A. ISN Web Hosting & E-commerce Customer Restrictions
Any web site that uses a high amount of server resources (such as, but not limited to, CPU time, memory usage, and network resources) will be given the option to either pay additional fees (which will depend on the resources required), reduce the resources used to an acceptable level, or upgrade its service to a Dedicated Server plan. ISN will be the sole arbiter of what is considered to be a high server usage level. All Web Hosting and E-Commerce accounts come with a limit of 5,000 files per account. Each block of 5,000 files after the initial 5,000 will incur an additional charge of US$9.95/month. Any Web Hosting and E-Commerce account deemed to be adversely affecting server performance or network integrity will be shut down without prior notice.
Sending unsolicited bulk and/or commercial messages over the Internet (known as “spamming”) is prohibited, regardless of whether or not it overloads a server or disrupts service to ISN’s customers. The term “spamming” also includes, but is not limited to, maintaining an open SMTP policy, engaging in spamming using the service of another ISP or IPP and referencing in the spam a web site hosted on a ISN server, and selling or distributing software (on a web site residing on a ISN server) that facilitates spamming. Violators will be assessed a minimum fine of $200 and will face immediate suspension. ISN reserves the right to determine, in its sole and absolute discretion, what constitutes a violation of this provision.
Any scripts that pose a potential security risk or are deemed to be adversely affecting server performance or network integrity will be shut down or will be automatically removed without prior notice. ISN does not permit CGI script sharing with domains not hosted by ISN or any scripts that may be abused for UCE purposes.
ISN does not allow Web Hosting and E-Commerce customers to install their own chat rooms. Chat rooms tend to require significant system resources and therefore cannot be permitted as an account option. However, for a small charge, ISN provides Java chat rooms that meet most users’ needs and run without hindering system performance.
Background Running Programs and Cron Jobs
ISN may allow programs to run in the background. These programs will be considered on an individual basis and Web Hosting and E-Commerce customers will incur extra charges based on system resources used and operational maintenance needed. If you wish to run background programs please contact ISN at email@example.com so that we can arrange set-up.
ISN does not allow IRC or IRC bots to be operated by Web Hosting and E-Commerce customers.
ISN’s Web Hosting and E-Commerce accounts are not configured for the purposes of distributing software and/or multimedia products. If you wish to distribute software and/or multimedia files, please contact firstname.lastname@example.org to make special arrangements.
Multimedia files are defined as any graphics, audio, and video files. ISN Web Hosting and E-Commerce accounts are not to be used for the purposes of distributing and storing unusual amounts of multimedia files. Any web site whose disk space usage for storing multimedia files exceeds 70% of its total usage, in terms of total size or number of files, will be considered to be using an unusual amount of multimedia files.
Any database stored on ISN’s Web Hosting and E-Commerce servers will be limited in size to 10% of the total disk space allotted for that particular domain’s plan/web hosting account.
B. ISN Dedicated Server Customer Restrictions
Customer Security Responsibilities
The customer is solely responsible for any breaches of security affecting servers under customer control. If a customer’s server is involved in an attack on another server or system, it will be shut down and an immediate investigation will be launched to determine the cause/source of the attack. In such event, the customer is responsible for the cost to rectify any damage done to the customer’s server and any other requirement affected by the security breach.
ISN allows Dedicated Server customers the use of IRC inside the ISN network as long as the use of IRC on a ISN server does not violate any of the other terms of these TOU. As a policy, ISN will not provide vanity IRC reverse DNS records. To enforce this policy ISN does not turn the reverse address of IPs over to the customer. Authority over this information remains with ISN.
Billing for Network Resources
The customer understands that the customer is responsible for paying for any network resources that are used to connect the customer’s server to the Internet. The customer may request that the customer’s server be disconnected from the Internet, but the customer will still be responsible for paying for any network resources used up to the point of suspension or cancellation.
ISN’s services include, but are not limited to:
any act of preparing, setting up, connecting, maintaining, terminating, or reconnecting customers’ account (including all billing data and the space on the particular Web server that ISN provides to customers);
any use by customers, or any access provided to customers by ISN, of computing, telecommunications, software, information, hardware, and equipment;
any act, or provision of any service, by ISN to customers, related to web hosting and domain name registrations (including server usage and technical support), regardless of duration and whether paid for or not;
any provision by ISN to customers, of any space, Internet connectivity, or electrical power;
any access or use related to the ISN’s web site, including the web site itself;
any other service mentioned in the TOU;
any other service provided by ISN to customers, whether used or not;
any other ISN services that are used by customers, whether offered or provided by ISN to customers.
Ownership of Web Site
The legal owner of customers’ web sites and accounts with ISN will be the individual or organization whose name is listed in ISN’s database as the owner. Customers will fully cooperate with and abide by any and all of ISN’s security measures and procedures in the event of any dispute over ownership of customers’ web sites and accounts with ISN.
ISN servers may be used for lawful purposes only. Transmission, storage, or distribution of any information, data, or material in violation of any applicable law or regulation, or that may directly facilitate the violation of any particular law or regulation is prohibited. This includes, but is not limited to: copyrighted material; trademarks; trade secrets or other intellectual property rights used without proper authorization; material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws. Additionally, in purchasing ISN services, all ISN customers certify that they and/or the organization they represent in procuring services from ISN are not, nor have been designated, a suspected terrorist as defined in Executive Order 13224; are not owned or controlled by a ‘suspected terrorist’ as defined in Executive Order 13224; and are not on, are not a member of, related to, associated with, or controlled by any organizations on the list contained in the Annex to Executive Order 13224 and all updates thereto.
Sending unsolicited bulk and/or commercial messages over the Internet (known as “spamming”) is prohibited, regardless of whether or not it overloads a server or disrupts service to ISN’s customers. The term “spamming” also includes, but is not limited to, maintaining an open SMTP policy, engaging in spamming using the service of another ISP or IPP and referencing in the spam a web site hosted on a ISN server, and selling or distributing software (on a web site residing on a ISN server) that facilitates spamming. Violators will be assessed a minimum fine of US$200 and will face immediate suspension. ISN reserves the right to determine, in its sole and absolute discretion, what constitutes a violation of this provision.
System and Network Abuse
Violations of system or network security are prohibited and may result in criminal and civil liability. Examples of system or network security violations include, without limitation the following: unauthorized access to or use of data, systems or networks, including any attempt to prob