System abuse is strictly prohibited. Designer Bytes, Inc. may terminate or
modify service immediately and may bill for any resulting support charges
if the client engages in system abuse. Following is a list of actions which
are defined to be system abuse. This list is non-exclusive; any action about
which there is any doubt should be referred to Designer Bytes, Inc. for evaluation.
Actions
which constitute system abuse include, but are not limited to:
- 1.
attempting to circumvent user authentication or security of any host, network,
or account on Designer Bytes, Inc. network or the Internet at large ("cracking");
2. attempting, in any way, to interfere with or deny service to any user
or any host on the Internet;
3. forging email or USENET posting header information;
4. sending unsolicited mail messages (i.e. "junk mail"); this includes adding
or attempting to add addresses to any mailing list without explicit positive
consent of the addressee.
5. forwarding or posting "chain letters" (multiple forwarding) of any type;
6. posting inappropriate messages to USENET newsgroups e.g., posting large
numbers of unsolicited posts indiscriminately ("spamming"), or posting encoded
binary files to USENET newsgroups not specifically named for that purpose;
7. attempting to cancel, supersede, or otherwise interfere with email or
USENET posts other than one's own;
8. engaging in harassment, whether through language, frequency, or size
of messages;
9. using an account at another provider to promote a DBI hosted web site
in an abusive manner;
10. using a DBI account or network connection to collect replies to messages
sent from another provider which violate these rules or those of that provider.
11. reselling DBI services to third parties.