Alice Networks Ltd Acceptable Use Policy (AUP)
Violations of this AUP include, but are not limited to, the following:
Illegal Usage
- Engaging in illegal activities: Supporting or engaging in any activities deemed illegal.
- Cooperation with legal authorities: Alice Networks Ltd reserves the right to cooperate with legal authorities for investigation purposes.
Threats
- Transmitting threatening materials: Sending materials that threaten or promote harm and property destruction.
Harassment
- Transmitting harassing material: Sending any material that is considered harassing or abusive.
Forgery/Impersonation
- Manipulating network header information: Altering network headers or impersonating others is prohibited.
Fraudulent Activity
- Engaging in fraud: Participating in fraudulent activities, including pyramid schemes and chain letters.
Spam (Unsolicited Email)
- Transmitting unsolicited email: Sending unsolicited commercial or bulk email is strictly forbidden.
Email/News Bombing
- Intentional service disruption: Disrupting email services or newsgroups intentionally.
Message Forging
- Forging message headers: Altering message headers in emails or other electronic transmissions.
Usenet Spamming
- Violating newsgroup rules: Breaking newsgroup or mailing list rules, including sending unauthorized commercial messages.
Unauthorized Access
- Accessing other accounts: Attempting to access others’ accounts or systems without permission.
Intellectual Property Violations
- Infringing on proprietary rights: Violating copyrights, trademarks, patents, trade secrets, or other proprietary rights.
Personal Data Collection
- Collecting data without consent: Gathering personal data without the consent of the individual.
Network Disruptions
- Disrupting services: Engaging in activities that disrupt the use of the internet or Alice Networks Ltd services for others.
Fraud
- Misleading practices: Participating in deceptive or misleading activities.
Infringement of Intellectual Property
- Unauthorized distribution: Distributing or posting protected content without authorization.
Distribution of Viruses
- Distributing harmful software: Sending or distributing viruses, malware, or other harmful software.
Inappropriate Software Use
- Disrupting services: Using software in a manner that disrupts services, including facilitating continuous connections.
Third-Party Accountability
- Responsibility for third-party actions: Subscribers are responsible for violations committed by third parties through their accounts.
Adult Content
- Permissible content: Adult content is permitted.
IP Address Misuse
- Using unassigned IP addresses: Using IP addresses not assigned by Alice Networks Ltd is prohibited.