CAS-COM Internet
Internet  Services
Home and Business Access, Dedicated Connections, Server Co-location
Web Hosting & Design, Internet Training, 
Direct Domain Name Registration

     


      

     

1418 S. Third Street
Louisville, KY 40208
USA
502 636-3091
800 977-3475
502 212-9186 fax

 

support:
support@cas-com.net

Register your Domain Name at BestRegistrar.com

Visit
CASI
(Computer Analytical Systems, Inc.)

for your computer and networking needs

 

 

 

Cas-Com System Policy
(Summary)

System abuse is strictly prohibited. Cas-Com may terminate or modify service immediately and may bill for any resulting support charges if any client engages in system abuse. Following is a list of actions which are defined to be system abuse. This list is non-exclusive; any action about which there is any doubt should be referred to Cas-Com for evaluation.

Actions which constitute system abuse include, but are not limited to:

  • attempting to circumvent user authentication or security of any host, network, or account on Cas-Com systems or the Internet at large ("cracking");
  • attempting, in any way, to interfere with or deny service to any user or any host on the Internet;
  • forging email or USENET posting header information;
  • sending large numbers of unsolicited mail messages (i.e. "junk mail"or "spam"); this includes adding or attempting to add addresses to any mailing list without explicit positive consent of the addressee.
  • forwarding or posting "chain letters" (multiple forwarding) of any type;
  • posting inappropriate messages to USENET newsgroups e.g., posting large numbers of unsolicited posts indiscriminately ("spamming"), or posting encoded binary files to USENET newsgroups not specifically named for that purpose;
  • attempting to cancel, supersede, or otherwise interfere with email or USENET posts other than one's own;
  • engaging in harassment, whether through language, frequency, or size of messages;
  • using an account at another provider to promote an Cas-Com Web site in an abusive manner;
  • using an Cas-Com account or network connection to collect replies to messages sent from another provider which violate these rules or those of that provider;
  • reselling Cas-Com services to third parties who do not abide by these guidelines.

 

Cas-Com System Policy
(Acceptable Use Policy Details)

Introduction

This Acceptable Use Policy ("AUP") sets forth the principles that govern the use by customers of the systems, services and products provided by Cas-Com Incorporated. The AUP has been created to promote the integrity, security, reliability and privacy of Cas-Com's systems and networks.

Compliance With Law

Customers shall not post, transmit, re-transmit or store material on or through any of Cas-Com's system services or products that: (i) is in violation of any local, state, federal or non-United States law or regulation; (ii) threatening, obscene, indecent , defamatory or that otherwise could adversely affect any individual, group or entity (collectively, "Persons"); or (iii) violates the rights of any person, including rights protected by copyright, trade secret, patent or other intellectual property or similar laws or regulations including, but not limited to, the installation or distribution of "pirated" or other software products that are not appropriately licenses for use by customer.

Prohibited Uses of Cas-Com's Systems, Services and Products

This AUP identifies the actions that the Cas-Com considers to be abusive, and thus, strictly prohibited. In addition to the other requirements of this AUP, Customer may only use the Cas-Com's systems, services and products in a manner that, in the Company's sole judgement, is consistent with the purposes of such systems, services and products. If a customer is unsure whether a contemplated use or action is permitted under the AUP, the customer should e-mail Cas-Com with a description of the proposed use at policy@cas-com.net for a determination as to whether the use is permissible under this AUP. The examples identified in the subsections below are non-exclusive and are provided, in part, for guidance purposes.

The following uses of Cas-Com's systems, services and products as described in subsections A through E are expressly prohibited:

  1. Prohibited Actions: General Conduct
    1. Transmitting on or through any of Cas-Com's systems, services, or products any material that is, in Cas-Com's sole discretion, unlawful, obscene, threatening, abusive, libelous, or hateful, or encourages conduct that may constitute a criminal offense, may give rise to civil liability, or otherwise may violate any local, state, national or international law.
    2. Transmission, distribution, or storage of any information, data or material in violation of United States or state regulations or law, or by the common law.
    3. Violations of the rights of any Person protected by copyright, trade secret, patent or other intellectual property or similar laws or regulations.
    4. Actions that restrict or inhibit any Person, whether a customer of the Cas-Com or otherwise, in its use or enjoyment of any of the Cas-Com's systems, services or products.
    5. Resale of Cas-Com's services and products, without the prior written consent of Cas-Com.
    6. Deceptive on-line marketing practices.
    7. Furnishing false data on the signup form, contract, or online application, including fraudulent use of credit card numbers (such conduct is ground for immediate termination and may subject the offender to civil or criminal liability).
  2. Prohibited Actions: System and Network Security
    1. Attempting to circumvent user authentication or security of any host, network, or account ("cracking"). This includes, but is not limited to, accessing data not intended for the customer, logging into a server or account the customer is not expressly authorized to access, or probing the security of other networks (such as running a SATAN scan or similar tool).
    2. Effecting security breaches or disruptions of Internet communications. Security breaches include, but are not limited to, accessing data of which customer is not an intended recipient or logging onto a server or account that customer is not expressly authorized to access. For purposes of this section, "disruption" includes, but is not limited to, port scans, ping floods, packet spoofing, forged routing information, deliberate attempts to overload a service, and attempts to "crash" a host.
    3. Using any program/script/command, or sending messages of any kind, designed to interfere with a user's terminal session, by any means, locally or by the Internet.
    4. Executing any form of network monitoring which will intercept data not intended for Customer.
  3. Prohibited Actions: E-Mail
    1. Harassment, whether through language, frequency, or size of messages, is prohibited.
    2. Sending unsolicited mail messages, including the sending of "junk mail" or other advertising material to individuals who did not specifically request such material ("e-mail spam"). Customers are explicitly prohibited from sending unsolicited bulk mail messages. This includes, but is not limited to, bulk-mailing of commercial advertising, informational announcements, and political tracts. Such material may only be sent to those who have explicitly requested it. If a recipient asks to stop receiving e-mail, the Customer must not send that person any further e-mail.  E-mail is a person-to-person medium, not a broadcast medium.
    3. Creating or forwarding "chain letters" or other "pyramid schemes" of any type, whether or not the recipient wishes to receive such mailings.
    4. Malicious e-mail, including, but not limited to, "mailbombing" (flooding a user or site with very large or numerous pieces of e-mail).
    5. Unauthorized use, or forging, or mail header information.
    6. Using a Cas-Com or a customer account to collect replies to messages sent from another provider.
    7. Use of unsolicited e-mail originating from the Cas-Com network or networks of other Internet Service Providers on behalf of, or to advertise any service hosted by Cas-Com, or connected via the Cas-Com network.
    8. Willful failure to secure open SMTP ports so as to prevent the unauthorized use of customer resources for the purposes of sending unsolicited e-mail by a third party.
  4. Prohibited Actions: Usenet Newsgroups
    1. Positing the same or similar messages to large numbers of Usenet newsgroup ("Newsgroup spams or USENET spam").
    2. Posting chain letters of any type.
    3. Posting encoded binary files to newsgroups not specifically named for that purpose.
    4. Cancellation or superseding of posts other than your own, with the exception of official newsgroup moderators performing their duties.
    5. Forging of header information. This includes attempting to circumvent the approval process for posting to a moderated newsgroup.
    6. Solicitations of mail for any other e-mail address other than that of the poster's account or service, with intent to harass or to collect replies.
    7. Postings that are in violation of the written charters or FAQ's for those newsgroups.
    8. Posting of Usenet articles from the Cas-Com network or networks of other Internet Service Providers on behalf of, or to advertise any service hosted by Cas-Com, or connected via the Cas-Com network.
    9. Failure to secure a news server so as to prevent the unauthorized use of customer resources by a third party which may result in Usenet posts which violate this policy.
    10. Advertisements posted in newsgroups whose chargers/FAQ's explicitly prohibit them. The poster of an advertisement or other information is responsible for determining the etiquette of a given newsgroup, prior to posting to it.
  5. Prohibited Actions: Individual Accounts (Dial-up Users Only)
    1. Utilizing multiple logins, except as allowed by the Cas-Com-provided version of 'screen'. Users of 'user mode IP' programs (such as TIA) may use one additional login via telnet in addition to the initial login. Shell account users may not run programs that provide network services from their accounts, such as IRC or MUD servers.
    2. Attempting to circumvent the 'idle daemon' or time charges accounting, or attempts to run programs while not logged in by any method, are prohibited.
    3. Consuming excessive resources, including CPU time, memory, disk space, and session time. The use of resource-intensive programs which negatively impact other system users or the performance of Cas-Com systems or networks is prohibited, and Cas-Com staff may take action to limit or terminate such programs.
    4. Sharing of passwords or accounts with others.

Complaint and Enforcement

  1.  
    Complaint
    Complaints regarding abusive conduct may be reported by FAX to (502) 636-9157, ATTN: Policy Review, or by mail to:

    Cas-Com Incorporated
    1418 South Third Street
    Louisville, KY 40208-2117

    Complaints will also be accepted via e-mail, so long as a valid return address is included. Cas-Com must be able to independently verify each instance of abuse, and so each complaint must include the COMPLETE TEXT OF THE OBJECTIONABLE MESSAGE, INCLUDING ALL HEADERS. Please do NOT send excerpted parts of a message; sending a copy of the entire message, including headers, helps to prevent misunderstandings based on incomplete information, or information used out of context. Full headers demonstrate which pat h the message has taken, and enable us to determine whether any part of the message has been forged. This information is vital to our investigation.

  2.  
    Enforcement
    Cas-Com may, in its sole discretion, suspend or terminate a customer's service for violation of any of AUP at any time and without warning. AS a general matter, Cas-Com attempts to work with customers to cure violations and to ensure that there is no re-occurrence of the violation prior to terminating service.

Liability

In no event will Cas-Com be liable to any customer or third party for any direct, indirect, special or other consequential damages for actions taken pursuant to this AUP, including, but not limited to, any lost profits, business interruption, loss of programs or other data, or otherwise, even if Cas-Com was advised of the possibility of such damages.

Miscellaneous

  1.  
    Modification of AUP
    Cas-Com retains the right to modify the AUP at any time and any such modification shall be automatically effective as to all customers when adopted by Cas-Com.
  2.  
    Applicability of AUP
    The actions listed herein are also not permitted from other Internet Service Providers. Deceptive marketing, as defined by the Federal Trade commission Deception Policy Statement, is not permitted through the Cas-Com services or network. These rules apply to other types of Internet-based distribution mediums as well, such as RLG's Ariel system (a system for sending FAX-like documents over the Internet).
  3.  
    Cas-Com Is Not Responsible For Content
    Cas-Com is not responsible for the content of any USENET posting, whether or not the posting was made by a customer of the Cas-Com.
  4.  
    Removal of Materials
    At its sole discretion, Cas-Com reserves the right to remove materials from its servers and to terminate internet access to customers that Cas-Com determines have violated this AUP
 
 

[Cas-Com Home] [Access Plans] [Web Hosting] [Training] [Other Services] [Dial In Page] [Member Web Sites] [Support] [Use Policy]

This site is hosted by CAS-Com. Comments and suggestions regarding this site should be sent to support@cas-com.net.
  • For more information on computer services, see the Computer Analytical Systems, Inc., website at www.c-a-s-i.com
  • For more information on Top-Level Domain Name Registration services, see the BestRegistrar.com website at www.BestRegistrar.com.
1997-2007, All rights reserved, Computer Analytical Systems, Inc., Louisville, KY, 40208-2117, USA.