I. Customers of ChainLinkHosting found to be in breach of these Terms (at the sole and sole discretion of ChainLinkHosting) shall be subject to immediate account suspension and eventual termination without refund of prepaid services.

II. ChainLinkHosting can hold the customer liable for damage caused and for the costs incurred to enforce these conditions.

III. Any act resulting in the interruption of services to other ChainLinkHosting customers or to other Internet users will subject the customer to immediate account termination without refund of prepaid services, and may subject the customer to liability for the cost of lost services, plus the costs of the investigation.

IV. Any attempt to gain unauthorized access to any system, whether in ChainLinkHosting's network or in any other network, will subject the customer to disciplinary action, up to and including, but not limited to, immediate account termination without notice. refund for prepaid services, and may subject the customer to liability for damages caused by gaining unauthorized access or attempting to gain unauthorized access.

V. The customer agrees to reimburse the costs ChainLinkHosting incurs to investigate and settle any incident mentioned in these Terms.

1. Accounts and Passwords
A. The customer will store identification data (login names, passwords), address data and/or codes with the utmost care.

B. Identification data, address data and/or codes may not be shared with any other party without the explicit prior permission of ChainLinkHosting.

C. The customer is responsible and liable for any misuse committed using the identification data belonging to the customer, regardless of the identity of the person who actually commits the misuse.

2. Network Usage
Customers are not permitted to use ChainLinkHosting systems and/or networks to:

A. disrupt systems in the network.
B. disrupt network services or network communications.
C. attempt to breach security measures of any system connected to the Internet.
D. damage or disable the equipment, hardware, software, data or services of ChainLinkHosting.
E. use the system for illegal purposes.
F. engage in deceptive online marketing practices.
G. invade the privacy of individual users by viewing their email or their private communications with other users.
H. introduce viruses or other forms of malicious programs into the network or system.
I. use the system to gain unauthorized access to other computer systems, networks or programs.
J. gain (or attempt to gain) unauthorized access to any system or network, including any attempt to probe, scan, or test a system or network for vulnerabilities, or to breach any security or authentication measures, without the explicit consent of the owner of the system or network.
K. monitor data or traffic of any network or system without permission without explicit permission from the owner of the system or network.
L. Interfere with any service to any user, system or network, including, but not limited to, mail bombing, flooding, deliberate attempts to overload a system, and broadcast attacks.
M. knowingly seek information about others, or copy or change files, other data or passwords of others, or impersonate another user, unless with the express permission of that user.
N. violate any legal protection of copyright or licensing of programs and data.
O. violate the integrity of computer and network systems; example: customers will not intentionally develop or use programs that interfere with other users or infiltrate and/or damage a computer, computer system or network or modify the software components of a computer, computer system or network.
P. transmit any material (whether by email, uploading, posting or otherwise) that, whether intentionally or not, violates any applicable national or international law, or any rules arising therefrom.
Q. transmit any material (whether by email, uploading, posting or otherwise) that contains threats or incites physical violence or destruction of property.
R. transmit any material (via e-mail, uploading, posting or otherwise) that causes a nuisance to another Internet user.
S. make fraudulent offers to buy or sell products, items or services, or promote any form of financial deception, such as (but not limited to) "pyramid schemes", "get rich quick schemes" or " chain letters".
T. add, remove or change identifying network header information for the purpose of deceiving and misleading.
U. Attempt to impersonate another person by using forged headers or other identifying information.
V. access or attempt to access the accounts of others, or to penetrate or attempt to penetrate any security measures of the computer software or hardware, electronic communication systems or telecommunication systems of ChainLinkHosting or any other party, regardless of whether access results in data corruption or loss.
W. transmit any material (whether by email, uploading, posting or otherwise) that infringes any copyright, trademark, patent, trade secret or other proprietary right of any third party, including, but not limited to, unauthorized copying of any copyrighted material, digitizing and distributing photographic material from magazines, books or other copyrighted sources, and unauthorized transmission of copyrighted software.
X. collect, or attempt to collect, personal information from third parties without their knowledge or consent.
Y. send email, post messages or otherwise do so to buy, sell, or promote the website, products, topics or services without explicitly obtaining prior permission from third parties to do so.

3. Email
Customers are not allowed to:

A. send unsolicited commercial e-mail ("UCE") or unsolicited bulk e-mail ("UBE") to any Internet user through a ChainLinkHosting account or through any other network connection that is in any way ChainLinkHosting implies.
B. use e-mail, whether or not anonymous, to send threatening or harassing messages.
C. send e-mail to more than 30 addresses at the same time (using To, Cc or Bcc header lines), with the exception of mailing lists managed by ChainLinkHosting.
D. send e-mail to more than a total of 100 addresses without prior permission from ChainLinkHosting; section 3C continues to apply when consent has been granted.
E. Forge any part of the header information in any e-mail message.
F. to temporarily or permanently connect an insufficiently secured mail server to the network of ChainLinkHosting. Your mail server should only accept incoming mail destined for your own domain(s), and only send outgoing mail if it originates from your own network/IP range. Under no circumstances should your server accept mail from outside your network and then deliver it outside your network as well. In short: your mail server should be the start or end station for e-mail, not an intermediate station. ChainLinkHosting explicitly reserves the right to block an insufficiently secured mail server without prior notice.
G. Any form of mailing list use ChainLinkHosting network must comply with the guidelines of RFC 3098, which can be found at http://www.faqs.org/rfcs/rfc3098.html. These guidelines form an integral part of this AUP.

4. WWW
ChainLinkHosting reserves the right to remove any information produced by the customer, which is considered offensive by members of the Internet community, or is illegal under national or international regulations (specific, but not limited to, protected material), from its delete servers. 'Offensive' also means advertising the website in a manner that is prohibited in Articles 3 and 4 of this AUP ('spamvertizing'), regardless of whether the advertising of the website takes place via another ISP. Repeated complaints may result in the termination of the customer's account and deletion of stored data without prior notice. Violations may be reported to [email protected]

5. Traffic Monitoring and Packet Capture (PCAP)

A. By using ChainLinkHosting's services, you acknowledge and agree that ChainLinkHosting may monitor, capture, and inspect network traffic, including packet data, transmitted through our servers. This is done to maintain the integrity, security, and performance of our systems.
B. Your continued use of ChainLinkHosting's services constitutes explicit consent to the monitoring of your network activity for the purposes stated above. You agree that failure to accept this may lead to the suspension or termination of services.
C. ChainLinkHosting may provide monitored data to law enforcement or other governmental agencies as required by law or in response to valid legal requests.
D. You agree not to interfere with or attempt to evade ChainLinkHosting's traffic monitoring mechanisms. Any such actions may result in immediate termination of services without prior notice.

Powered by WHMCompleteSolution