GlobalComm - Acceptable Use Policy
The actions described below are defined by GlobalComm as "system abuse" and are strictly prohibited under this Policy. The examples named below are not exhaustive and are provided solely for guidance to Customers. If any Customer is unsure of whether a contemplated use or action is permitted, it is Customer's responsibility to determine whether the use is permitted by contacting GlobalComm via electronic mail. The following activities are expressly prohibited, and GlobalComm expressly reserves the right, at its discretion, to pursue any remedies that it believes are warranted which may include, but is not limited to, filtering, suspending, or terminating accounts, end-users or Customers that engage in system abuse or who refuse to address user abuse.
In general, GlobalComm Customers may not use GlobalComm's network, machines, or services in any manner which:
- violates any applicable law, regulation, treaty, or tariff;
- violates the acceptable use policies of any networks, machines, or services which are accessed through GlobalComm's network;
- infringes on the intellectual property rights of GlobalComm or others;
- violates the privacy of others;
- involves the resale of GlobalComm's products or services, unless specifically documented in a separate written agreement or in the initial Customer contract with GlobalComm;
- involves deceptive online marketing practices including, without limitation practices that violate the United States Federal Trade Commission's guidelines for proper online marketing schemes; or
- otherwise violates this Acceptable Use Policy.
Prohibited activities also include but are not limited to, the following:
- unauthorized use (or attempted unauthorized use) of any machines or networks,
- attempting to interfere with or denying service to any user or host (e.g. denial of service attacks);
- falsifying header information or user identification information;
- introduction of malicious programs into the network or Server (e.g. viruses, worms, Trojan horses, etc.);
- monitoring or scanning the networks of others without permission;
- attempted or successful security breaches or disruption of Internet communication including, but not limited to, accessing data of which Customer is not an intended recipient or logging into a Server or account that Customer is not expressly authorized to access;
- executing any form of network monitoring (e.g. packet sniffer) which will intercept data not intended for the Customer;
- attempting to circumvent Customer authentication or security of any host, network, or account ("cracking");
- Using any program/script/command, or sending messages of any kind, designed to interfere with a third party customer terminal session, via any means, locally or via the Internet;
- sending unsolicited bulk email;
- maintaining an open mail relay;
- collecting email addresses from the Internet for the purpose of sending unsolicited bulk email or to provide collected addresses to others for that purpose;
- transmitting or receiving copyright-infringing or obscene material;
- furnishing false or incorrect data on the signup form; or
- attempting to circumvent or alter the process or procedures to measure time, bandwidth utilization, or other methods to document "use" of GlobalComm's products and services.
Digital Millennium Copyright Act Policy
It is the policy of GlobalComm to respond expeditiously to claims of intellectual property infringement. GlobalComm will promptly process and investigate notices of alleged infringement and will take appropriate actions under the Digital Millennium Copyright Act ("DMCA") and other applicable intellectual property laws. Upon receipt of notices complying or substantially complying with the DMCA, when it is under its control, GlobalComm will act expeditiously to remove or disable access to any material claimed to be infringing or claimed to be the subject of infringing activity and will act expeditiously to remove or disable access to any reference or link to material or activity that is claimed to be infringing. GlobalComm will terminate access for Customers who are repeat infringers. For our Webhosting customers, you must adopt and implement a Digital Millennium Copyright Act policy that reserves the necessary rights to remove or disable infringing material.
If you believe that a copyrighted work has been copied and is accessible on our site in a way that constitutes copyright infringement, you may notify us by providing our registered copyright agent with the following information:
- an electronic or physical signature of the person authorized to act on behalf of the owner of the copyright interest;
- a description of the copyrighted work that you claim has been infringed;
- a description of where the material that you claim is infringing is located on the site;
- your address, telephone number, and e-mail address;
- a statement by you that you have a good faith belief that the disputed use is not authorized by the copyright owner, its agent, or the law;
- a statement by you, made under penalty of perjury, that the above information in your Notice is accurate and that you are the copyright owner or authorized to act on the copyright owner's behalf.
Notices of claimed infringement should be directed to James Mitchell, GlobalComm, P.O.Box 142 SPO, Cayman Brac KY2-2101, Cayman Islands
When GlobalComm removes or disables access to any material claimed to be infringing, GlobalComm may attempt to contact the user who has posted such material in order to give that user an opportunity to respond to the notification. Any and all counter notifications submitted by the user will be furnished to the complaining party. GlobalComm will give the complaining party an opportunity to seek judicial relief in accordance with the DMCA before GlobalComm replaces or restores access to any material as a result of any counter notification.
Unsolicited Bulk Email Support Services and Email Address Harvesting
Customers and users may not advertise, distribute, or use software intended to facilitate sending unsolicited bulk email or harvest email addresses from the Internet for that purpose. Customers and users may not sell or distribute lists of harvested email addresses for that purpose.
How to Contact Us
To contact us with questions or comments regarding this Acceptable Use Policy or claimed violations of this Policy, please email [email protected].