The Appropriate Use Policy (AUP) is intended
to help protect our customers, and the Internet community, from
the inappropriate use of the Internet. A customer's use of Appalachian
Technologies' service constitutes acceptance of this AUP. We reserve
the right to revise and update this AUP from time to time. Appalachian
Technologies expects its customers to cooperate, when requested,
to aid in any necessary investigations.
Click the links to navigate quickly:
Impersonations/Forgery: Adding, removing,
or modifying identifying network header information ("spoofing")
in an effort to deceive or mislead is prohibited. Attempting to
impersonate any person by using forged headers or other identifying
information is prohibited. The use of anonymous remailers and nicknames
does not constitute impersonation. Using deliberately misleading
headers ("munging" headers) in news postings in order to avoid spam
e-mail address collectors is allowed provided appropriate contact
information is contained in the body of the posting.
gain access to any electronic systems, networks or data, without
proper consent, are prohibited.
Reselling: The resale of Appalachian Technologies' service without
proper authorization from Appalachian Technologies, Inc. is prohibited.
Threats: Threats of bodily harm against others or destruction of
property are prohibited.
Harrasment: Threatening or harassing activity is prohibited.
Illegal Use: The use of Appalachian Technologies' service for any
illegal purpose is prohibited. |top|
Any activities, which adversely affect
the ability of other people or systems to use Appalachian Technologies'
services or the Internet, are prohibited. This includes "denial
of service" (DoS) attacks against another network host or against
an individual user.
Interference with or disruption of other network users, network
services or network equipment is prohibited.
It is the customer's responsibility to ensure that their network
is configured in a secure manner. A customer may not, through action
or inaction, allow others to use their network for illegal or inappropriate
actions. A customer may not permit their network, through action
or inaction, to be configured in such a way that gives a third party
the capability to use their network in an illegal or inappropriate
Sending unsolicited commercial e-mail
Using an Appalachian Technologies' e-mail or web site address to collect
responses from unsolicited commercial e-mail is prohibited.
Sending large volumes of unsolicited e-mail, whether or not that e-mail
is commercial in nature, is prohibited.
Activities that have the effect of facilitating unsolicited commercial
e-mail, or large volumes of unsolicited e-mail whether or not that
e-mail is commercial in nature, are prohibited.|top|
Spam is, first and foremost, a numerical
metric-posting substantively similar articles individually to multiple
news groups is spamming by definition. This form of Spam is sometimes
referred to as "excessive multi-posting" (EMP). Appalachian Technologies
considers "multi-posting" to 10 or more groups within a two-week sliding
window to be excessive. Appalachian Technologies' servers currently
limit the number of allowable "cross-posts" to 9.
Hostile attacks or invectives (flames) aimed at a group or an individual
poster, are generally considered inappropriate in Appalachian Technologies'
service groups. Flames in the non-service groups are discouraged.
Many news readers offer filtering capabilities that will bring certain
messages to your attention or skip over them all together (kill files).
Appalachian Technologies' customers may not cancel messages other
than their own messages. A customer may cancel posts forged in that
customer's name. Appalachian Technologies may cancel any postings,
which violate this AUP. |top|
Using an Appalachian Technologies' web
site address or an Appalachian Technologies hosted web account to
collect responses from unsolicited commercial e-mail is also prohibited.
Internet Relay Chat
The use of IRC bots is prohibited. The
violation of any accepted policies on IRC servers is prohibited.
Appalachian Technologies' account
descriptions specify any limits on bandwidth and disk utilization.
The use of bandwidth or disk space in excess of those limits is
not permitted. Bandwidth utilization is determined by the total
number of bytes transferred from an account's Web and FTP space.
Disk utilization is determined by the total number of bytes required
to store an account's web, FTP, and mail data.
If Appalachian Technologies determines that excessive bandwidth
or disk space utilization is adversely affecting Appalachian Technologies'
ability to provide service, Appalachian Technologies may take immediate
action. Appalachian Technologies will attempt to notify the account
owner by e-mail as soon as practicable.
Appalachian Technologies requests
that anyone who believes that there is a violation of this AUP should
direct the information to Appalachian Technologies, Inc. at the
Appalachian Technologies customers who wish to report "Spam" they
have received from another source (non-Appalachian Technologies)
should send copies of the email they received, along with full header
information email@example.com These messages may not receive
a response, but Appalachian Technologies may use the information
received to aid in the development of filter lists.
All issues involving other e-mail abuse originating from Appalachian
Technologies e-mail or network addresses should be sent here: firstname.lastname@example.org
All issues regarding USENET "news" abuse issues originating from
Appalachian Technologies customers should be sent here: email@example.com
All other issues should be sent here: firstname.lastname@example.org These
might include security concerns, general questions or other issues
involving our Appropriate Use Policy ("AUP").
Appalachian Technologies may take any one or more of the following
actions in response to complaints: issue warnings: written or verbal
suspend the customer's news group posting privileges suspend the
customer's account terminate the customer's account bill the customer
for administrative costs and/or reactivation charges. |top|
What Information Should Be Submitted:
1. The IP address used to commit the alleged violation.
2. The date and time of the alleged violation, including the time
zone or offset from GMT Evidence of the alleged violation.
3. E-mail with full header information provides all of the above,
as do syslog files. Other situations will require different methods
of providing the above information.
If you have questions or concerns regarding any of these policies,
please contact Appalachian Technologies at email@example.com