11
FKCC 2012-2013
using distribution lists containing addresses that include those who have opted out;
sending electronic messages that do not accurately identify the sender, the sender’s return address, the e-mail
address of origin, or other information contained in the subject line or header;
falsifying packet header, sender, or user information whether in whole or in part to mask the identity of the sender,
originator or point of origin;
using redirect links in unsolicited commercial e-mail to advertise a website or service;
posting a message to more than ten (10) online forums or newsgroups, that could reasonably be expected to
generate complaints;
intercepting, redirecting or otherwise interfering or attempting to interfere with e-mail intended for third parties;
knowingly deleting any author attributions, legal notices or proprietary designations or labels in a file that the user
mails or sends;
using, distributing, advertising, transmitting, or otherwise making available any software program, product, or
service that is designed to violate this AUP or the AUP of any other Internet Service Provider, including, but not
limited to, the facilitation of the means to spam.
Security Violations
Constituents are responsible for ensuring and maintaining security of their systems and the machines that connect to and
use IP Service(s), including implementation of necessary patches and operating system updates.
IP Services may not be used to interfere with, gain unauthorized access to, or otherwise violate the security of FKCC’s (or
another party’s) server, network, network access, personal computer or control devices, software or data, or other system, or
to attempt to do any of the foregoing. Examples of system or network security violations include but are not limited to:
unauthorized monitoring, scanning or probing of network or system or any other action aimed at the unauthorized
interception of data or harvesting of e-mail addresses;
hacking, attacking, gaining access to, breaching, circumventing or testing the vulnerability of the user
authentication or security of any host, network, server, personal computer, network access and control devices,
software or data without express authorization of the owner of the system or network;
impersonating others or secretly or deceptively obtaining personal information of third parties (phishing, etc.);
using any program, file, script, command or transmission of any message or content of any kind, designed to
interfere with a terminal session, the access to or use of the Internet or any other means of communication;
distributing or using tools designed to compromise security (including but not limited to SNMP tools), including
cracking tools, password guessing programs, packet sniffers or network probing tools (except in the case of
authorized legitimate network security operations);
knowingly uploading or distributing files that contain viruses, spyware, Trojan horses, worms, time bombs, cancel
bots, corrupted files, root kits or any other similar software or programs that may damage the operation of another’s
computer, network system or other property, or be used to engage in modem or system hi-jacking;
engaging in the transmission of pirated software;
with respect to dial-up accounts, using any software or device designed to defeat system time-out limits or to allow
Constituent’s account to stay logged on while Constituent is not actively using the IP Services or using such account
for the purpose of operating a server of any type;
using manual or automated means to avoid any use limitations placed on the IP Services;
1...,2,3,4,5,6,7,8,9,10 12,13,14,15,16,17,18,19,20,21,...155