|Acceptable Usage Policy
The following lists some key points to Carolinanet's policy for Internet access. It is meant to accompany the Member Agreement and Terms of Service contract presented to all Carolinanet customers. We believe strongly in the freedom of speech and in allowing all Carolinanet customers total access to everything the Internet has to offer with minimal or no interference. However, some guidelines need to be established to help identify inappropriate activity. Our goal is to provide quality service, conform to existing laws, protect our resources, and protect our reputation as a service provider.
System Attack: An attempt to gain access to a system to which access has not been granted access and/or attacking a system with the intent to damage or "crash" the system. This applies to systems local to Carolinanet as well as outside systems. Carolinanet monitors access to all its systems, as do many remote systems. Malicious attacks can result in loss of access privileges, and in some cases, legal action.
File Attack: An attempt to read, modify, or execute files without appropriate permission or ownership. This includes attempts to read other people's e-mail, access restricted files, remove or alter files belonging to other Carolinanet users, and spread computer viruses.
Harassment: Sending e-mail messages to other users after being requested by those users to stop, regardless of the content of the messages. All Carolinanet users have the right to determine what they feel to be harassing e-mail.
Spam: Unsolicited e-mail, including advertisements. See Spam Policy.
False Identity: Sending e-mail or posting to newsgroups under a name used for the purpose of deception.
Connection Abuse: Although Carolinanet provides unlimited access to the Internet, usage guidelines are necessary to ensure all users are getting a fair share of Carolinanet's resources. The following constitute abuse:
Utilizing a dial-up connection for excessive periods of time. We maintain an excellent customer-to-modem ratio and users who are dialed into the network for long periods of time are restricting other users from utilizing that connection. After a connection is active for 7 hours, the user on that connection will be notified via e-mail about our "fairness policy".
Unauthorized use of a connection to provide an Internet service through that connection. This includes, but is not limited to, the operation of a server or daemon through a connection. Without consent of Carolinanet management, users may not operate the following through their Carolinanet connection: IRC, WWW, e-mail servers, and Wingate server.
Other Violations: The following violations could lead to the suspension or termination of an Internet access account.
Sharing access to the account with anyone other than a family member living in the same household.
Logging on more than once at a time.
Using account for purposes outside scope of initial agreement (e.g. using a personal account for business purposes).
Using an account to facilitate any illegal activity.
Reselling or leasing an account to others.
If Carolinanet becomes aware that any of its customers have participated in the above, the Company reserves the right to terminate service without notice as described in Carolinanet 's Member Agreement and Terms of Service.
This Acceptable Use Policy (AUP) sets forth the principles that govern the use by customers of the Web-based products and services provided by Carolinanet. This AUP is designed to help protect our customers, and the Internet community, from irresponsible, abusive or illegal activities.
The Web interface is intended exclusively for the following purposes: manually registering domains (one at a time); administering previously registered domains; viewing transaction records; unpending domains to be processed.
These are some of the actions that will not be tolerated via the web interface, or the API (including, but not limited to):
Utilizing a script to connect to the Web interface (that's the purpose of the GuilfordComm's client software scripts)
Multiple attempts to register taken or "on hold" domains (via scripting or manually attempting to unpend domains that are already taken)
Multiple attempts to query or post identical requests to the Web interface server (Please wait for our server to respond).
Processing commands in excess of 3 transactions per second, repetitive or otherwise.
Our services are not meant for individuals or companies attempting to register in a repetitive manner potentially available domains, domains that are on hold, or domains that may be available soon.
As a general rule, requesting a name more than once every 5 minutes is considered abuse.