AccessAbility System Abuse Policy
System abuse is strictly prohibited. AccessAbility may terminate
service immediately and may bill for any resulting charges
if the client engages in system abuse.
Following is a list of actions which are defined to be system
abuse.
This list is non-exclusive; any action about which there is
any doubt should be referred to AccessAbility for evaluation.
Actions which constitute system abuse include, but are not
limited to:
-
attempting to circumvent user authentication or security of any
host, network, or account on AccessAbility systems or the Internet
at large ("cracking");
-
attempting, in any way, to interfere with or deny service to any
user or any host on the Internet;
-
forging email or USENET posting header information;
-
sending large numbers of unsolicited mail messages (i.e. "junk mail");
-
forwarding or posting "chain letters" (multiple forwarding) of any
type;
-
posting inappropriate messages to USENET newsgroups
e.g., posting large numbers of unsolicited posts indiscriminately
("spamming"), or posting encoded binary files to USENET newsgroups
not specifically named for that purpose;
-
attempting to cancel, supersede, or otherwise interfere with
email or USENET posts other than one's own;
-
engaging in harassment, whether through language, frequency,
or size of messages;
-
using an account at another provider to promote an AccessAbility
Web site in an abusive manner;
-
using an AccessAbility account to collect replies to messages
sent from another provider which violate these rules or those
of that provider.