All users of KerNet services (the “Services”) agree to and must comply with this Acceptable Use Policy (AUP).
KerNet does not exercise editorial control or review over the content of any Website, electronic mail transmission, newsgroup, or other material created or accessible over or through the Services. However, KerNet may remove, block, filter, or restrict by any other means any materials that, in KerNet’s sole discretion, may be illegal, may subject KerNet to liability, or which may violate this AUP.
KerNet may cooperate with legal authorities and/or third parties in the investigation of any suspected or alleged crime or civil wrong.
Violation of this AUP may result in the suspension or termination of either access to the Services and/or KerNet account or other actions as detailed below. This AUP should be read in conjunction with out terms and conditions document.
The following constitute violations of this AUP (this list is intended to be illustrative and not exhaustive; other uses may violate the AUP and KerNet remains the sole and final arbiter of acceptable usage of its Services):
1. Illegal use: Using the Services to transmit any material (by email, uploading, posting, or otherwise) that, intentionally or unintentionally, violates any applicable local, state, national or international law, or any rules or regulations promulgated there under.
2. Harm to minors: Using the Services to harm, or attempt to harm, minors in any way.
3. Threats: Using the Services to transmit any material (by email, uploading, posting, or otherwise) that threatens or encourages bodily harm or destruction of property.
4. Harassment: Using the Services to transmit any material (by email, uploading, posting, or otherwise) that harasses another.
5. Fraudulent activity: Using the Services to make fraudulent offers to sell or buy products, items, or services or to advance any type of financial scam such as “pyramid schemes,” “Ponzi schemes”, unregistered sales of securities, securities fraud and “chain letters.”
6. Forgery or impersonation: Adding, removing or modifying identifying network, message, or article header information in an effort to deceive or mislead is prohibited. Attempting to impersonate any person by using forged headers or other identifying information is prohibited. The use of anonymous remailers or nicknames does not constitute impersonation.
7. Unsolicited commercial email/Unsolicited bulk email: Using the Services to transmit any unsolicited commercial email or unsolicited bulk email. Activities that have the effect of facilitating unsolicited commercial email or unsolicited bulk email, whether or not that email is commercial in nature, are prohibited. Using deliberately misleading headers in emails sent to multiple parties is prohibited
8. Unauthorized access: Using the Services to access, or to attempt to access, the accounts of others, or to penetrate, or attempt to penetrate, security measures of KerNet’s or another entity’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.
9. Copyright or trademark infringement: Using the Services to transmit any material (by email, uploading, posting, or otherwise) that infringes any copyright, trademark, patent, trade secret, or other proprietary rights of any third party, including, but not limited to, the unauthorized copying of copyrighted material, the digitization and distribution of photographs from magazines, books, or other copyrighted sources, and the unauthorized transmittal of copyrighted software.
10. Collection of personal data: Using the Services to collect, or attempt to collect, personal information about third parties without their knowledge or consent.
11. Reselling the services: Reselling the Services without KerNet’s authorization.
12. Network disruptions and unfriendly activity: Using the Services for any activity which adversely affects the ability of other people or systems to use KerNet’s Services or the Internet. This includes excessive consumption of network or system resources whether intentional or unintentional. This also includes “denial of service” (DoS) attacks against another network host or individual user. Interference with or disruption of other network users, network services or network equipment is prohibited. It is the user’s responsibilityto ensure that their system is configured, operated, and used in a manner to avoid excessive consumption of network or system resources. It is the user’s responsibility to ensure that their system is configured in a secure manner. A user may not, through action or inaction, allow others to use their system for illegal or inappropriate actions. A user may not permit their system, through action or inaction, to be configured in such a way that gives a third party the capability to use their system in an illegal or inappropriate manner.
13. High Volume, Server hosting, and non-traditional end user activities: The Services are intended for an end user’s periodic active use of email, instant messaging, browsing the World Wide Web, and other typical end user activities. High volume data transfers, especially sustained high volume data transfers, are prohibited. Hosting a web server, IRC server, or any other server is prohibited. Accordingly, KerNet maintains the right to terminate any user’s connection following the detection of any high volume data transfer, server hosting, or non-traditional end user activity as determined by KerNet. KerNet requests that anyone who believes that there is a violation of this AUP direct the information to: info@KerNet.ie