Web Search Engine Optimization
The Secure Independence Acceptable Use Policy ("AUP") for Web Search Engine Optimization is intended to help enhance the use of the Internet by preventing unacceptable use. All Users of Secure Independence Internet Services (the "Services"), including "Visitors" - those who access some of our Services but do not have accounts, and "Members" - those who pay a monthly service fee to subscribe to the Services, must comply with this Acceptable Use Policy.
We support the free flow of information and ideas over the Internet and do not actively monitor the use of our Services, under normal circumstances. We do not exercise editorial control over the content of: any website hosted on our servers, any electronic mail (email) transmitted through our servers, newsgroups visited by Members or Visitors, or any other material created or accessible over or through our Services, except for certain proprietary websites. In accordance with the Secure Independence Internet Service/Website Hosting Agreement, we reserve the right to remove any materials that, in our sole discretion, may be illegal, may subject us to liability, or which may violate this Acceptable Use Policy.
In addition, Secure Independence may cooperate with legal authorities and/or third parties in the investigation of any suspected or alleged crime or civil wrong doing. Your violation of this Acceptable Use Policy may result in the suspension or termination of your access to the Services and/or your Secure Independence account or other actions as detailed in Section 3.
2. VIOLATIONS OF THE SECURE INDEPENDENCE ACCEPTABLE USE POLICY
The following constitute violations of this Acceptable Use Policy:
a. Illegal use. Using the Services of Secure Independence to transmit any material via email, posting, uploading, or otherwise that intentionally or unintentionally violates any applicable local, state, national or international law, or any rules or regulations promulgated thereunder.
b. Harm or attempt to harm minors. Using any Services of Secure Independence to harm, or attempt to harm, minors in any way.
c. Threats. Using the Services of Secure Independence to transmit any material via email, posting, uploading, or otherwise that threatens or encourages bodily harm or destruction of property.
d. Harassment. Using the Services of Secure Independence to transmit any material via email, posting, uploading, or otherwise that harasses others.
e. Fraudulent activity. Using the Services of Secure Independence to make fraudulent offers to buy or sell products, items, or services or to promote or advance any type of financial scam, such as pyramid schemes, chain letters or ponzi schemes.
f. Forgery or impersonation. Attempting to impersonate any person by using forged headers or other identifying information is prohibited. Adding, removing or modifying identifying network header information in an effort to deceive or mislead is strictly prohibited.
g. Unsolicited commercial email/Unsolicited bulk email (spam). Using the Services of Secure Independence to transmit any unsolicited commercial email or unsolicited bulk email. Activities that have the effect of facilitating unsolicited commercial email or unsolicited bulk email, whether or not that email is commercial in nature, are prohibited.
h. Unauthorized access. Using the Services of Secure Independence to access, or to attempt to access the accounts of others, or to penetrate, or attempt to penetrate, security measures of the Secure Independence or another company, individual or entity's computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in the corruption or loss of data.
i. Copyright or trademark infringement. Using the Services of Secure Independence to transmit any material via email, uploading, posting, or otherwise that infringes any trademark, copyright, trade secret, patent, or other proprietary rights of any third party, including, but not limited to, the unauthorized copying of copyrighted material, the digitization and distribution of photographs from magazines, books, or other copyrighted sources, and the unauthorized transmittal of copyrighted software. Secure Independence is registered under the Digital Millennium Copyright Act of 1998.
j. Collection of personal data. Using the Services of Secure Independence to collect, or attempt to collect, personal information about third parties without their knowledge or consent.
k. Reselling the services. Reselling the Services of Secure Independence without prior consent and authorization by Secure Independence.
l. Network disruptions and unfriendly activity. Using the Services of Secure Independence for any activity which adversely affects the ability of other people or systems to use Secure Independence Services or the Internet. This includes "denial of service" (DoS) attacks against another network host or individual user. Interference with or disruption of other network users, network services or network equipment is prohibited. It is the Member's responsibility to ensure that their network is configured in a secure manner. A Member may not, through action or inaction, allow others to use their network for illegal or inappropriate actions. A Member may not permit their network, through action or inaction, to be configured in such a way that gives a third party the capability to use their network in an illegal or inappropriate manner.
m. Long Connections and Multiple Logins. The use of a personal account for high volume or commercial use is prohibited. The Services of Secure Independence are intended for periodic, active use of email, file transfers, chat, games, and browsing the World Wide Web. Members may stay connected for as long as they are actively using their connection for these purposes. Members may not use the Services of Secure Independence on a standby or inactive basis in order to maintain a connection. Pinging is expressly prohibited. Accordingly, Secure Independence maintains the right to terminate any member's connection following any extended period of inactivity as determined by Secure Independence.
3. REPORTING VIOLATIONS OF SECURE INDEPENDENCE'S AUP
Secure Independence requests that anyone who believes that there is a violation of this Acceptable Use Policy direct the information to the Abuse Department at: email@example.com.
If available, please provide the following information:
- The IP address used to commit the alleged violation
- The date, time and place of the alleged violation, including the time zone
- Any and all evidence of the alleged violation
Email with full header information provides all of the above, as do syslog files. Other situations will require different methods of providing the above information.
Secure Independence may take any or all of the following actions in response to complaints:
4. REVISIONS TO THIS ACCEPTABLE USE POLICY
- issue warnings: written or verbal
- suspend the Member's account
- terminate the Member's account
- bill the Member for administrative costs and/or any applicable reactivation charges
- bring legal action to enjoin violations and/or to collect damages, if any, caused by violations.
Secure Independence reserves the right to revise, amend, or modify this Acceptable Use Policy, our Internet Service Agreement and all other policies and agreements at any time and in any manner. Notice of any revision, amendment, or modification will be posted in accordance.
Sales and Marketing Specialists Since 1987
Secure Independence Inc
56 El Rio Ct
Henderson, NV 89012
Toll Free (800) 404-1234
Fax: (702) 313-9000
©2016 All Rights Reserved.