Anti-Abuse Policy Anti-Abuse Policy


It is strictly forbidden to publish or transmit any material using services which contains or consists in:

Pornography and Child Pornography.
Violence, incitement to violence, threats, racial hatred.
Any kind of scam (including chain letters or pyramid schemes).
Libelous or violate the privacy of a person is in fact an attack on the safety or health of a person, group of persons, compromising national security or obstructs an legal investigation ongoing.
Exposure improperly market intelligence, industrial or other confidential or proprietary information of another person.
It is the intention to assist in breaking all forms of information protection (ex. serial numbers, access passwords, etc).
Copy manifestly without; to have this right, any trademark, patent or other form of information protected by the copyright laws.
Promotes the production, consumption and/or drugs, violate laws, promotes illegal gambling, or illegal arms trafficking.

It is forbidden; any form; unlawful behavior, abusive or irresponsible, including, but not limited to:

Unauthorized access to the use of information systems or networks, including any attempt; sampling, scan or test the vulnerability of a system or network of, or attempt to break security and authentication mechanisms (including the and its customer) without the express permission of the owner of the network or system.
Monitoring data and/or traffic from any network or system without the express permission of the owner of the network or system.
Interfering with any users service, host or network, including, but not limited; by: mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks.
Using an Internet account or computer without the permission of the owner, including but not limited to: Internet scans (cheating other users to find access passwords), password stealers, security holes scans, port scans.
Falsification of any TCP IP packet header or any part of the information in an e-mail headers.
Breaking these rules can result in immediate termination of services and a block to network.