All Login customers are responsible for reviewing and complying with this Acceptable Use Policy. Login customers who provide services to their own users must affirmatively and contractually pass on the restrictions of this Acceptable Use Policy to their users, and take steps to ensure compliance by their users with this Acceptable Use Policy including, without limitation, termination of users who violate this policy. For the purposes of this Policy, “Customer” shall be defined to include Login’s customers and also a customer’s users and account holders. This Policy is subject to change with notice by publication on this Web site; customers are responsible for monitoring this web site for changes.
This Policy was last changed on September 20, 2001.The actions described below are defined by Login as “AUP violations” and are strictly prohibited under this Policy. The examples named below are not exhaustive and are provided solely for guidance to Customers. If any Customer is unsure of whether a contemplated use or action is permitted, it is Customer’s responsibility to determine whether the use is permitted by contacting Login via electronic mail. The following activities are expressly prohibited, and Login expressly reserves the right, at its discretion, to pursue any remedies that it believes are warranted which may include, but is not limited to, filtering, suspending, or terminating accounts, end-users or Customers that engage in system abuse or who refuse to address user abuse.In general, Login Customers may not use Login’s network, machines, or services in any manner which:
Prohibited activities also include but are not limited to, the following:
Dedicated and Co-location Customers Login dedicated Internet and co-located customers who provide services to their own users must affirmatively and contractually pass on the restrictions of this Acceptable Use Policy to its users, and take steps to ensure compliance by their users with this Acceptable Use Policy including, without limitation, termination of the user for violations of this policy. Login dedicated Internet and web hosting customers who provide services to their own users also must maintain valid postmaster and abuse addresses for their domains, comply with all applicable Internet RFCs, maintain appropriate reverse DNS information for all hosts receiving connectivity through Login’s network for which DNS responsibility has been delegated to the customer, maintain accurate contact information with the InterNIC and any other appropriate domain and IP address registries, take reasonable steps to prevent IP spoofing by their users and downstream customers, provide a 24/7 contact address to Login for dealing with security and abuse issues, and act promptly to ensure that users are in compliance with Login’s Acceptable Use Policy.
Reasonable steps include, but are not limited to, using ip verify unicast reverse path wherever appropriate and using IP address filtering wherever appropriate. Email Sending unsolicited (“opt-out”) bulk email is prohibited. Sending unsolicited bulk email from another provider advertising or implicating, directly or indirectly, the use of any service hosted or provided by Login, including without limitation email, web, FTP, and DNS services, is prohibited and is grounds for termination of those services to Customers or users who engage in the practice. Customers or users who send unsolicited bulk email from Login networks will be charged the cost of labor to respond to complaints, with a minimum charge of $500. Customers or users who send bulk email to “opt-in” lists must have a method of confirmation or verification of subscriptions and be able to show evidence of subscription for users who complain about receiving unsolicited email. The following actions are likewise prohibited:
Usenet newsgroups Customers and users should be familiar with the workings of Usenet by reading FAQs regarding Usenet at rtfm.mit.edu/pub/usenet-by-hierarchy/news/announce/newusers/ before becoming active participants. Login places the following restrictions on newsgroup postings by its users
The World Wide Web and FTP The web space and public FTP space included with a dialup account may not be resold or used for adult-oriented material. Login reserves the right to require that sites using web or FTP space which receive high amounts of traffic be moved to other servers. Web pages and FTP files may not contain any material, text, or images, whether hosted on Login servers or “transclusioned” (images from another site displayed on the page) which violate or infringe any copyright, trademark, patent, statutory, common law, or proprietary rights of others. Web pages and FTP files may not contain links that initiate downloads of copyright-infringing or other illegal material.
Internet Relay Chat Flooding, cloning, spoofing, harassment, or otherwise hindering the ability of others to properly use IRC is prohibited. Impersonating other users, advertising, and spamming via IRC is prohibited.
Servers and Proxies Users may not run on Login-owned servers any program which makes a service or resource available to others, including but not limited to port redirectors, proxy servers, chat servers, MUDs, file servers, and IRC bots. Customers are responsible for the security of their own networks and machines. Login will assume neither responsibility nor accountability for failures or breach of customer-imposed protective measures, whether implied or actual. Abuse that occurs as a result of a compromised customer’s system or account may result in suspension of services or account access by Login, for example, if a system is abused after becoming infected with Back Orifice or the NetBus trojan horse programs as a result of an Internet download or executing an email attachment. (See www.nwi.net/~pchelp/bo/bo.html ) Any programs, scripts, or processes which generate excessive server load on Login servers are prohibited and Login reserves the right to terminate or suspend any such program, script, or process.
Unsolicited Bulk Email Support Services and Email Address Harvesting Customers and users may not advertise, distribute, or use software intended to facilitate sending unsolicited bulk email or harvest email addresses from the Internet for that purpose. Customers and users may not sell or distribute lists of harvested email addresses for that purpose. Referral ID Services Customers who provide or make use of a service employing referral IDs will be considered responsible for unsolicited bulk email sent by members of the referral ID service that makes reference to services hosted by Login. Customers must be able to provide visible evidence from the UBE-advertised link that a member of their referral ID service has had their membership terminated.
Storing files The storage of any program, utility or file on Login’s servers the use of which would constitute a violation of this policy is prohibited. For example, it is a violation to store hacker scripts, IRC bots, or spamming software on Login’s servers. Third Party Information Login does not provide any of your information to third parties other than as necessary to provide your services. Similarly Login does not respond to third parties claiming to represent you. If you wish to have us work with a third party which you would like to authorize, you must do so in an open ticket or in writing. All unsolicited third-party contact will not be acknowledged. How to Contact Us To contact us with questions or comments regarding this Acceptable Use Policy or claimed violations of this Policy, please email firstname.lastname@example.org. (c) 2002-2016 Login, LLC.
What We Do