Barnett Cox and Associates, Inc.’s Acceptable Use Policy (the “Policy”) for BCA IP Products and Services is designed to help protect BCA, BCA’s customers and the Internet community in general from irresponsible or, in some cases, illegal activities. The Policy is a non-exclusive list of the actions prohibited by BCA. BCA reserves the right to modify the Policy at any time, effective upon posting at this location.
Prohibited Uses of BCA’s Systems, Products and Services
- Transmission, distribution or storage of any material in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property right used without proper authorization, and material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws.
- Sending unsolicited mail messages, including the sending of “junk mail” or other advertising material to individuals who did not specifically request such material (“e-mail SPAM”). This includes, but is not limited to, bulk-mailing of commercial advertising, informational announcements, and political tracts. It also includes posting the same or similar message to one or more newsgroups (excessive cross-posting or multiple-posting). BCA accounts or services may not be used to solicit customers from, or collect replies to, messages sent from another Internet Service Provider where those messages violate this Policy or that of the other provider.
- Unauthorized use, or forging, of mail header information (e.g. “spoofing”) A User may not attempt to send e-mail messages or transmit any electronic communications using a name or address of someone other than the User for purposes of deception. Any attempt to impersonate someone else by altering a source IP address information or by using forged headers or other identifying information is prohibited. Any attempt to fraudulently conceal, forge, or otherwise falsify a User’s identity in connection with use of the Service is prohibited..
- Unauthorized attempts by a user to gain access to any account or computer resource not belonging to that user (e.g., “cracking”).
- Obtaining or attempting to obtain service by any means or device with intent to avoid payment.
- Unauthorized access, alteration, destruction, or any attempt thereof, of any information of any BCA customers or end-users by any means or device.
- Knowingly engage in any activities that will cause a denial-of-service (e.g., synchronized number sequence attacks) to any BCA customers or end-users whether on the BCA network or on another provider’s network.
- Advertising, transmitting, or otherwise making available any software, program, product, or service that is designed to violate this AUP or the AUP of any other Internet Service Provider, which includes, but is not limited to, the facilitation of the means to send e-mail spam, initiation of pinging, flooding, mail-bombing, denial of service attacks, and piracy of software.
- Using BCA’s Services to interfere with the use of the BCA network by other customers or authorized users.
Each BCA IP customer is responsible for the activities of its customer base/representatives or end-users and, by accepting service from BCA, is agreeing to ensure that its customers/representatives or end-users abide by this Policy. Complaints about customers/representatives or end-users of a BCA IP customer will be forwarded to the BCA IP customer’s postmaster for action. If violations of the BCA Acceptable Use Policy occur, BCA IP customer’s Services reserves the right to terminate services with or take action to stop the offending customer from violating BCA’s AUP as BCA deems appropriate, without notice.
Report Policy violations to email@example.com.
When reporting Policy violations, please provide specific information in the form of a report. Specifics will speed up our response to the situation. Include URLs and exactly what is in violation of our policy (picture, video, music, text, etc.). Also if you have attempted to resolve the problem with the operator of the site yourself with no result, include the communication with headers, time stamps, etc.