Policy Overview

All GlobalComm customers are responsible for reviewing and complying with this Acceptable Use Policy. GlobalComm customers who provide services to their own users must affirmatively and contractually pass on the restrictions of this Acceptable Use Policy to their users, and take steps to ensure compliance by their users with this Acceptable Use Policy including, without limitation, termination of users who violate this policy.

For the purposes of this Policy, "Customer" shall be defined to include GlobalComm's customers and also a customer's users and account holders. This Policy is subject to change with notice by publication on the web; customers are responsible for monitoring this web site for changes.

Last Updated: July 21, 2012

System Abuse

The actions described below are defined by GlobalComm as "system abuse" and are strictly prohibited. GlobalComm reserves the right to pursue remedies including filtering, suspending, or terminating accounts that engage in system abuse.

General Prohibitions

GlobalComm Customers may not use GlobalComm's network, machines, or services in any manner which:

  • Violates any applicable law, regulation, treaty, or tariff.
  • Violates the acceptable use policies of any networks accessed through GlobalComm.
  • Infringes on the intellectual property rights of GlobalComm or others.
  • Violates the privacy of others.
  • Involves the resale of GlobalComm's products/services without written agreement.
  • Involves deceptive online marketing practices (e.g., violating FTC guidelines).

Specific Prohibited Activities

  • Unauthorized use of any machines or networks.
  • Denial of service attacks or interfering with service to any user.
  • Falsifying header information or user identification.
  • Introduction of malicious programs (viruses, worms, Trojans).
  • Monitoring or scanning networks without permission.
  • Security breaches, accessing data not intended for the Customer.
  • Network monitoring (packet sniffing) to intercept data.
  • Circumventing authentication or security ("cracking").
  • Interfering with third-party terminal sessions.
  • Sending unsolicited bulk email (Spam).
  • Maintaining an open mail relay.
  • Harvesting email addresses for unsolicited bulk email.
  • Transmitting copyright-infringing or obscene material.
  • Furnishing false data on signup forms.
  • Tampering with bandwidth measurement or usage tracking procedures.

Digital Millennium Copyright Act (DMCA)

It is the policy of GlobalComm to respond expeditiously to claims of intellectual property infringement. Upon receipt of notices complying with the DMCA, GlobalComm will act to remove or disable access to infringing material. We will terminate access for Customers who are repeat infringers.

Filing a Claim

If you believe a copyrighted work has been infringed, notify our agent with:

  • Signature of the copyright owner or authorized agent.
  • Description of the copyrighted work.
  • Location of the infringing material on our site.
  • Your contact info (address, phone, email).
  • Statement of good faith belief that the use is unauthorized.
  • Statement under penalty of perjury that the information is accurate.

Send notices to:
James Mitchell, GlobalComm
P.O.Box 142 SPO, Cayman Brac KY2-2101, Cayman Islands

Email Policy

Customers and users may not advertise, distribute, or use software intended to facilitate sending unsolicited bulk email or harvest email addresses from the Internet for that purpose. Selling or distributing harvested lists is strictly prohibited.

Report violations

Report Abuse