Acceptable Use Policy
Last updated: 2020-04-27
This Acceptable Use Policy governs the use of Puget Tech’s hosting services, to include but not limited to application servers, virtual machines, websites, backups, and email. Violation of this AUP may result in suspension or termination of your service. In the event of a dispute between you and Puget Tech regarding the interpretation of this AUP, Puget Tech’s interpretation, in its reasonable commercial judgment, shall govern.
Puget Tech may refuse to accept any client or any website for participation in the Puget Tech hosting network as determined by Puget Tech at its sole discretion. Any material that in our judgment that is obscene or threatening is prohibited and will be removed from our servers with or without notice.
Offensive Content
You may not publish or transmit via Puget Tech’s service any content that Puget Tech reasonably believes:
- Constitutes child pornography;
- Is excessively violent, incites violence, threatens violence, or contains harassing content or hate speech;
- Is unfair or deceptive under the consumer protection laws of any jurisdiction, including chain letters and pyramid schemes;
- Is defamatory or violates a person’s privacy;
- Creates a risk to a person’s safety or health, creates a risk to public safety or health, compromises national security, or interferes with a investigation by law enforcement;
- Improperly exposes trade secrets or other confidential or proprietary information of another person;
- Is intended to assist others in defeating technical copyright protections;
- Clearly infringes on another person’s trade or service mark, patent, or other property right;
- Promotes illegal drugs, violates export control laws, relates to illegal gambling, or illegal arms trafficking;
- Is otherwise illegal or solicits conduct that is illegal under laws applicable to you or to Puget Tech; or
- Is otherwise malicious, fraudulent, or may result in retaliation against Puget Tech by offended viewers.
Content “published or transmitted” via Puget Tech’s service includes Web content, email, bulletin board postings, video, chat, and any other type of posting or transmission that relies on any Internet service provided by Puget Tech.
Unlimited Hosting Disclaimer
If your service plan, product, or offering includes “Unlimited Hosting” when ordered then we do not place a fixed limit on the amount of bandwidth or disk space that may be utilized during the normal operation of your service. Files and other content hosted must be relevant to the functionality or use of your service.
In the event your service usage or content presents a risk to the stability, performance or uptime of our servers, data storage, network, or other infrastructure, we may take action to restrict the resources your service is utilizing and require you to upgrade to a more suitable package or plan.
Utilizing unlimited resources for archiving or storage of non-business related media files such as movies, music, and TV shows is strictly prohibited. Abusing or reselling unlimited bandwidth, unlimited disk space, or other unlimited resources will result in termination.
Unacceptable Material or Content
You may not host, run, or interact with any of the following sites, services, or offerings on Puget Tech’s servers or network.
- IRC Bots / Clients / Proxies / Servers
- Proxy Scripts / Anonymizers
- Pirated Software / Warez
- Image hosting sites
- Escrow Services
- High Yield Interest Programs (HYIP)
- Cryptocurrency Mining / Exchanges
- Torrent Tracking / Downloading / Sharing
- Bank Debentures
- Bank Debenture Trading Programs
- Forex Trading
- Prime Banks Programs
- Lottery or giveaway sites
- MUDS or RPG’s
- Hate / Racism / Sexual Harassment sites
- File Upload / Sharing sites
- Drug Paraphernalia
- Movie / TV Show sharing or streaming
- Hacker focused sites / archives / programs
- Any sites or platforms promoting illegal activities
Security
You must take reasonable security precautions. You must protect the confidentiality of your passwords and other credentials. You should change your password periodically and we encourage you to enable MFA (Multi-factor authentication) when available.
Bulk Commercial Email
You must obtain Puget Tech’s advance approval for any bulk commercial email, which will not be given unless you are able to demonstrate all of the following to Puget Tech’s reasonable satisfaction:
- Your intended recipients have given their consent to receive email via some affirmative means, such as an opt-in procedure;
- Your procedures for soliciting consent include reasonable means to ensure that the person giving consent is the owner of the email address for which the consent is given;
- You retain evidence of the recipient’s consent in a form that may be promptly produced on request, and you honor recipient’s and Puget Tech’s requests to produce consent evidence within 72 hours of receipt of the request.
- The email must describe how the email address was obtained, for example, “You opted in to receive this email promotion from our Web site or from one of our partner sites,” and information on how to request evidence of the consent, for example, “If you would like to learn more about how we received your email address please contact us at abuse@**yourdomain.com**.”
- You have procedures in place that allow a recipient to easily revoke their consent – such as a link in the body of the email, or instructions to reply with the word “Remove” in the subject line. Revocations of consent are honored within 72 hours, and you notify recipients that their revocation of their consent will be honored in 72 hours;
- You must post an abuse@**yourdomain.com** email address on the website associated with the email, you must register that address at abuse.net, and you must promptly respond to messages sent to that address;
- You must have a Privacy Policy posted for each domain associated with the mailing;
- You have the means to track anonymous complaints;
- You may not obscure the source of your email in any manner. Your email must include the recipients email address in the body of the message or in the “TO” line of the email; and
- You otherwise comply with the CAN SPAM Act and other applicable law.
These policies apply to messages sent using your Puget Tech service, or to messages sent from any network by you or any person on your behalf that directly or indirectly refer the recipient to a site hosted via your Puget Tech service. In addition, you may not use a third party email service that does not practice similar procedures for all its clients.
Puget Tech may test and otherwise monitor your compliance with its requirements, including requesting opt-in information from a random sample of your list at any time.
Unsolicited email
You may not send any unsolicited email, either in bulk or individually, to any person who has indicated that they do not wish to receive it.
You must comply with the rules of any other network you access or participate in using your Puget Tech’s services.
Material Protected by Copyright
You may not publish, distribute, or otherwise copy in any manner any music, software, art, or other work protected by copyright law unless:
- you have been expressly authorized by the owner of the copyright for the work to copy the work in that manner;
- you are otherwise permitted by established United States copyright law to copy the work in that manner.
Puget Tech will terminate the service of repeat copyright infringers.
Copyright Infringement Notice (Digital Millennium Copyright Act)
If you believe your copyright is being infringed by a person using the Puget Tech network, please send your written notice of copyright infringement to: [email protected]
Your notice must include the following:
- A physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed;
- Identification of the copyrighted work claimed to have been infringed, or if multiple copyrighted words at a single site are covered by a single notification, a representative list of such works at that site;
- Identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit Puget Tech to locate the material;
- Information reasonably sufficient to permit Puget Tech to contact you, such as an address, telephone number, and, if available, an email address;
- A statement that you have a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, the copyright owner’s agent, or the law;
- A statement that the information in the notification is accurate, and under penalty of perjury that you are authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
Internet Abuse
You may not engage in illegal, abusive, or irresponsible behavior, including:
- Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures (including those belonging to Puget Tech and its clients) without express authorization of the owner of the system or network;
- Monitoring data or traffic on any network or system without the authorization of the owner of the system or network;
- Interference with service to any user, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks; Use of an Internet account or computer without the owner’s authorization, including, but not limited to Internet scanning (tricking other people into releasing their passwords), password robbery, security hole scanning, and port scanning;
- Forging of any TCP/IP packet header or any part of the header information in an email or a newsgroup posting; or
- Any conduct that is likely to result in retaliation against the Puget Tech’s network and/or services.
- Use of Puget Tech’s network and/or systems in a way that unreasonably interferes with Puget Tech’s other clients’ use of the same resources.
Other
You must have valid and current information on file with your domain name registrar for any domain hosted on the Puget Tech network.
You agree that when communicating with our staff, all communication will be void of profanity, racism, sexual harassment, and/or abusive demeanor.
General Disclaimer
Puget Tech is under no duty, and does not by this AUP undertake a duty, to monitor or police our clients’ activities and disclaims any responsibility for any misuse of the Puget Tech network.
Inquiries regarding this policy should be directed to [email protected]