Service upon receipt of notice that you have engaged in such activities, regardless of whether or not infringement has been proven.
Collection of personal data. Using the Service to collect, or attempt to collect, private personal information about third parties without their knowledge and consent.
Unassigned IP address. Using an IP address that has not been assigned to you.
Unauthorized sharing. You agree not to allow others to use the Service. Specific actions you will refrain from taking include, but are not limited to, sharing with others, password and security keys for the Services, or, to the extent Customer accounts and authentication is provided, your account user name and password. You may at your own risk and responsibility permit your employees, guests and visitors to access the Services. You may not, absent explicit permission from Black Box, set up and connect to the Black Box Network your own networking devices. You shall ensure that other such employees, guests and visitors are aware of and comply with this AUP, and you will, in any event, remain responsible for all use of the Services by your employees, guests and visitors whether or not authorized by you.
Commercial use. Reselling the Services without Black Box’s written authorization. The Services are designed for the individual use of you and your guests and may not be used for the provision of commercial services. You also agree not to use the Services as an Internet service provider, or for any other related business enterprise including, without limitation, IP address translation or similar facilities intended to provide additional access to the Internet using the Services.
Servers. Operating or allowing others to operate servers of any type, or any other device, equipment and/or software providing server-like functionality in connection with the Services, unless expressly authorized by Black Box.
Network disruptions. Using the Services for any activity that adversely affects the ability of other people or systems to use the Services or the Internet. This includes “denial of service” (DoS) attacks against another network host or individual user. It also includes, without limitation, posting or transmitting any information or software that contains a virus, lock, key, bomb, Trojan horse, cancelbot or other harmful feature. Interference with or disruption of other network users, network services or network equipment is prohibited.
Violating Black Box policy or guideline. You are responsible for any misuse of the Services that occurs through your equipment or through third party equipment that you authorize to access the Network, including through the provision of a Network security keys, or through the use of your log in information. You must therefore take steps to insure that others do not gain unauthorized access to the Network through your actions or your account or otherwise misuse the Services.