Acceptable Use Policy for Trinsic Technologies
Updated: January 15, 2015
1.1 This Acceptable Use Policy (“AUP”) as amended, modified or supplemented from time to time, is incorporated by reference into your IT Service Agreement with Trinsic Technologies, Inc. (“Trinsic”). This AUP is designed to (i) protect Trinsic’s customers, users of Trinsic’s website, Trinsic's products and services ("Services"), Trinsic computer network and physical infrastructure (“Network”), and third parties, (ii) further compliance with all relevant laws and regulations, (iii) promote the security and availability of Trinsic’s website, Trinsic Network and physical infrastructure and (iv) regulate and restrict the use of all Trinsic Services, its website, Trinsic Network and its physical infrastructure (the “Trinsic System”). This AUP is also intended to establish a clear understanding of what Trinsic expects of its clients using its services.
By using the Trinsic System,
you agree to comply with this Acceptable Use Policy (“AUP”) and to be responsible
for use by your users and your customers’ users. Trinsic may
suspend or terminate your Service) for violation of this AUP in
accordance with your Agreement.
1.2 Trinsic may modify the AUP at any time without notice by posting a revised AUP on www.trinsictech.com. Changes are effective on posting. Your use of a Service after changes to the AUP are posted constitutes acceptance of any changed or additional terms. Trinsic makes this AUP available in an online format. You also may request the latest version by contacting Trinsic.
You may not use the Trinsic System to engage in, foster, or promote illegal, abusive, or irresponsible behavior, including:
3.1 You are solely and fully responsible for the content of any material posted, hosted, downloaded, uploaded, created, accessed or transmitted using the Trinsic System. Trinsic has no responsibility for any material created on or accessible using the Trinsic System.
3.2 You may not publish, transmit or store via the Trinsic System any content or links to any content that Trinsic reasonably believes:
4. Network Security
You may not:
5. Excessive Use of System Resources; Threats on Shared Resources
You may not use any shared system provided by Trinsic in a way that unnecessarily interferes with the normal operation of the shared system or with the use of the system by other Trinsic customers or resellers. You agree that Trinsic may quarantine or delete any data stored on a shared system if Trinsic reasonably believes that if the data is infected with a virus or is otherwise corrupted and has the potential to infect or corrupt the system or other customers' data that is stored on the same system.
6. Email Requirements; SPAM
6.1 Messages sent using the Systems must comply with the CAN-SPAM Act of 2003 and other laws and regulations applicable to bulk or commercial email, including without limitation the following requirements:
6.2 Trinsic may block the transmission of email that violates any of these provisions.
7. Vulnerability Testing
You may not attempt to probe, scan, penetrate or test the vulnerability of the Trinsic System, or to breach the Trinsic security or authentication measures, whether by passive or intrusive techniques, without Trinsic's express written consent.
8. Copyrighted Material
8.1 You may not use the Trinsic System to download, publish, distribute, or otherwise copy or use in any manner any text, music, software, art, image or other work protected by copyright law unless (a) you have been expressly authorized by the owner of the copyright for the work to copy the work in that manner; or (b) you are otherwise permitted by established copyright law to copy the work in that manner.
8.2 It is Trinsic's policy, in appropriate circumstances, to terminate the Service of customers who are repeat infringers.
9. Newsgroup, Chat Forums, Other Networks
You must comply with the rules and conventions for postings to any bulletin board, chat group or other forum in which you participate using the System, such as IRC and USENET groups including their rules for content and commercial postings. These groups usually prohibit the posting of off-topic commercial messages, or mass postings to multiple forums. You must comply with the rules of any other network you access or participate in using the Trinsic System.
10. Compliance with Laws; Export.
You must ensure that neither the Trinsic System, nor any software component Trinsic may provide you yo access the Trinsic System (“Client Software”), is used in or for any illegal, fraudulent, unauthorized or improper manner or purpose. You must comply, and insure that the Service and Client Software are used only in compliance, with applicable U.S., foreign, and international laws and regulations, including without limitation (i) Internet, data, telecommunications, telemarketing and “spam” laws and regulations, (ii) the U.S. Foreign Corrupt Practices Act, U.K. Bribery Act, other anti-corruption laws, U.S. Export Administration and Treasury Department's Office of Foreign Assets Control regulations, and (iii) other anti-boycott and import regulations. You agree: (i) that the export, re-export, transfer, re-transfer, sale, supply, access to, or use of a Service or Client Software to or in a third country or to, by, or for a different end user or end usemay require a U.S. or other government license or other authorization; and (ii) not to, directly or indirectly, export, re-export, transfer, re-transfer, sell, supply, or allow access to or use of a Service or Client Software to, in, by, or for sanctioned, embargoed, or prohibited countries, persons, or end uses under U.S. or other applicable law (collectively, “Prohibited Uses“). You are responsible for screening for Prohibited Uses and obtaining any required licenses or other authorizations. You indemnify Trinsic for any violation by you, your customers, your customers’ users of any applicable export controls and/or economic sanctions laws and regulations.
11, Other Requirements
11.1 You may only use a Service in a manner that is consistent with the purpose of intent of the Service. If you are unsure of the acceptable use or purpose of a Service, you should contact Trinsic and obtain clarification and approval for its specific use.
11.2 You may only use IP addresses assigned to you by Trinsic in connection with your Trinsic Service, as applicable.
11.3 You agree that if Trinsic IP numbers assigned to your account are listed on an abuse database like Spamhaus, you will take prompt action to remedy the issue. If you do not do so within 10 days of written notice from Trinsic, Trinsic may take reasonable action to protect its IP addresses, including suspension and/or termination of your Service, if the IP addresses were listed as a result of your actions.
11.4 You may not register to use any Service under a false name, or use an invalid or unauthorized credit card in connection with any Service.
11.5 You may not furnish false or incorrect data on Trinsic required documentation or attempt to circumvent or alter the processes or systems that measure time, calls, or other methods for calculating your use of a Service.
11.6 You are responsible for taking prompt corrective action(s) to remedy a violation of this AUP and to help prevent similar future violations.
Violations of this Policy may result in a request for immediate removal of offending material, immediate temporary or permanent filtering, blocked access, suspension or termination of service, or other action appropriate to the violation, as determined by Trinsic in its sole discretion. Whenever practical, it is Trinsic’s preference to provide advance notice so that violations may be addressed voluntarily; however, Trinsic reserves the right to act without notice when necessary, as determined by Trinsic in its sole discretion. Trinsic may involve and will cooperate with law enforcement if criminal activity is suspected. Refunds or credits are not issued in connection with actions taken for violations of this Policy.
13. Incident Reporting
All complaints regarding violations of this Policy should be directed to email@example.com. Where possible,
include details that would assist Trinsic in investigating and
resolving the complaint (i.e. expanded headers and a copy of the
© 2015 Trinsic Technologies, Inc.