Skip to content
Permalink
main
Switch branches/tags
Go to file
 
 
Cannot retrieve contributors at this time
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<title>Acceptable Uses Policy</title>
<meta name="GENERATOR" content="Microsoft FrontPage 4.0">
</head>
<body background="images/niceblack1.gif" bgcolor="#FFFFFF">
<table border="0" cellspacing="0" cellpadding="0" width="714">
<tr>
<td rowspan="2" width="46">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </td>
<td valign="top" width="554"><a name="top"></a> <table border="0" width="100%" height="56">
<tr>
<td bordercolordark="#000000" height="26"><table border="1" width="542" cellspacing="0" cellpadding="1" bgcolor="#FFBD00" bordercolor="#000000">
<tr>
<td width="108" align="center"><table border="0" width="100%" cellspacing="0" cellpadding="1" bgcolor="#FFBD00">
<tr>
<td align="center"><a href="news.htm" style="color: rgb(0,0,0); border-left: 1px solid rgb(0,0,0)"><strong><small><font face="Arial">NEWS</font></small></strong></a></td>
</tr>
</table>
</td>
<td width="108" align="center"><a href="under_development.htm" style="color: rgb(0,0,0)"><font size="2" face="arial,geneva"><strong>PRODUCTS</strong></font></a></td>
<td width="108" align="center"><font size="2" face="arial,geneva"><a href="Services.htm" style="color: rgb(0,0,0)"><strong>SERVICES</strong></a></font></td>
<td width="109" align="center"><font size="2" face="arial,geneva"><a href="support_main_page.htm" style="color: rgb(0,0,0)"><strong>SUPPORT</strong></a></font></td>
<td width="109" align="center"><font size="2" face="arial,geneva"><a href="contactus.htm" style="color: rgb(0,0,0)"><strong>CONTACT US</strong></a></font></td>
</tr>
</table>
</td>
</tr>
<tr>
<td height="22"></td>
</tr>
<tr>
<td bordercolordark="#000000" height="26"><table border="1" width="542" cellspacing="0" cellpadding="1" bgcolor="#FFBD00" bordercolor="#000000">
<tr>
<td width="542" align="center"><table border="0" width="100%" cellspacing="0" cellpadding="1" bgcolor="#FFBD00">
<tr>
<td align="center"><big><big><big><big><strong><font face="Arial">Uses Policy</font></strong></big></big></big></big></td>
</tr>
</table>
</td>
</tr>
</table>
</td>
</tr>
<tr>
<td height="22"></td>
</tr>
<tr>
<td valign="top" align="center" width="528"><font size="2" face="arial,geneva"><p align="left">As an Internet service provider (&quot;ISP&quot;), we offer our subscribers
the means to acquire and disseminate a wealth of public, private, commercial and
non-commercial information. We also want our subscribers to be fully informed of their
rights and obligations -- and ours -- in connection with their use of the Internet. This
Network Access Policy, which supplements and explains certain terms of each customer's
respective services agreement (the &quot;Services Agreement&quot;), is intended as a plain
English guide to those rights and obligations. <br>
<br>
The fundamental fact about the Internet is that no one --neither us, nor anyone else --
owns or controls it. This fact accounts for much of the Internet's openness and value, but
it also places a high premium on the judgment and responsibility of those who use the
Internet, both in the information they acquire and in the information they disseminate to
others. When subscribers obtain information through the Internet, they must keep in mind
that we cannot monitor, verify, warrant or vouch for the accuracy and quality of the
information that subscribers may acquire. For this reason, the subscriber must exercise
his or her best judgment in relying on information obtained from the Internet, and also
should be aware that some material posted to the Internet is sexually explicit or
otherwise offensive. Because we cannot monitor and censor the Internet, and will not
attempt to do so, we cannot accept any responsibility for injury to our subscribers that
results from inaccurate, unsuitable or offensive Internet communications. <br>
<br>
When subscribers disseminate information through the Internet, they also must keep in mind
that we do not review, edit, censor or take responsibility for any information our
subscribers may create. This places on subscribers what will be, for most, an unfamiliar
responsibility. When users place information on the Internet, they have the same liability
as other authors for copyright infringement, defamation and other harmful speech. Also,
because the information they create is carried over our facilities and may reach a large
number of people, including both subscribers and nonsubscribers of ours, subscribers'
postings to the Internet may affect other subscribers and may harm our goodwill, business
reputation and operations. For these reasons, subscribers violate our policy and the
Services Agreement when they, their affiliates or subsidiaries engage in the following
activities: <br>
<br>
Spamming -- Unsolicited, commercial mass e-mailing (known as &quot;spamming&quot;) is a
strongly disfavored practice among Internet users and service providers. It is
particularly harmful not only because of its negative impact on consumer attitudes toward
us, but also because it can overload our equipment and disrupt service to our subscribers.
<br>
<br>
Copyright Violation -- Violation of copyrights held by individuals and corporations or
other entities can result in civil and criminal liability for the infringer, and can
involve the ISP in litigation and possible loss of reputation. <br>
<br>
Distribution and/or Transmission of Obscene or Indecent Speech or Materials -- Violation
of indecency and obscenity laws can result in criminal penalties. <br>
<br>
Defamation -- Defamatory speech distributed over the Internet can result in civil
liability for the defamer and litigation against the ISP whose facilities were used to
distribute the defamatory material. <br>
<br>
Illegal/Unauthorized Access to Other Computers or Networks -- The illegal or unauthorized
accessing (often known as &quot;hacking&quot;) of computers or networks carries potential
civil and criminal penalties under both federal laws and the laws of most states. <br>
<br>
Distribution of Internet Viruses, Worms, Trojan Horses and Other Destructive Activities --
Distribution of Internet viruses, worms, Trojan horses and other destructive activities,
such as hacking, can result in serious civil and or criminal liability under federal and
state law. <br>
<br>
Export Control Violations -- The law limits the ability of persons to export encryption
software, over the Internet or otherwise, to points outside the United States. <br>
<br>
Other Activities, whether lawful or unlawful, that we determine to be harmful to our
subscribers, operations or reputation, including any activities that restrict or inhibit
any other user from using and enjoying the service or the Internet. <br>
<br>
As we have pointed out, the responsibility for avoiding the harmful activities just
described rests primarily with the subscriber. We will not, as an ordinary practice,
monitor the communications of our subscribers to ensure that they comply with our policy
or applicable law. When we become aware of harmful communications, however, we may take
any of a variety of actions. We may remove information that violates our policies,
implement screening software designed to block offending transmissions, or take any other
action we deem appropriate, including termination of a subscriber's contract with us. <br>
<br>
We also are aware that many of our subscribers are, themselves, providers of Internet
services, and that information reaching our facilities from those subscribers may have
been originated by customers of those subscribers or other third parties. We do not
require our subscribers who offer Internet services to monitor or censor transmissions
created by customers of its subscribers. At the same time, subscribers who knowingly
transmit materials that violate law or our policy are, themselves, in violation of our
policy. Similarly, we anticipate that subscribers who offer Internet services will
cooperate with us in any corrective action that we deem necessary, in order to correct and
prevent the transmission of material that is harmful to us or our subscribers. Failure to
cooperate with such corrective and preventive measures is a violation of our policy. <br>
<br>
We also are concerned with the privacy of on-line communications. In general, the Internet
is neither more nor less secure than other common communications media, including mail,
facsimile and voice telephone service, all of which can be intercepted and otherwise
compromised. As a matter of prudence, however, we urge our subscribers to assume that all
of their on-line communications are insecure. <br>
<br>
We can not take any responsibility for the security of communications transmitted over our
facilities. We will comply fully, however, with all applicable laws concerning the privacy
of our subscribers' on-line communications. In particular, we will not intentionally
monitor or disclose any private electronic mail messages sent or received by our
subscribers unless required to do so by law. We may, however, monitor our service
electronically to determine that our facilities are operating satisfactorily. Also, we may
be required to disclose information transmitted through our facilities in order to comply
with court orders, statutes, regulations or governmental requests. Finally, we may
disclose information transmitted over our facilities where necessary to protect us and our
subscribers from harm, or where such disclosure is necessary to the proper operation of
the system. <br>
<br>
We expect that our subscribers who provide Internet services to others will comply fully
with all applicable laws concerning the privacy of on-line communications. A subscriber's
failure to comply with those laws will violate our policy. Finally, we wish to emphasize
that in signing the Services Agreement, subscribers indemnify us for any violation of the
subscriber of the Services Agreement, or of law or Verio policy, that results in loss to
us or the bringing of any claim against us. This means that if we are sued because of
activities of the subscriber that violate any law, the Services Agreement or this policy
(which is part of the Services Agreement), the subscriber will pay any damages awarded
against us, plus costs and reasonable attorneys' fees. <br>
<br>
We hope this Policy Statement is helpful in clarifying the obligations of Internet users,
including us and our subscribers, as responsible members of the Internet.</font></p>
<p align="left"><font size="2" face="arial,geneva">Complaints about violators of our
policies should be referred to <a href="mailto:abuse@bblconsulting.com">abuse@bblconsulting.com</a>.
Each complaint will be investigated. </font></td>
</tr>
<tr>
<td height="22"></td>
</tr>
</table>
<blockquote>
<blockquote>
</blockquote>
<dl>
</dl>
</blockquote>
<table border="0" width="100%" cellpadding="0">
<tr>
<td width="100%" valign="top" rowspan="4"><h3 style="color: rgb(0,0,255)" align="center"><font face="Arial" color="#0000FF"><small><small><small><small><a href="index.htm">HOME</a> | <a href="contactus.htm">CONTACT US</a> | <a href="client_profiles.htm" target="main">CLIENT
PROFILES</a> | <a href="email_services.htm" target="main">EMAIL</a> | <a href="employment.htm">EMPLOYMENT</a> | <a href="under_development.htm">EVENTS </a>| <a href="under_development.htm">FAQ</a> | <a href="hosting.htm">HOSTING</a> | <a href="legal.htm">LEGAL</a> | <a href="http://luizhome/copy_of_www_bblconsulting_com/news.htm">NEWS</a>&nbsp; &nbsp; <a href="under_development.htm">PARTNERS</a> | <a href="privacy_policy.htm">PRIVACY</a> | <a href="under_development.htm">PRODUCTS</a> | <a href="sbtpage.htm">SBT</a> | <a href="Services.htm">SERVICES</a> | <a href="http://208.9.172.40:8080">STATISTICS</a> | <a href="support_main_page.htm">SUPPORT </a>| USER POLICY&nbsp; </small></small></small></small></font></h3>
</td>
</tr>
</table>
<form action="https://www.hiway.com/cgi-bin/mywhois" method="POST">
<input type="hidden" name="queryuser" value="ahomec"><table border="0" width="100%" cellspacing="0" cellpadding="1" bgcolor="#000000">
<tr>
<td><table border="0" width="100%" cellspacing="0" cellpadding="1" bgcolor="#FFBD00">
<tr>
<td align="center"><font size="2" face="arial,geneva">Do you know where your users go on
the Internet? Call us @ <strong>1-305-883-5568</strong>.&nbsp; </font></td>
</tr>
</table>
</td>
</tr>
</table>
<table border="0" width="100%" cellspacing="0" cellpadding="0">
<tr>
<td align="left"><div align="right"><p><font face="Arial"><font color="#400040"><b><font size="1">Copyright ©1998-1999&nbsp; BBL Consulting, Inc. All Rights Reserved</font></b><small>
</font><br>
</small><font color="#400040"><font size="-2"><b>This page was last updated on <!--webbot bot="Timestamp" S-Type="EDITED" S-Format="%A, %B %d, %Y" startspan -->Thursday, August 19, 1999<!--webbot bot="Timestamp" endspan i-checksum="5567" -->.</b></font> </font></font></td>
<td align="right"></td>
</tr>
</table>
</form>
</td>
<td valign="top" width="114"><p align="right"><img src="images/logo_side.jpg" alt="wpe1.jpg (6724 bytes)" WIDTH="55" HEIGHT="420"><p align="right">&nbsp;
<table border="0" width="100%" cellspacing="0" cellpadding="0">
<tr>
<td width="100%"><img src="images/probyicn.gif" align="right" WIDTH="80" HEIGHT="112"></td>
</tr>
</table>
</td>
</tr>
<tr>
<td valign="top" width="554"></td>
<td valign="top" width="114"></td>
</tr>
</table>
</body>
</html>