This document sets forth the principles, guidelines and requirements of the Terms of Service of Ribbon Rail Productions (“Company”) governing the use by the customer (“Customer”) of Company’s services and products (“Services and Products”). These Terms of Service have been created to promote the integrity, security, reliability and privacy of Company’s facilities, network, and Customer data contained within. The Company believes it provides the best services in the industry, and provides the following policies in the best interests of the Company and the Company’s clients. The Company retains the right to modify these Terms of Service at any time and any such modification shall be automatically effective as to all customers when adopted by Company. Company shall be the sole and final arbiter as the the interpretation of the following. By utilizing the Company’s services and products, the Customer agrees to be bound by the terms herein outlined.
Questions or comments regarding this document should be forwarded to the Company at the following addresses:
Ribbon Rail Productions
407 E Chippewa St
Dwight, IL 60420
Voice: (815) 584-1577
Facsimile: (800) 783-0127
2. Compliance With Law
Customer shall not post, transmit, re-transmit or store material on or through any of Services or Products which, in the sole judgment of the Company (i) is in violation of any local, state, federal or non-United States law or regulation, (ii) is threatening, obscene, indecent, defamatory or that otherwise could adversely affect any individual, group or entity (collectively, “Persons”) or (iii) violates the rights of any person, including rights protected by copyright, trade secret, patent or other intellectual property or similar laws or regulations including, but not limited to, the installation or distribution of “pirated” or other software products that are not appropriately licensed for use by Customer. The Customer agrees to indemnify and hold harmless the Company from any claims resulting from the use of the services which damages the Customer or any other party. Customer shall be responsible for determining what laws or regulations are applicable to its use of the Services and Products.
3. Prohibited Uses of Services and Products
In addition to the other requirements of these Terms of Service, Customer may only use the Services and Products in a manner that, in the Company’s sole judgment, is consistent with the purposes of such Services and Products. If Customer is unsure of whether any contemplated use or action is permitted, please contact the Company as provided above. By way of example, and not limitation, uses described below of the Services and Products are expressly prohibited.
Unauthorized resale of Services and Products.
Pornography and pornographic related merchandising are prohibited under all the Company’s services. This includes sites that include links to pornographic content elsewhere. Further examples of unacceptable content or links include pirated software, “hacker” programs, archives of “Warez Sites”, game rooms or MUDs, Chat Rooms, IRC Bots, Egg Drop programs, programs designed to send unsolicited advertisements (i.e. “spamware”), any kind of illegal software or shareware.
Violations of the rights of any Person protected by copyright, trade secret, patent or other intellectual property or similar laws or regulations, including, but not limited to, the installation or distribution of “pirated” or other software products that are not appropriately licensed for use by Customer.
Actions that restrict or inhibit any Person, whether a customer of Company or otherwise, in its use or enjoyment of any of the Company’s Services or Products.
3.2 System and Network
Introduction of malicious programs into the Company’s network or server (e.g., viruses and worms).
Effecting security breaches or disruptions of Internet communication. Security breaches include, but are not limited to, accessing data of which Customer is not an intended recipient or logging into a server or account that Customer is not expressly authorized to access. For purposes of this Section 3.2.2., “disruption” includes, but is not limited to, port scans, flood pings, packet spoofing and forged routing information.
Executing any form of network monitoring which will intercept data not intended for the Customer’s server.
Circumventing user authentication or security of any host, network or account.
Interfering with or denying service to any user other than Customer’s host (for example, denial of service attack).
Using any program/script/command, or sending messages of any kind, designed to interfere with, or to disable, a user’s terminal session, via any means, locally or via the Internet.
Creating an “active” full time connection on a Company-provided account by using artificial means involving software, programming or any other method.
Any attempt to circumvent or alter monitoring, bandwidth tracking or utilization reporting, or other actions which have the effect of complicating the normal operational procedures of the Company, including but not limited to altering, removing or in any way modifying or tampering with Company created log files.
Any action which the Company determines, in its own judgment, will reflect poorly on the Company or negatively impact its operations.
Any action which the Company deems to be an unacceptable use of resources, business practice or otherwise unacceptable to the Company.
Furnishing false or incorrect data on the order form, contract or online application, including fraudulent use of credit card numbers.
Attempting to circumvent or alter the processes any billing procedures or procedures to measure time, bandwidth utilization, or other methods to document “use” of the Company’s Services and Products.
Sending unsolicited commercial email messages (UCE), including the sending of “junk mail” or other advertising material to individuals who did not specifically request such material, who were not previous customers of Customer or with whom Customer does not have an existing business relationship (“email spam”).
Sending UCE referencing an email address for any domain hosted by the Company;
Sending UCE referencing a domain hosted by the Company;
Sending UCE referencing an IP address hosted by the Company;
Posting advertisements on IRC, ICQ, or any other public chat system;
Harassment, whether through language, frequency or size of messages.
Unauthorized use, or forging, of mail header information.
Solicitations of mail for any other E-mail address other than that of the poster’s account or service with the intent to harass or to collect replies.
Creating or forwarding “chain letters” or other “pyramid schemes” of any type.
Use of unsolicited email originating from within the Company’s network or networks of other Internet Service Providers on behalf of, or to advertise, any service hosted by the Company, or connected via the Company’s network.
Harassment, whether through language, frequency or size of messages.
Activities deemed to be unsolicited marketing efforts or otherwise harassing in any way.