The services offered by ITC is subject to Acceptable use policy / fair use. The customer will receive warnings and in worst case cancellation services if warnings are ignored. The service may also be temporarily shut down, rebooted, throttled or blocked depending on severity.
Fair use means that a service should not request more than 50% of its allocated ITC resources over a period of many hours.
In order to ensure that all ITC customers receive the resources they need for their own services, using ITC resources in shared collaboration pools in collaboration with third parties or non-ITC customers is not permitted without approval.
System abuse
Including, but not limited to:
Unauthorized access, use, probe, or scan of our system’s security, authentication measures, data or traffic. Interference with the service to any user, host or network including, but not limited to: e-mail bombing, flooding, deliberate attempts to overload the system and broadcast attacks, forging of any TCP/IP packet header or any part of the header information in an e-mail or newsgroup posting.
Sever abuse
Including, but not limited to:
Any attempts to undermine or cause harm to any Company server or customer of ours is strictly prohibited. Use of our services to access, or to attempt to access, the accounts of others, or to penetrate, or attempt to penetrate, security measures of ours or another entity’s computer software or hardware, electronic communications systems, or telecommunications systems is also prohibited.
Excessive use of bandwith
Including, but not limited to:
Any excessive bandwith usage over time is prohibited. This applies both upstream and downstream.
Excessive use of system resources:
Including, but not limited to:
Any excessive system usage of system resources over time is prohibited, like:
- Blockchain mining
- Science and other educational projects
- Seti@home and similar projects
- Data harvesting
We do not allow programs to run continually in the background with high CPU utilization. This is to minimize system resources used and operational maintenance needed. We also do not allow excessive use of benchmarking software on our servers due to their impact on the overall resources of the servers.
SPAM
Including, but not limited to:
SPAMMING IS PROHIBITED. Users MAY NOT utilize our IaaS services to transmit, distribute, or deliver any unsolicited messages over the Internet (an action known as “spam” or “spamming”).
‘E-mail spoofing’ is a fraudulent e-mail activity in which the sender’s (3td party) e-mail address and other parts of the e-mail header are changed so as to appear that the e-mail has been sent from a different source (e-mail address owner/server).
‘Unsolicited message’ is a message that is sent against the privacy policy of a newsgroup, or is sent to a recipient without their explicit permission. We, at our sole discretion, shall determine whether any of the messages you are sending is spam or spamvertizing. For your information, spamming generally includes, but is not limited to the following
Sending of unsolicited messages in bulk, or sending of unsolicited e-mails, which provoke complaints from recipients;
Use of distribution lists that include people who have not given prior explicit permission
Malware
Including, but not limited to:
Storage, distribution, fabrication, or use of malware including virus software, rootkits, password crackers, adware, keystroke capture programs, and other programs normally used in malicious activity.
Programs used in the normal ordinary course of business are deemed acceptable.
Introduction of malicious programs into our network or servers or other products and services (e.g., viruses, Trojan horses, and worms).
Executing any form of network monitoring that will intercept data not intended for the customer.
Denial of service
Including, but not limited to:
Origination or control of denial of service attacks or distributed denial of service attacks.
Any actions that generate excessive network traffic through the use of automated or manual routines that are not related to ordinary personal or business use of Internet services.
List of violations
Including, but not limited to:
- Cryptocurrency mining
- Promoting violence or injury
- Using defamatory, threatening or abusive language
- Hosting gambling, or similar activities such as HYIP (High Yield Investment Programs), Ponzi schemes or pyramid schemes
- Violation of intellectual property rights of others
- Forging, misrepresenting, omitting or deleting message headers, return mailing information, or internet protocol addresses to conceal or misidentify the origin of a message
- Creating or sending Internet viruses, worms or Trojan horses, flood or mail bombs, or engaging in denial of service attacks
- Hacking, and/or subverting, or assisting others in subverting, the security or integrity of ITC’s services or systems
- Acting in any manner that might subject us to unfavorable regulatory action, any liability for any reason, or adversely affect our public image, reputation or goodwill, as determined by us in our sole and exclusive discretion
- Soliciting the performance of any illegal activity, even if the activity itself is not performed
- Directly facilitating violation of a law or regulation and/or instructing others in prohibited activities.
- Sending or promotion of: death threats, terroristic threats, threats of harm to another individual, multi-level marketing schemes, “Ponzi schemes”, invasion of privacy, credit card fraud, racketeering, defamation, slander, and other common illegal activities.
- Creating or forwarding “chain letters” or other “pyramid schemes” of any type.
- Hosting, sending, or promotion of: Child pornography, bestiality, or necrophilia.
- Sending or promotion fraudulent activities
- Hosting, send or promotion of sites advocating human violence and hate crimes based upon religion, ethnicity, or country of origin
- Any activity associated with Phishing or systems designed to collect personal information (name, account numbers, usernames, passwords, etc.) under false pretense.
- Harassment, whether through language, frequency, or size of messages.
- Material likely to encourage an interest in the sexually abusive activity (eg pedophilia, incest, rape) which may include adults role-playing as non-adults.
- The portrayal of any sexual activity which involves a lack of consent (whether real or simulated). Any form of physical restraint which prevents participants from indicating a withdrawal of consent.