WEB HOSTING, CLOUD, AND INTERNET SERVICES
ACCEPTABLE USE POLICY
This Acceptable Use Policy sets forth guidelines relating to the types of content that you may upload to the web servers under your agreement with Complete Computing Services for web hosting services (the “Services”). Complete Computing Services may remove any materials that, in its sole discretion, may be illegal, may subject it to liability, or which may violate this Acceptable Use Policy. Complete Computing Services will cooperate with legal authorities in the investigation of any suspected or alleged crime or civil wrongdoing arising from any use of the Services. Violation of this Acceptable Use Policy may result in the suspension or termination of either your access to the Services and/or your account or other actions as detailed in the Web Hosting Agreement.
1. Acceptable Use
The following constitute violations of this Acceptable Use Policy:
A. Using the Services to transmit or post any material that contains or contains links to nudity, pornography, adult content, sex, or extreme violence.
B. Using the Services to transmit or post any material that, intentionally or unintentionally, violates any applicable local, state, national or international law, or any rules or regulations promulgated thereunder.
C. Using the Services to harm, or attempt to harm, minors in any way.
D. Using the Services to transmit or post any material that harasses, threatens or encourages bodily harm or destruction of property.
E. Using the Services to make fraudulent misrepresentations or offers including but not limited to offers relating to “pyramid schemes” and “Ponzi schemes.”
F. Using the Services to access, or to attempt to access, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Complete Computing Services or another entity’s computer software or hardware, electronic communications system or telecommunications system, whether or not the intrusion results in the corruption or loss of data.
G. Using the Services to transmit or post any material that infringes any copyright, trademark, patent, trade secret or other proprietary rights of any third party, including, but not limited to, the unauthorized copying and/or distribution of copyrighted material, the digitization and distribution of photographs from magazines, books, music, video or other copyrighted sources, and the unauthorized transmittal of copyrighted software.
H. Using the Services to collect, or attempt to collect, personal information about third parties without their knowledge or consent.
I. Reselling the Services without the prior written authorization of Complete Computing Services.
J. Using the Services for any activity that adversely affects the ability of other people or systems to use the Services or the Internet. This includes but is not limited to “denial of service” (DoS) attacks against another network host or individual user. Interference with or disruption of other network users, network services or network equipment is prohibited.
K. Using the Services to distribute, advertise or promote software or services that have the primary purpose of encouraging or facilitating unsolicited commercial e-mail or spam.
2. Reporting of Violations of This Acceptable Use Policy
Complete Computing Services requests that anyone who believes that there has been a violation of this Acceptable Use Policy to immediately send an email detailing such violation to ccs.abuse@CompleteComputing.com.
3. Revisions to This Acceptable Use Policy
Complete Computing Services may revise, amend or modify this Acceptable Use Policy at any time and in any manner.
Last Updated: October 19, 2014