CBI CONNECT, INC.’S ACCEPTABLE USE POLICY

  1. Spamming: CBI strictly prohibits sending unsolicited junk email and/or commercial solicitation via the Internet. CBI reserves the right to determine from the available evidence whether or not the client has engaged in this activity. If CBI suspects such activity, we will take appropriate action at sole discretion of CBI.

  2. Distribution of Internet Viruses, Worms, or other Destructive Elements: Distributing Internet viruses, worms, or any other destructive element, or any information regarding the creation of the aforementioned, is considered a violation of use of CBI’s services. This also includes any activities that disrupt the use of CBI services by its other clients. CBI is required by law to notify enforcement agencies when it becomes aware of such activities.

  3. Obscene Language & Material: Sending, posting, or making available content, including but not limited to, child pornography or other obscene material through the use of CBI’s network or services is prohibited by CBI. CBI is required by law to notify enforcement agencies when it becomes aware of such activities.

  4. Falsification of Information: Clients may not falsify user information provided to CBI in connection with the use of any CBI service is strictly prohibited.

  5. Intellectual Property Violations: Engaging in activities that violate the rights and privacy of others is prohibited by CBI. These activities include but are not limited to, activities that infringe on the laws governing copyrights, trademarks, trade secrets, and software piracy. CBI may be required by law to offer information to enforcement agencies regarding any evidence of such violations.

  6. Unauthorized Access to Other Computers or Networks: Any activity that concludes with the access to another’s computer or network without proper authorization, or any action taken as a precursor to an attempted computer or system penetration, is strictly prohibited by CBI. CBI may be required by law to provide enforcement agencies with requested evidence of such actions.

  7. Harm to minors: Using the Services to harm, or attempt to harm, minors in any way.

  8. Threats: Using the Services to transmit any material (by email, uploading, posting, or otherwise) that threatens or encourages bodily harm or destruction of property.

  9. Harassment: Using the Services to transmit any material (by email, uploading, posting, or otherwise) that harasses another.

  10. Fraudulent Activity: Using the Services to make fraudulent offers to sell or buy products, items, or services or to advance any type of financial scam such as "pyramid schemes," "Ponzi schemes," and "chain letters.”

  11. Forgery or impersonation: Adding, removing or modifying identifying network header information in an effort to deceive or mislead is prohibited. Attempting to impersonate any person by using forged headers or other identifying information is prohibited. The use of anonymous remailers or nicknames does not constitute impersonation. Using deliberately misleading headers ("munging" headers) in news postings in order to avoid spam email address collectors is allowed.

  12. Unauthorized access: Using the Services to access, or to attempt to access, the accounts of others, or to penetrate, or attempt to penetrate, security measures of CBI's or another entity's computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in the corruption or loss of data.

  13. Copyright or trademark infringement: Using the Services to transmit any material (by email, uploading, posting, or otherwise) that infringes any copyright, trademark, patent, trade secret, or other proprietary rights of any third party, including, but not limited to, the unauthorized copying of copyrighted material, the digitization and distribution of photographs from magazines, books, or other copyrighted sources, and the unauthorized transmittal of copyrighted software.

  14. Collection of Personal Data: Using the Services to collect, or attempt to collect, personal information about third parties without their knowledge or consent.

  15. Other Illegal Activities: Engaging in activities including but not limited to, those that are determined to be illegal, including advertising of such activities, software piracy, or credit card use violations are strictly prohibited by CBI. CBI is required by law to report such activities to enforcement agencies upon becoming aware of their existence.

CBI RESERVES THE RIGHT TO AMEND, REVISE AND/OR UPDATE ITS ACCEPTABLE USE POLICY AT ANY TIME.