11
FKCC 2013-2014
Violation of Intellectual Property Rights: IP Service(s) shall not be used to publish, submit/receive upload/download, post,
use, copy or otherwise reproduce, transmit, re-transmit, distribute or store any content/material or to engage in any activity
that infringes, misappropriates or otherwise violates the intellectual property rights or privacy or publicity rights of FKCC or
any individual, group or entity, including but not limited to any rights protected by any copyright, patent, trademark laws,
trade secret, trade dress, right of privacy, right of publicity, moral rights or other intellectual property right now known or
later recognized by statute, judicial decision or regulation.
Threatening Material or Content: IP Services shall not be used to host, post, transmit, or re-transmit any content or material
(or to create a domain name or operate from a domain name), that harasses, or threatens the health or safety of others. In
addition, for those IP Services that utilize FKCC provided web hosting, FKCC reserves the right to decline to provide such
services if the content is determined by FKCC to be obscene, indecent, hateful, malicious, racist, defamatory, fraudulent,
libelous, treasonous, excessively violent or promoting the use of violence or otherwise harmful to others.
Inappropriate Interaction with Minors: FKCC complies with all applicable laws pertaining to the protection of minors,
including when appropriate, reporting cases of child exploitation to the National Center for Missing and Exploited Children.
For more information about online safety, visit
.
Child Pornography: IP Services shall not be used to publish, submit/receive, upload/download, post, use, copy or otherwise
produce, transmit, distribute or store child pornography. Suspected violations of this prohibition may be reported to FKCC
at the following e-mail address
.
FKCC will report any discovered violation of this prohibition to the
National Center for Missing and Exploited Children and take steps to remove child pornography (or otherwise block access
to the content determined to contain child pornography) from its servers.
Spam/E-mail/Usenet Abuse: Violation of the CAN-SPAM Act of 2003, or any other applicable law regulating e-mail services,
constitutes a violation of this AUP.
Spam/E-mail or Usenet abuse is prohibited using IP Services. Examples of Spam/E-mail or Usenet abuse include but are not
limited to the following activities:
sending multiple unsolicited electronic mail messages or “mail-bombing” - to one or more recipient;
sending unsolicited commercial e-mail, or unsolicited electronic messages directed primarily at the advertising
or promotion of products or services;
sending unsolicited electronic messages with petitions for signatures or requests for charitable donations, or
sending any chain mail related materials;
sending bulk electronic messages without identifying, within the message, a reasonable means of opting out
from receiving additional messages from the sender;
sending electronic messages, files or other transmissions that exceed contracted for capacity or that create the
potential for disruption of the FKCC network or of the networks with which FKCC interconnects, by virtue of
quantity, size or otherwise;
using another site’s mail server to relay mail without the express permission of that site;
using another computer, without authorization, to send multiple e-mail messages or to retransmit e-mail
messages for the purpose of misleading recipients as to the origin or to conduct any of the activities prohibited
by this AUP;
using IP addresses that the Constituent does not have a right to use;
collecting the responses from unsolicited electronic messages;
maintaining a site that is advertised via unsolicited electronic messages, regardless of the origin of the
unsolicited electronic messages;
sending messages that are harassing or malicious, or otherwise could reasonably be predicted to interfere with
another party’s quiet enjoyment of the IP Services or the Internet (e.g., through language, frequency, size or
otherwise);
using distribution lists containing addresses that include those who have opted out;
1...,2,3,4,5,6,7,8,9,10 12,13,14,15,16,17,18,19,20,21,...159