Mach Technologies Acceptable Use Policy (AUP)
1. Introduction, Purpose, and General Terms.
1.1. This website gives you the ability to learn about Mach Technologies and its products and services as well as the ability to access our services. By using this site, and any other sites or services owned, operated, or provided by Mach Technologies, you signify your agreement to the terms, conditions and notices of this policy. “You” when used in the Agreement shall mean the Mach Technologies Customer of record and that Mach Technologies Customer’s end users.
1.3. This document sets forth the principles, guidelines and requirements of the Acceptable Use Policy of Mach Technologies (“Company”) governing the use by the Customer (“Customer”) of the Company’s services and products (“Services and Products”). The purpose of Mach Technologies’ Acceptable Use Policy (the “AUP”) is to comply with all international, federal, state, and local laws and to protect the network security, network availability, physical security, Customer privacy, and other factors affecting the services provided by Mach Technologies. Mach Technologies reserves the right to impose reasonable rules and regulations regarding the use of its services provided to all Customers.
1.4. In order to maintain an informative and valuable service that meets the needs of the users of this site and Mach Technologies Services, the rules in this AUP have been established to protect against abuse. The AUP is not an all-inclusive, exhaustive list and Mach Technologies reserves the right to revise, amend, or modify the AUP at any time as needed, effective upon either the posting of the revised, amended, or modified AUP to https://machtechcorp.net/site/legal/acceptable-use-policy/ or notification to the Customer via e-mail to the e-mail address of Customer as set forth in the Service Descriptions.
1.5. Any violation of the AUP may result in the suspension or termination of your account or such other action, as Mach Technologies deems appropriate. No credits will be issued for any interruption in service resulting from violations of the AUP.
1.6. VIOLATION OF ANY SECTION OF THE AUP IS STRICTLY PROHIBITED AND MAY RESULT IN THE IMMEDIATE TERMINATION OR SUSPENSION OF THE SERVICES YOU RECEIVE FROM MACH TECHNOLOGIES.
1.7. Any questions or comments regarding the AUP should be directed to the proper e-mail address listed at http://machtechcorp.net/site/contact.
2. General Prohibitions.
You may not use this site or Mach Technologies’ Services for any purpose that is unlawful or in any manner that could damage, disable, overburden or impair the operation of this site, the Mach Technologies Network, or Mach Technologies’ Services, or any other party’s use or enjoyment of this site, the Mach Technologies Network, or Mach Technologies’ Services.
3. Compliance with Law.
Customer shall not use Mach Technologies’ Service or any other service or network to post, upload, transmit, retransmit, store, distribute or facilitate the distribution of any content, including without limitation text, communications, software, images, sounds, data, or other information that, in Mach Technologies’ sole discretion:
3.1. violates, attempts to violate, or helps any third party to violate any local, state, federal, or international law, ordinance, or regulation,
3.2. is threatening, obscene, indecent, pornographic, abusive, harassing, libelous, defamatory, deceptive, fraudulent, invasive of another’s privacy, tortious, inaccurate, or that otherwise could adversely affect any individual, group or entity (collectively, “Persons”),
3.3. threatens or encourages bodily harm or destruction of property,
3.4. harms any person,
3.5. victimizes, harasses, degrades, or intimidates an individual or group of individuals on the basis of religion, sex, sexual orientation, race, ethnicity, national origin, immigration status, age, disability, or any other reason,
3.6. is posted in violation of a newsgroup charter,
3.7. contains viruses, corrupted files, or any other similar software or programs that may damage the operation of another’s computer,
3.8. violates any terms or conditions of any other network access provider or Internet service provider,
3.9. violates the rights of any person, including rights protected by copyright, trade secret, patent or other intellectual property or similar laws or regulations including, but not limited to, the installation or distribution of “pirated” information content or data or other software products that are not appropriately licensed for use by Customer. Customer shall be responsible for determining what laws or regulations are applicable to its use of the Services and Products,
3.10. adds, removes, or modifies identifying network header information in an effort to deceive or mislead any person. Additionally, attempting to impersonate any person by using forged headers or other identifying information is prohibited. However, the use of anonymous re-mailers or nicknames does not by itself constitute impersonation, unless such use is made with the intent to deceive, defraud, or mislead any person or to violate any applicable laws or regulations,
3.11. collects, attempts to collect, or helps any third party to collect personal information about third parties without their knowledge or consent or in a manner that violates applicable laws concerning privacy, or
3.12. has a negative effect on Mach Technologies or its network (including, without limitation, overloading servers on the Mach Technologies Network; causing portions of the Mach Technologies Network to be blocked by other network providers; generating unresolved third party complaints or complaints which, in the discretion of Mach Technologies, impose an unreasonable administrative burden on Mach Technologies; etc).
4. System and Network Security.
Violations of system or network security are strictly prohibited, and may result in criminal and civil liability as well as termination of services from Mach Technologies. Mach Technologies investigates all incidents involving such violations and will cooperate with law enforcement if a violation of the criminal law is suspected.
You are responsible for any misuse of your account, even if a friend, family member, guest, agent, or employee committed the inappropriate activity while using your account. Therefore, you must take steps to ensure that others do not gain unauthorized access to your account. In addition, you may not use your account to breach the security of another Mach Technologies account or attempt to gain unauthorized access to another network or server.
Examples of system or network security violations include, without limitation, the following:
4.1. Introduction into the network or server of any malicious program (examples: viruses, worms, Trojan Horses, logic bombs, and other executables intended to inflict harm).
4.2. Introduction into the network or server of any self-extracting file or program containing any malicious program as specified in Section 4.1 of this AUP.
4.3. Introduction into the network or server of any data, parameter, configuration, template, or control files for software applications that contain destructive macros or other malicious code.
4.4. Introduction into the network or server of any encrypted or compressed file or archive such as .zip or .gz files that contains any malicious program as specified in paragraphs 4.1 through 4.3 of this AUP.
4.5. Effecting security breaches or disruptions of Internet communication and/or connectivity. Security breaches include, but are not limited to, accessing data of which the Customer is not an intended recipient, logging into a server or account that the Customer is not expressly authorized to access, or exceeding the access to a server or account that has been granted to the Customer. For purposes of this section, “disruption” includes, but is not limited to port scans, flood pings, e-mail-bombing, packet spoofing, IP spoofing, and forged routing information.
4.6. Executing any form of network activity that will intercept data not intended for the Customer.
4.7. Circumventing user authentication or security of any host, network or account.
4.8. Interfering with or denying service to any user other than users of the Customer’s host (examples: denial of service attack or distributed denial of service attack).
4.9. Using any program script/command, or sending messages of any kind such as a punter, designed to interfere with or to disable, a user’s terminal session, via any means, locally or via the Internet.
4.10. Attempting to use or gain unauthorized access to data, accounts, hosts, servers, systems or networks of this site, or to probe, scan or test the vulnerability of a system or network of this site, any Mach Technologies Services or those of any other party.
4.11. Interfering with service to any user, host or network including, without limitation, mail-bombing, flooding, or attempting to overload the system.
4.12. Forging any TCP-IP packet header or any part of the header information in an e-mail or a newsgroup posting.
4.13 Falsifying address information or otherwise modifying e-mail headers to conceal the sender’s or the recipient’s identity.
5. Internet Etiquette.
The Customer agrees to observe and abide by reasonable Internet etiquette (Netiquette). The Customer shall comply with the rules appropriate to any network to which Mach Technologies may provide access. The Customer should not post, transmit, or permit Internet access to information the Customer desires to keep confidential. The Customer shall not post any material that is illegal, is libelous, is otherwise tortious, indecently depicts children, or is likely to result in retaliation against Mach Technologies by offended users. Mach Technologies reserves the right to refuse or terminate service at any time for violation of this section. This includes, but is not limited to, advertising services or sites via Internet Relay Chat (IRC) or USENET in clear violation of the policies of the IRC channel or USENET group.
6. Child Pornography.
Mach Technologies will cooperate fully with any criminal investigation into a Customer’s violation of the Child Protection Act of 1984 concerning child pornography, or any other applicable international, federal, state, or local law that prohibits child pornography. Customers are ultimately responsible for the actions of their clients over Mach Technologies network, and shall be liable for illegal material posted by their clients. According to the Child Protection Act, child pornography includes photographs, films, video, or any other type of visual presentation that shows a person who is or is depicted as being under the age of eighteen years and is engaged in or is depicted as engaged in explicit sexual activity, or the dominant characteristic of which is the depiction, for a sexual purpose, of a sexual organ or the anal region of a person under the age of eighteen years or any written material or visual representation that advocates or counsels sexual activity with a person under the age of eighteen years. Violations of the Child Protection Act may be reported to the Maryland Police and/or the United States Federal Police
7. No Editing, Censoring, or Control of Communications; Reservation of Rights.
Your participation in online communication or use of any Mach Technologies service is not edited, censored, or otherwise controlled by Mach Technologies. However, Mach Technologies reserves the right to monitor content on this site and on any Mach Technologies servers, networks, or systems and to remove content, disable sites, or suspend or terminate services if Mach Technologies, in its sole discretion, determines such content or user practices are harmful, offensive, or otherwise in violation of this Acceptable Use Policy.
8. International Use.
Mach Technologies makes no representation that materials available on this site or through any Mach Technologies service are appropriate or available for use in locations outside the United States, and accessing them or using them from territories where their contents are illegal is prohibited. Customers and their users who access this site or any site hosted by Mach Technologies from locations outside the United States are solely responsible for compliance with all applicable local laws and regulations. Moreover, to the extent allowed by law, Customers agree to defend, indemnify, and hold harmless Mach Technologies, its divisions, subsidiaries, partners, joint venturers, employees and agents, and all their respective heirs, successors, and assigns for any acts of Customer or Customer’s users that may violate any applicable law.
9. Intellectual Property Rights.
9.1. All Mach Technologies website design, text, graphics and the selection and arrangement thereof are the copyrighted work of Mach Technologies. All rights reserved. If any page, information, or content is copied, it may only be copied for non-commercial uses that are explicitly allowed under the Customer’s Agreement with Mach Technologies or by law, and Mach Technologies shall, in any event, retain all copyright and other proprietary interests in said page, information, or content.
9.2. You acknowledge and agree that copyrights, trademarks, service marks, patents, trade secrets, and other proprietary rights and laws protect all content and materials available on this site or through any Mach Technologies service. Nothing on any Mach Technologies website shall be interpreted or implied in such a way as conferring any license or right to any intellectual property rights or license to any intellectual property, content, technology, system, process, or related material belonging to Mach Technologies by virtue of it being displayed or made accessible on any Mach Technologies website. Except as expressly authorized, you agree not to use this site or any Mach Technologies Services in any manner that would infringe, violate, dilute or misappropriate any such rights, with respect to any material, which you may access, receive or make available through this site or any Mach Technologies Services.
9.3. If you use a domain name or content in connection with the Mach Technologies web hosting, or any other web hosting service, you agree not to use that domain name or content in any way which violates any trademark, service mark, or similar rights of any third party. Specifically, and without limitation, you agree that you will not engage in, attempt to engage in, or conspire with others or solicit others to engage in any cybersquatting or domain name hijacking,
9.4. Mach Technologies’ data center infrastructure including all hardware, software, and telecommunications facilities located in its data center may only be used for lawful purposes. Transmission, distribution, or storage of any information, data or material in violation of any United States or U.S. state regulation or law or the common law, or any applicable foreign or international law is prohibited. This includes, but is not limited to, material protected by copyright, trademark, patent, trade secret, or other intellectual property rights.
9.5. Creating, utilising, or distributing unauthorised copies of software or other information content is a violation of international, federal, and state law. If you copy, distribute, or install software or other information content in ways that the license to use that content does not allow, you are violating federal copyright law and international copyright law. Mach Technologies will cooperate with all law enforcement agencies in relation to alleged copyright infringement based on content housed anywhere on our our network.
10. Customer’s Grant of Limited License to Mach Technologies; Warranties on Content.
By posting or submitting content to any Mach Technologies website or server, you:
10.1. Grant Mach Technologies a limited license to transmit, copy, store, back up, and retrieve the content, solely for the purpose of providing you with the services you are purchasing under your Agreement with Mach Technologies;
10.3. Warrant and represent that you own or otherwise control all of the rights to the content and that public posting and use of your content by Mach Technologies does not and will not infringe or violate the rights of any third party; and
10.4. Agree to defend, hold harmless, and indemnify Mach Technologies for any claims of any third party resulting from the public posting or use of your content.
11. IP Allocation.
Mach Technologies administers an Internet network on which multiple Customer servers reside. Customers shall NOT use Internet protocol (IP) addresses that were not assigned to them by Mach Technologies staff or network administrators.
12.1.Restrictions on Use of Mach Technologies Services.
12.1. All Hosting Services.
12.1.1 Hacker related sites are not permitted.
12.1.2 Hate sites are not permitted.
12.1.3 Free web hosting companies are not permitted.
12.1.4 Demo accounts are not permitted.
12.1.5 Proxy Scripts / Anonymizers are not permitted.
12.1.6 HYIP (High Yield Investment Programs), FOREX, egold exchange and related sites are not permitted.
12.1.7 Lottery and Gambling sites are not permitted.
12.1.8 Autosurfing sites are not permitted.
12.1.9 Any site taking part in an illegal action are not permitted.
12.2 Additional Restrictions for Shared Hosting.
12.2.1 Operating a public mirror site is not permitted.
12.2.2 Offering Image, File, Document, Data storage and e-mail services are strictly prohibited.
12.2.3 You may not use Mach Technologies servers as a storage system (local computer backups, etc.) only website files are permitted.
12.2.4 The total number of inodes in an account may not exceed 50,000
12.2.5 A directory can not contain more than12.1.00 immediate child files. This includes subdirectories themselves, but does not include files contained within those directories.
12.2.6 Mach Technologies servers should not be used as an SSH bounce point to other servers/networks.
12.2.7 You may not use the Unix “find” command recursively on directories more than 5 levels deep.
12.2.8 You may send a maximum of12.1. e-mails per hour.
12.2.9 All users are restricted to12.1.concurrent database connections.
12.2.10 Database queries should not exceed 3,000 per hour.
12.2.11 You may not consume more than 12.1.MB of RAM.
12.2.12 You may not utilize in excess of 30 seconds of CPU time.
12.2.13 You may not create core dumps.
12.2.14 You may not run more than 15 simultaneous processes.
12.2.15 You may not run programs that run in the background or listen on a network port.
12.2.16 A cron job should not execute more frequently than once every 15 minutes
12.2.17 A cron job should not be used to generate complete account backups (the server takes nightly backups)
12.2.18 You may not run scripts or services that will use an excessive amount of server resources or cause issues on the server.
12.2.19 You may not run any live chat script or shoutbox due to their extreme cpu and database usage.
12.2.20 You may not run any torrent related website.
12.3 Mach Technologies reserves the right to add further restrictions to Customers’use of the Mach Technologies Services if such further restrictions are reasonably necessary to keep its hosting service operating efficiently for all users.
Mach Technologies reserves the right to suspend or terminate accounts if any of the above restrictions are violated.
13. Suspension and Cancellation.
13.1 Resource usage.
You agree to not use an excessive amount of server resources. Any violations may result in Mach Technologies taking corrective action in order maintain server stability by killing any processes, disabling and/or suspending your account.
14. Notices Regarding Violations of AUP and Intellectual Property Rights.
14.1. The Mach Technologies Agreement and all its components prohibit acts of copyright and trademark infringement and other unlawful behavior by Mach Technologies Customers. Mach Technologies takes Customer violations seriously and will investigate complaints and, where appropriate, may remove content, disable sites, suspend or terminate services, or take other action as necessary.
14.2. General Complaints: Please send reports of any activity in violation of this Acceptable Use Policy to the proper e-mail address listed at http://machtechcorp.net/site/contact. If possible, please provide the IP address used to commit the violation, the date and time of the violation, and evidence of the violation. Mach Technologies will reasonably investigate incidents involving such alleged violations. Mach Technologies may involve and will cooperate with law enforcement officials if any criminal activity is suspected. Violations may result in criminal and civil liability.
14.3. Copyright/Trademark Infringement Complaints: If you believe that your copyright or trademark has been used by a Mach Technologies subscriber without permission, such that the use may constitute infringement of your intellectual property rights, please contact us via the proper e-mail address listed at http://machtechcorp.net/site/contact.
All monetary amounts to which this Agreement refers shall be in American dollars and shall include the Goods and Services Tax (GST).
Mach Technologies reserves the right to refuse service to anyone. Any material that, in our judgment, is obscene or threatening is prohibited and will be removed from our servers with or without notice.
Failure to respond to e-mail from our abuse department within 48 hours may result in the suspension or termination of your services. All abuse issues must be dealt with via troubleticket/e-mail and will have a response within 48 hours.
If in doubt regarding the acceptability of your site or service, please contact us via the proper e-mail address listed at http://machtechcorp.net/site/contact and we will be happy to assist you.