This Acceptable Use Policy supersedes all previous representations, understandings or agreements and shall prevail notwithstanding any variance with terms and conditions of any order submitted. Relyant Communications and its affiliates have formulated this Acceptable Use Policy in order to encourage the responsible use of Relyant Communications services by our customers and other users (“Users”), and to enable us to provide our Users with secure, reliable and productive services.
The Relyant Communications Network, including the websites operated by Relyant Communications (collectively, the “Relyant Communications Network”), may be used only for lawful purposes. Users may not use the Relyant Communications Network in order to transmit, distribute or store material (a) in violation of any applicable law, (b) in a manner that will infringe the copyright, trademark, trade secret or other intellectual property rights of others or the privacy, publicity or other personal rights of others, (c) that is obscene, threatening, abusive or hateful or contains a virus, worm, Trojan horse, or other harmful component.
Notice of Copyright Infringement
Any copyright owner or its lawful representative who believes that someone using the Relyant Communications Network has illegally downloaded, copied, or posted copyrighted material should send a written notice to:
James W. W. Caddell
P.O. Box 70
Washington, GA 30673
Users may not send unsolicited e-mail messages, including, without limitation, bulk commercial advertising or informational announcements (“spam”) in a way that could be reasonably expected to adversely impact the Relyant Communications Network, including, without limitation, using an e-mail account on Relyant Communications’ network to send spam, or using the service of another provider to send spam or to promote a site hosted on or connected to the Relyant Communications Network. Email messages are limited to 100, One Hundred messages sent within a thirty (30) minute interval. In addition, Users may not use the Relyant Communications Network in order to (a) send e-mail messages which are excessive and/ or intended to harass or annoy others, (b) continue to send e-mail messages to a recipient that has indicated that he/ she does not wish to receive them, (c) send e-mail with forged TCP/ IP packet header information, (d) send malicious e-mail, including, without limitation, “mail bombing”, (e) send or receive e-mail messages in a manner that violates the use policies of any other internet service provider, or (f) use an e-mail box exclusively as a storage space for data.
Users who post messages to Usenet newsgroups are responsible for becoming familiar with any written charter or FAQ governing use of such newsgroups and complying therewith. Regardless of such policies, Users may not (a) post the same message, or a series of similar messages, to one or more newsgroups (excessive cross-posting or multiple-posting, also known as “Usenet spam”), (b) cancel or supersede posts not originally posted by such User, unless such User does so in the course of his/ her duties as an official newsgroup moderator, (c) post any message with forged packet header information, or (d) post messages that are excessive and/ or intended to annoy or harass others, including, without limitation, chain letters.
System and Network Security
Users are prohibited from violating or attempting to violate the security of the Relyant Communications, including, without limitation, (a) accessing data not intended for such User or logging into a server or account which such User is not authorized to access, (b) attempting to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without proper authorization, (c) gain unauthorized access to, or otherwise violate the security of Relyant Communications Network (or another party’s) server, network, network access, personal computer or control devices, (d) attempting to interfere with, disrupt or disable service to any user, host or network, including, without limitation, via means of overloading, “flooding”, “mail bombing” or “crashing”, (e) forging any TCP/ IP packet header or any part of the header information in any e-mail or newsgroup posting, or (f) taking any action in order to obtain services to which such User is not entitled. Violations of system or network security may result in civil or criminal liability. Relyant Communications will investigate occurrences, which may involve such violations and may involve, and cooperate with, law enforcement authorities in prosecuting Users who are involved in such violations.
Suspension or Termination
Any User which Relyant Communications determines, in its sole discretion, to have violated any element of this Acceptable Use Policy shall receive a written warning, and may be subject at Relyant Communications’ discretion to a temporary suspension of service pending such User’s agreement in writing to refrain from any further violations; provided, however, that if Relyant Communications deems it necessary, in its sole discretion, it may immediately suspend or terminate such User’s service without issuing such a warning. Users which Relyant Communications determines to have committed a second violation of any element of this Acceptable Use Policy shall be subject to immediate suspension or termination of service without further notice and Relyant Communications may take such further action as Relyant Communications solely determines to be appropriate under the circumstances to eliminate or preclude such violation, and Relyant Communications shall not be liable for any damages of any nature suffered by any Customer, User, or any third party resulting in whole or in part from Relyant Communications’ exercise of its rights under these policies.
Relyant Communications does not monitor the Relyant Communications Network at all times, but reserves the right to do so. Relyant Communications takes no responsibility for any material input by others and not posted to the Relyant Communications Network by Relyant Communications . Relyant Communications is not responsible for the content of any other websites linked to the Relyant Communications Network; links are provided as Internet navigation tools only.
We are committed to protecting your privacy. We only collect information required to bill your account, information required to provide you service, and information required to monitor the performance of our systems. From time to time, we may use your information to inform you of new products, service changes and other information related to service offered by us. We do not disclose any of your personally identifiable information such as but not limited to email name, email messages, billing address or usage information to any third parties except as required to provide you service or by legal or law enforcement directives.
Changes to Acceptable Use Policy
Relyant Communications reserves the right to modify this Acceptable Use Policy at any time in its sole and absolute discretion. Changes and modifications will be effective when posted on Relyant Communications’ website and any use of the Relyant Communications after the posting of any changes will be considered acceptance of those changes.
Information and/or questions related to the Relyant Communications Acceptable Use Policy should be addressed to: Management Relyant Communications PO Box 70 Washington, GA 30673