Introduction and Purpose
- This document sets forth the principles, guidelines and requirements of the Acceptable Use Policy of Imagine That Graphics governing the use by the Customer (“Customer”) of Imagine That Graphics’s services and products (“Services and Products”). The Purpose of Imagine That Graphics’s Acceptable Use Policy, hereinafter referred to as the AUP, is to comply with all Federal, State, Provincial, and local laws coupled with protecting the server security, server availability, physical security, Customer privacy, and other factors affecting the services provided by Imagine That Graphics.
- Imagine That Graphics reserves the right to impose reasonable rules and regulations regarding the use of its services provided to all Customers and such rules and regulations are subject to change. The AUP is not an all-inclusive list and Imagine That Graphics reserves the right to modify the AUP at any time as needed. Acceptance and execution of the Master Services Agreement binds all parties to Imagine That Graphics’s stated AUP at the time the contract is executed and as modified from time to time. Any violation of the AUP may result in the suspension or termination of Customer account(s) or such other action as Imagine That Graphics deems appropriate. No credits will be issued for any interruption in service resulting from policy violations.
- VIOLATION OF ANY SECTION OF THE AUP IS STRICTLY PROHIBITED AND MAY RESULT IN THE IMMEDIATE TERMINATION OR SUSPENSION OF THE SERVICES CUSTOMER RECEIVES FROM Imagine That Graphics.
- Any questions or comments regarding the AUP should be directed to: email@example.com
1. Compliance with Law
- Customer shall not post, transmit, re-transmit or store material on or through any of Services or Products which, in the sole judgment of Imagine That Graphics is (i) in violation of any local, provincial, state or federal law or regulation, (ii) threatening, obscene, indecent, defamatory or that otherwise could adversely affect any individual, group or entity (collectively, “Persons”) or (iii) violates the rights of any person, including rights protected by copyright, trade secret, patent or other intellectual property or similar laws or regulations including, but not limited to, the installation or distribution of “pirated” or other software products that are not appropriately licensed for use by Customer. Customer shall be responsible for determining what laws or regulations are applicable to its use of the Services and Products.
2. System and Network Security
- Violations of system or network security are strictly prohibited, and may result in criminal and civil liability. Imagine That Graphics investigates all incidents involving such violations and will cooperate with law enforcement if a criminal violation is suspected.
Examples of system or network security violations include, without limitation, the following:
- Introduction of malicious programs into the network or server (example: viruses, worms, Trojan Horses, key loggers, and other executables intended to inflict harm).
- Effecting security breaches or disruptions of Internet communication and/or connectivity. Security breaches include, but are not limited to, accessing data of which the Customer is not an intended recipient or logging into a server or account that the Customer is not expressly authorized to access. For purposes of this section, “disruption” includes, but is not limited to port scans, flood pings, email-bombing, packet spoofing, IP spoofing and forged routing information.
- Executing any form of network activity that will intercept data not intended for the Customer’s hosting space.
- Circumventing user authentication or security of any host, network or account, including cracking.
- Interfering with or denying service to any user, host, or network other than the Customer’s host (example: denial of service attack or distributed denial of service attack).
- Conduct designed to avoid restrictions or access limits to specific services, hosts, or networks, including but not limited to the forging of packet headers (spoofing) or other identification information.
- Using any program script/command, or sending messages of any kind, designed to interfere with or to disable, a user’s terminal session, via any means, locally or via the Internet.
- Failing to comply with Imagine That Graphics’s procedure relating to the activities of Customers on the Imagine That Graphics premises. Violators of the policy are responsible, without limitations, for the cost of labor to correct all damage done to the operation of the network and business operations supported by the network. Such labor is categorized as emergency security breach recovery and is currently charged at $90.00 CAD per hour required. Network interference by any Customers that may cause or is currently causing network interference with another Customer will be disconnected immediately. No service credits will be issued to Customers disconnected for network violations.
3. Internet Etiquette
- Each Customer is expected to execute reasonable Internet Etiquette (Netiquette), the accepted behavior and expectations of the Internet community. The Customer will comply with the rules appropriate to any network to which Imagine That Graphics may provide access. The Customer should not post, transmit, or permit Internet access to information the Customer desires to keep confidential. The Customer is not permitted to post any material that is illegal, libelous, indecently depicts children or is likely to result in retaliation against Imagine That Graphics by offended users. Imagine That Graphics reserves the right to refuse or terminate service at any time for violation of this section. This includes advertising services or sites via IRC or USENET in clear violation of the policies of the IRC channel or USENET group.
4. Child Pornography
- Imagine That Graphics will cooperate fully with any criminal investigation into a Customer’s violation of the Child Protection Act of 1984 concerning child pornography. Customers are ultimately responsible for their actions over the Imagine That Graphics network, and will be liable for illegal material posted by their clients.
- According to the Child Protection Act, child pornography includes photographs, films, video or any other type of visual presentation that shows a person who is or is depicted as being under the age of eighteen years and is engaged in or is depicted as engaged in explicit sexual activity, or the dominant characteristic of which is the depiction, for a sexual purpose, of a sexual organ or the anal region of a person under the age of eighteen years or any written material or visual representation that advocates or counsels sexual activity with a person under the age of eighteen years.
5. Copyright Infringement
- Imagine That Graphics space may only be used for lawful purposes. Transmission, distribution, or storage of any information, data or material in violation of laws, or by the common law, is prohibited. This includes, but is not limited to, material protected by copyright, trademark, trade secret, or other intellectual property rights; including creating, utilizing, distributing unauthorized copies of software, or the use of BitTorrent or other types of technologies utilized in the distribution of illegally copied materials. If Customer copies, distributes or installs software in defiance of the license agreement, Customer is violating federal copyright law. Imagine That Graphics will cooperate with all law enforcement agencies in relation to alleged copyright infringement housed on our servers.
6. Hosting Policy
- Data Unlawful or Against the AUP: Promoting violation of the law or the AUP by hosting data that facilitates the violation is prohibited, including but not limited to:
- All website hosting is provided on an annual contract, due 15 days prior to the renewal date as indicated on the invoice.
- Hosting web pages that detail the methodology of committing unlawful acts, or acts violating this AUP.
- Hosting software, scripts, or other resources intended to facilitate committing unlawful acts, or acts violating this AUP.
- Advertising, transmitting, storing, or using any software, script, program, product, or service designed to violate this AUP.
- Harvesting. The collection of email addresses, credit card information, or other personal information for fraudulent use or sale is prohibited.
- Phishing. Hosting web pages with forwards to, containing scripts or executables for, or any other component of an operation designed to fraudulently collect authentication, credit card, names, addresses, or any other personal data is not permitted.
- Spamvertised Sites. Hosting web pages advertised by spam sent from another network (spamvertised) is not permitted.
- Users are responsible for any scripts that are uploaded into your hosting space and the security of such scripts. Any disruption to the function of the web servers or breaches of security due to insecure scripts will be cause for immediate suspension or termination of your account.
- Domain names must be live on our servers. Your hosting space cannot be used for storage, downloads and/or bandwidth usage via IP address from outside the live site.
7. Website Software
- Software Hacks and Exploits: Exposed security vulnerabilities and website hacks are caused by malicious end users. Fixing a website that has been hacked and/or upgrading software to prevent known security vulnerabilities is your responsibility. If a site has been hacked or found to contain malicious code it will be immediately suspended until such vulnerability has been dealt with. Websites that have been hacked CANNOT be rolled back to a backup UNTIL the vulnerability has been identified and preventive measures put in place.
- Online Stores: You will be solely responsible for the operation and maintenance of your online store and products and all contents and materials appearing online or on your products, including without limitation (a) update of the store software including all third party security updates and installations, (b) the accuracy and appropriateness of content and materials appearing within the store or related to your products, (c) ensuring that the content and materials appearing within the store or related to your products do not violate or infringe upon the rights of any third party, and (d) ensuring that the content and materials appearing within the store or related to your products are not libelous or otherwise illegal. You will be solely responsible for the final calculation and application of shipping and sales tax. You will also be solely responsible for accepting, processing, and filling any client orders, and for handling any client inquiries or complaints arising there from.
You are also responsible for the security of any client credit card numbers and related client information you may access as a result of conducting electronic commerce transactions through your Web Site. You will keep all such information confidential and will use the same degree of care and security as you use with your confidential information.
- MHS Installed Software: When Imagine That Graphics is commissioned to provide design and/or implement third party software for your site it is Customer’s responsibility to keep the site up to date. Exposed security vulnerabilities and website hacks are caused by malicious end users. Fixing a website that has been hacked and/or upgrading software to prevent known security vulnerabilities can be time consuming and therefore is billable time for which Customer is responsible. Imagine That Graphics will warrantee installed software stability for a period of 90 days from installation.
8. Email Policy
- Email Spam. Imagine That Graphics has a zero tolerance policy on SPAM, Junk E-mail or UCE. Spam, Junk-mail and UCE are defined as: the sending of the same, or substantially similar, unsolicited electronic mail messages, whether commercial or not, to more than one recipient. A message is considered unsolicited if it is posted in violation of a newsgroup charter or if it is sent to a recipient who has not requested or invited the message. UCE also includes e-mail with forged headers, compromised mail server relays, and false contact information. This prohibition extends to the sending of unsolicited mass mailings from another service, which in any way implicates the use of Imagine That Graphics whether or not the message actually originated from our network.
- Block Removal. If Customer actions have caused Imagine That Graphics mail servers or Imagine That Graphics IP address ranges to be placed on black hole lists and other mail filtering software systems used by companies on the internet, Customer will be assessed a $90 charge to Customer account and $90 per hour for administrative charges incurred to remove and protect mail servers and IP ranges.
- Drop-Box Accounts. Using our servers for the receipt of replies to unsolicited mass email (spam) sent from a third-party network is prohibited.
- Header Forgery: Forgery of email headers (spoofing) is prohibited.
- Proxy Spamming: Spamming via third-party proxy, aggregation of proxy lists, or installation of proxy mailing software is prohibited.
- Relaying. Configuration of a mail server to accept and process third-party messages for sending without user identification and authentication is prohibited.
- No ISP, Wireless or similar companies are to use the Imagine That Graphics mail servers for customer mail servers.
9. Mass Mailings
- Sending mass unsolicited email is considered spam. Unsolicited email is defined as email sent to a recipient who has not double-opted in to mailings from the Customer. Senders of mass mailings must maintain complete and accurate records of all opt-ins, including the email and its headers if applicable, and provide such records to Imagine That Graphics upon request. If positive and verifiable proof of opt-in cannot be provided, complaints from recipients of the mailing are considered proof they did not subscribe and the mailing is unsolicited.
10. Mailing Lists
- Imagine That Graphics’s mass mailing rules also apply to mailing lists, list servs, or mailing services contracted for by Customer. The policy is stated as follows: An acceptable mailing list will be focused at a targeted audience that has voluntarily signed up for e-mail information using a double opt-in process or that has made their e-mail address available to Customer for distribution of information. The list must also allow for automatic removal by all end Customers with non-distribution in the future.
11. Fraud Policy
- By agreeing to this AUP, Customer affirms that the contact and payment information provided to Imagine That Graphics identifies Customer and that Customer is authorized to use the payment method. Commitment of fraud, obtaining services, or attempting to obtain services by any means or device with intent to avoid payment is prohibited.
12. IRC Policy
- Imagine That Graphics does not allow IRC plug-ins, scripts, add-ons, clones or other software that has the intent or effect of disrupting or denying service to other users. Harassing, disrupting or denying service to other users is expressly prohibited, and will result in the cancellation of Customer account(s).
13. Suspension and Termination
- Imagine That Graphics will use reasonable care in notifying the Customer and in resolving the problem in a method resulting in the least amount of service interference as reasonably possible. Imagine That Graphics reserves the sole right to suspend service to any Customer for violation of the AUP without notice. Imagine That Graphics reserves the right to terminate service without notice for any account that impacts the availability of our servers to others in a shared hosting environment.
- Suspension for non payment: Any account, service or product Past Due its renewal date may be suspended and/or terminated for non payment. When an account is suspended all web hosting, promotion, design, updates, and email services are put into suspension until payment is brought current. Upon suspension, notices may be emailed every 5 days for 60 days prior to termination.
- Termination for non payment: Any account Past Due may be terminated for non payment of services. In the case of an account being terminated all files and email will be removed from the server and may not be retrievable from backup.
Imagine That Graphics sends out 60, 30, and 1 day payment due notices to ensure Customer is notified of any payments due.
15. Domain Registration Policies
- Domains will be registered for clients at a minimum registration period of one year. Unless otherwise notified, renewal of domain names is done automatically for Imagine That Graphics clients within 30 days of the domain expiration date. Cancellation of a domain name registration MUST be received a minimum of thirty days prior to renewal. The registrant will be responsible for payment of an additional year registration fee if the domain has already been renewed.
- ITG will maintain the domain name registration for as long as the account is paid in full. ITG will perform changes to the domain name record at the clients request. Upon either 1) cancellation or 2) non payment by the registrant, ownership of the domain is transferred to ITG.
- Redemption: If a domain goes into redemption after not being renewed there may be a $200 fee by the domain registrar (Enom, GoDaddy, Network Solutions, Register.com, Dodster) to remove the domain from redemption. This is a fee that passes straight through ITG to the registrar.
- All cancellations MUST be submitted by email to firstname.lastname@example.org at least 30 days prior to your next billing cycle.
17. Violations of the AUP will result in the following:
- Immediate disconnection of service with no re-activation.
- Upon termination of an account, your right to use the account and the Service immediately ceases. Imagine That Graphics shall have no obligation to maintain any Data stored in your account or to forward any Data to you or any third party.
18. Code of Conduct
- Our Terms of Service supports our guaranteed Code of Conduct on behalf of our entire staff.
- We promise to provide customer service with a smile, no matter what!
- In return, we request that all customers adhere to the same Code of Conduct. Technology can be very frustrating to many of us, but be assured, the person you speak with is here to help you, so please try your absolute best to adhere to our Code of Conduct. No swearing and no being mean, period. We truly care what your problem is, but being mean will not get your issue solved.
- If anyone breaks our Code of Conduct clause in our Terms of Service, all hosting accounts, agreements, products or services may be terminated effective immediately.
19. Notifications Policy
- Imagine That Graphics periodically notifies its clients of certain security warnings and updates.
- If a notification requests client action it is the clients responsibility to heed these warnings and act accordingly to prevent any impact on their account.
- If a security notification is ignored and results in support time to correct an issue there may be billable time associated with this support request.
- In some instances a notification will NOT be sent if the impact affects less than 1% of the client base. These security updates are typically patches to server software and require no client action
* These terms and conditions may change without prior notice