Acceptable Use Policy
This Policy specifies the actions prohibited and recommendations suggested by SupraNet to users of the SupraNet Network. All Clients demonstrate their acceptance to this Policy by using the SupraNet Network. If client is found in violation of SupraNet’s Acceptable Use Policy SupraNet reserves the right to terminate Client’s connection and/or services at anytime at SupraNet’s sole discretion. SupraNet reserves the right to modify the Policy at any time, effective upon posting of the modified Policy to this URL:
The SupraNet network may be used only for lawful purposes. Transmission, distribution or storage of any material in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property right used without proper authorization, material that is obscene, defamatory, constitutes an illegal threat, violates export control laws or any material that SupraNet deems inappropriate.
Violations of system or network security are prohibited, and may result in criminal and civil liability. SupraNet will investigate incidents involving such violations and may involve and will cooperate with law enforcement if a criminal violation is suspected. Examples of system or network security violations include, without limitation, the following:
- Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network.
- Unauthorized monitoring and/or collecting of data or traffic on any network or system without express authorization of the owner of the network or system.
- Interference with service to any user, host or network including, without limitation, mailbombing, attempts to overload a system or network with traffic, and deliberate transmission of malicious code.
- Forging of IP packet headers, DNS names, e-mail addresses, or any attempt to forge identity including newsgroup and bulletin board postings.
Bulk Email Guidelines
The function of email is to communicate to individuals about something they are interested in. SupraNet permits sending of bulk e-mail and mailing lists, including those containing commercial advertisements, provided an explicit, expressed interest by the recipient. Indiscriminate subscription of e-mail addresses, both intentional and unintentional, is strictly prohibited and will result in service termination. Guidelines for bulk e-mail are as follows:
- Purchasing and/or harvesting of e-mail address is strictly prohibited. Client may make no assumptions of interest based on newsgroup or bulletin board posting.
- Clients are required to use one of the following methods when managing new subscribers or e-mail lists:
- “OPT-IN + Confirm”, where the subscriber is only added after confirming interest in the list via e-mail reply or another confirmation method.
- “OPT-IN + Notice”, where the subscriber is notified of method and reason for subscription prior to sending of any messages.
- Unsubscribe instructions should be included in every correspondence, and must be honored within 24 hours. Unclear or non-functioning unsubscribe instructions are considered invalid, and a violation of this policy.
- SupraNet’s shared e-mail servers are not designed for the sending of bulk e-mail in any form. Client shall under no circumstances use a SupraNet shared server to send more than 50 recipients per message, or send more than 1,000 recipients per day.
Systems and Network Security
Client assumes full responsibility for security of network, systems, and accounts. SupraNet strongly recommends employing the following methods to lessen risks associated with Internet and e-mail connectivity:
- Use a security device such as a Firewall on all network entry points.
- Keep systems and software up to date; subscribe to vendor mailing lists in order to be promptly informed of security issues.
- Install and maintain anti-virus software; configure mail servers to block or disarm malicious attachments.
- Regularly train users on risky behavior, such as opening of attachments in e-mail and chat programs, or providing sensitive information such as passwords and certificates to untrusted sources.
- Conduct annual or semi-annual security audits. Client has the option of negotiating and obtaining this service through SupraNet.
Data Center Security
- To secure the data center, SupraNet shall retain an advanced approved visitor’s list. In addition, all data center visitors shall present to SupraNet a valid, state-issued photo identification card before entering the data center. All visitors shall be in compliance with SupraNet’s Data Center procedure.
- SupraNet shall have the right to make a copy of the identification card.
- SupraNet shall have the right to escort the visitors during their visits to the data center.
- Client agrees to immediately notify SupraNet of any suspected or confirmed compromise that has or may result in abnormal usage, pose a threat to SupraNet’s systems or network, or to the greater Internet.
Due to the nature of Internet connectivity, SupraNet may need to suspend service to Client networks, systems, or accounts in the event that such are believed compromised. SupraNet will make reasonable efforts to contact the Client in these cases, but reserves the right to do so without advance warning.
INDIRECT OR ATTEMPTED VIOLATIONS OF THE POLICY, AND ACTUAL OR ATTEMPTED VIOLATIONS BY A THIRD PARTY ON BEHALF OF A SUPRANET CLIENT OR A CLIENT’S END USER, SHALL BE CONSIDERED VIOLATIONS OF THE POLICY BY SUCH CLIENT OR END USER.
Complaints regarding Illegal Use or Unsolicited e-mail should be sent to email@example.com
Complaints or concerns of Network, System, or Account security should be sent to firstname.lastname@example.org