Threecolts Acceptable Use Policy
Purpose
Threecolts, LLC hereby adopts this Acceptable Use Policy (“AUP”) to provide you with notice of its expectations of its users when using the Services.
Your Services may be suspended or terminated for violation of this AUP in accordance with the Threecolts (hereinafter, “Company”) Master Services Agreement or Terms of Use Agreement. Capitalized terms used in this AUP shall have the meaning given in the Master Services Agreement or Terms of Use Agreement. Inquiries regarding this policy should be directed to support@threecolts.com.
1. ABUSE
You may not use Services to engage in, foster, or promote illegal, abusive, or irresponsible behavior, including:
- Unauthorized access to or use of Services, data, systems, or networks, including any attempt to probe, scan, or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of Company;
- Monitoring data or traffic on any network or system without the express authorization of Company;
- Interfering with service to any user of the Services, without limitation, mail bombing, flooding, deliberate attempts to overload a system, or broadcast attacks;
- Collecting or using e-mail addresses, screen names, or other identifiers without the consent of the person identified (including, without limitation, phishing, Internet scamming, password robbery, spidering, and harvesting);
- Collecting or using information without the consent of the owner of the information;
- Use of any false, misleading, or deceptive TCP-IP packet header information, including through the use of virtual private networks or proxy servers;
- Use of the Service to distribute software that covertly gathers information about a user or covertly transmits information about the user;
- Use of the Service for distribution of advertisement delivery software unless: (i) the user affirmatively consents to the download and installation of such software based on a clear and conspicuous notice of the nature of the software, and (ii) the software is easily removable by use of standard tools for such purpose included on major operating systems; or
- Any conduct that is likely to result in retaliation against Company, or the Company’s employees, officers, or other agents, including engaging in behavior that results in any server being the target of a denial of service attack (DoS).
2. EXCESSIVE USE OF SYSTEM RESOURCES
You may not use the Service in a way that unnecessarily interferes with the normal operation of the Company’s services generally. In such circumstances, we may require you to repair abnormalities in your use of the Services if your use of the Services causes unnecessary conflicts with other customers' use of the Services.
3. BULK OR COMMERCIAL E-MAIL
You must obtain Company’s advance approval for any bulk or commercial e-mail, which will not be given unless you are able to demonstrate, at a minimum, that:
- your intended recipients have given their consent to receive e-mail via some affirmative means, such as an opt-in procedure;
- your procedures for soliciting consent include reasonable means to ensure that the person giving consent is the owner of the e-mail address for which the consent is given;
- you retain evidence of the recipient's consent in a form that may be promptly produced on request, and you honor the recipient's and the Company’s requests to produce consent evidence within 72 hours of receipt of the request;
- you have procedures in place that allow a recipient to revoke his or her consent—such as a link in the body of the e-mail, or instructions to reply with the word “Remove” in the subject line; you honor revocations of consent within 48 hours, and you notify recipients that the revocation of their consent will be implemented in 48 hours;
- you must post an e-mail address for complaints (such as abuse@yourdomain.com) in a conspicuous place on any web site associated with the e-mail, you must register that address at abuse.net, and you must promptly respond to messages sent to that address;
- you must have a Privacy Notice posted for each domain associated with the mailing;
- you have the means to track anonymous complaints;
- you must not obscure the source of your e-mail in any manner. Your e-mail must include the recipient's e-mail address in the body of the message or in the “TO” line of the e-mail;
- you must not attempt to send any message to an e-mail address if three (3) consecutive delivery rejections have occurred and the time between the third rejection and the first rejection is longer than 15 days;
- these policies apply to messages sent using the Services; and
- Company may test and otherwise monitor your compliance with its requirements, including requesting opt-in information from a random sample of your email list at any time. In addition, Company may block the transmission of e-mail that violates these provisions.
4. AUTHENTICATED SIMPLE MAIL TRANSFER PROTOCOL POLICY
In addition to the requirements above, you may not send e-mail messages of similar content through Company’s SMTP servers to more than 250 recipients. Attempts to circumvent this restriction by breaking up bulk e-mail over time, using multiple accounts, or other means will be a violation of this restriction.
Company may block mail that violates this AUP. In addition, your mail services may be suspended or terminated for violation of this AUP in accordance with the Master Services Agreement.
5. MAIL RELAYS
Generally, we do not allow bulk or commercial e-mail to be sent to more than 5,000 users per day at a rate of 250 messages every 20 minutes. If you would like to send more than 5,000 messages per day, please contact a member of our support team for additional information.
6. VULNERABILITY TESTING
You may not attempt to probe, scan, penetrate, or test the vulnerability of any of the Service’s systems or networks or to breach the Company’s security or authentication measures, whether by passive or intrusive techniques, without the Company’s express written consent.
7. OFFENSIVE CONTENT
You may not publish, transmit, or store on or via the Company’s Services, network, and equipment any content or links to any content that the Company reasonably believes:
- constitutes, depicts, fosters, promotes, or relates in any manner to child pornography, bestiality, or nonconsensual sex acts;
- is excessively violent, incites violence, threatens violence, or contains harassing content or hate speech;
- is unfair or deceptive under the consumer protection laws of any jurisdiction, including chain letters and pyramid schemes;
- is defamatory or violates a person's privacy;
- creates a risk to a person's safety or health, creates a risk to public safety or health, compromises national security, or interferes with an investigation by law enforcement;
- improperly exposes trade secrets or other confidential or proprietary information of another person or entity;
- is intended to assist others in defeating technical copyright protections;
- infringes on another person's or entity's copyright, trade or service mark, patent, or other property right;
- promotes illegal drugs, violates export control laws, relates to illegal gambling or illegal arms trafficking;
- is otherwise illegal or solicits conduct that is illegal under laws applicable to you or to the Company;
- is otherwise malicious, is otherwise fraudulent, or may result in retaliation against the Company by offended viewers; or
- content “published or transmitted” via the Company’s Services, network, or equipment includes web content, e-mail, bulletin board postings, chat, and any other type of posting or transmission that relies on the Internet.
9. COPYRIGHTED MATERIAL
You may not use the Company’s network or Services to download, publish, distribute, or otherwise copy or use in any manner any text, music, software, art, image, or other work protected by copyright law unless:
- you have been expressly authorized by the owner of the copyright for the work to copy the work in that manner; or
- you are otherwise permitted by established copyright law to copy the work in that manner.
10. OTHER
- You agree that if the Company’s IP address numbers assigned to your account for use of the Servicesare listed on an abuse database like Spamhaus, you will be in violation of this AUP, and the Company may take reasonable action to protect its IP numbers, including suspension and/or termination of your Service, regardless of whether the IP numbers were listed as a result of your actions.
- You agree that we may quarantine or delete any data stored on a shared system if the data are infected with a virus, or are otherwise corrupted, and have the potential to infect or corrupt the system or other customers' data that are stored on the same system.