Acceptable Use Policy

Last updated January 27, 2019

Acceptable Use Policy

We are iSystematic Inc., doing business as iSystematic (“Company,” “we,” “us,” “our”), a company registered in Canada and iSystematic LLC, and a registered company in Delaware, USA. (hereafter referred to as iSystematic, we, us or our) is dedicated to providing its customers (hereafter referred to as Customer, you, or your) with an all-round top quality service, while at the same time satisfying our legal and ethical responsibilities. To this end, we have set out below our Acceptable Use Policy (AUP). Our AUP is incorporated into our Terms of Service (TOS) and any other contracts we have with you by this reference. Terms not defined in this AUP have the meaning given to them in your agreement with us (TOS)

We reserve the right to make changes to this AUP at any time. If we make a change that materially impacts your ability to use the Services, you may terminate the affected Services without penalty. The most recent version of the AUP can be found on our website at http://www.iSystematic.com/acceptable-use-policy

A. Provisions for All Customers

1. Illegal Usage

iSystematic servers may be used for lawful purposes only. Transmission, storage, presentation or distribution of any information, data or material in violation of any applicable law or regulation is prohibited. Examples of such violations are provided below. This list is intended as a guide for you and your End Users, and does not represent all possible unlawful uses of the Services.

  • obscene speech
  • promoting violence or injury
  • using defamatory, threatening or abusive language
  • gambling, or similar activities such as HYIP (High Yield Investment Programs), Ponzi schemes or pyramid schemes
  • online pharmacies
  • violations of Canadian & U.S. export control laws
  • violation of intellectual property rights of others
  • forging, misrepresenting, omitting or deleting message headers, return mailing information, or internet protocol addresses to conceal or misidentify the origin of a message
  • creating or sending Internet viruses, worms or Trojan horses, flood or mail bombs, or engaging in denial of service attacks
  • hacking, and/or subverting, or assisting others in subverting, the security or integrity of iSystematic’s services or systems
  • acting in any manner that might subject us to unfavorable regulatory action, any liability for any reason, or adversely affect our public image, reputation or goodwill, as determined by us in our sole and exclusive discretion
  • soliciting the performance of any illegal activity, even if the activity itself is not performed
    directly facilitating violation of a law or regulation and/or instructing others in prohibited activities
2. Unsolicited Commerce Email & Material – SPAM

The only email marketing activities allowed under this AUP are those compliant with the CAN-SPAM Act. We strongly encourage you to familiarize yourself with this act before engaging in any email marketing activities using our services. Please note that activities permitted under the CAN-SPAM Act can still be violations of this AUP for other reasons, and may result in immediate suspension or termination of your account, without notice, as determined by us in our sole discretion.

Spam is strictly prohibited under this AUP. Violations of our spam policy shall result in a minimum $200 fine and possible termination and/or suspension of your account or Services. We reserve the right to determine, in our sole discretion, what constitutes a violation of this spam policy, but include the following as a guide: unsolicited or unauthorized advertising and promotional materials such as “junk mail,” “instant messaging,” “chain letters,” or “pyramid schemes.” An electronic message is “spam” IF: (1) the recipient’s personal identity and context are irrelevant because the message is equally applicable to many other potential recipients; AND (2) the recipient has not verifiably granted deliberate, explicit, and still-revocable permission for it to be sent; AND (3) the transmission and reception of the message appears to the recipient to give a disproportionate benefit to the sender.

You shall also be in violation of this section if you engage in any of the foregoing activities using the service of another host, but use our Services as a mail drop for responses, or to host a site advertised in spam.

3. Security

This AUP also prohibits any actions that compromise our system and/or network security, the security of our customers, and that of the Internet generally. We reserve the right to immediately suspend or terminate your account, without notice, as a result of such actions by you or your End Users. You may also be exposed to criminal and civil liability based on your actions. Examples of such actions include, but are not limited to, unauthorized access, use, probe, or scan of a system security or authentication measure, data or traffic; interference with service to any user, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks; forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting.

You are aware that the Internet can be an insecure environment, and are responsible for ensuring the security of your data, passwords, username and confidential information.

4. Copyright Infringement

iSystematic is registered with the United States Copyright Office pursuant to the Digital Millennium Copyright Act (DMCA). If you feel that your site has been copied by one of our customers or an End User, in such a way that could violate the DMCA, you must provide us with proper notice of such infringement. The DMCA sets forth very specific guidelines of what your notice must contain. These guidelines are available here: http://www.copyright.gov/title17/92chap5.html#512

Our designated agent for receipt of notices pursuant to the DMCA is:

iSystemtic Inc.
DA: Abuse Division Manager
Attn: Legal Reports
224 Rochester Ave.
Winnipeg, MB, R3T 3W2

5. Violation of Rights Other Than Copyright

You shall not, and your End Users shall not, use our services to violate the intellectual property rights of others, including, but not limited to, copyright, trademark, trade secret and patent rights. You shall not, and your End Users shall not, use our services to violate the recognized rights of others, including, but not limited to, acts that defame, harass, abuse or threaten others.

6. Child Pornography, Child Erotica and Bestiality

Use of the Services to disseminate or display images classified under U.S. law as child pornography, child erotica and/or bestiality is strictly prohibited. We shall immediately terminate the accounts of any customers and/or End Users who are using the Services in this manner, and report them as required by law, without prior notice. Further information about child pornography may be found at http://www.ncmec.org

7. Canadian and U.S. Export Laws

Use of the services by you and/or your End Users is governed by Canadian and U.S. export control laws. These laws apply regardless of whether you and/or your End User actually reside in Canada or the United States. You may not use our services in violation of these laws, or to conduct business with third parties from sanctioned countries. More information about Canadian export law may be found at:

https://www.international.gc.ca/trade-commerce/controls-controles/ecl-lec/index.aspx?lang=eng

U.S. export laws may be found at: http://www.export.gov/exportcontrols.html

8. IP Addresses

We own the IP numbers and addresses that may be assigned to you pursuant to your use of the services. These addresses may not be assigned or transferred, and are recycled upon termination of the services. We reserve the right to change these numbers. We are required to comply with ARIN policies and procedures regarding IP addresses. You may not terminate your Services should a change in ARIN policy affect your use of the Services.

9. Customer’s Responsibilities

You are responsible for ensuring that materials disseminated or posted using our services comply with this AUP and relevant laws, including materials that have been posted by third parties. We do not review, edit, censor, or take responsibility for any information customers or End Users may create. Therefore, we cannot accept any responsibility from customers, users of our services through third parties, or third parties, that results from inaccurate, unsuitable, offensive, or illegal content or transactions.

Use of our service requires a certain level of knowledge in the use of Internet languages, protocols, and software. This level of knowledge varies depending on the anticipated use of the services. Customer agrees that he or she has the knowledge and skills necessary to properly use the Services. It is not our responsibility to provide such knowledge or skills beyond our commitment to support your use of our servers as set forth in the TOS.

10. Actions Upon AUP Violations

Your violation of any of the terms of this AUP may result in immediate suspension or termination of your account, without notice. We are the sole arbiter of what constitutes a violation of this AUP.

Upon learning of an alleged violation, we shall initiate an investigation. During this time, it may be necessary to restrict your access to the Service to prevent further potentially unauthorized activity. If such violation could constitute a criminal offense, we may notify the appropriate law enforcement authorities.

Under no circumstances shall we issue credits for suspension of your Service because of an AUP violation. You agree to hold iSystematic harmless from any claims that a suspension or termination of Services for this reason has damaged an End User.

11. Disclosure of Information

We may disclose information, including information that you and your End Users may consider confidential, in order to comply with a court order, subpoena, summons, discovery request, warrant, regulation, or governmental request. We have no obligation to inform customers or End Users that this information has been disclosed and in some cases may be prohibited by law from doing so. We also may disclose such information when it is necessary to protect us or others from harm.

12. Other Abuse

The use, and misuse, of our services changes over time. If we determine that your use of our services negatively impacts our ability to provide services to other customers, may subject us to liability, indicates your unfamiliarity with use of the services, or if you abuse our support staff, we may terminate your account.

13. Contact Information

On occasion, we may need to communicate with you by email about issues related to billing, service changes, additions and modifications to our network. It is your responsibility to provide us with a working, monitored, email address, and to update us on any changes to your account or contact information. We have no responsibility for communications misdirected as a result of your failure to provide us with correct contact information.

B. Provisions for Shared Hosting Customers Only

The provisions of this section also apply to all customers with shared hosting accounts:
You agree to restrict your use of the shared hosting services to the direct serving of web content over the HTTP protocol. Misuses include, but are not limited to, scientific/grid/distributed computing, data warehouse/backup storage, and bandwidth sinks. We shall determine, in our sole discretion, what constitutes a misuse of the shared hosting services. If you are unsure of an application’s fitness for the shared hosting services, you should consult with us before using the Services in that manner.

Any customer who uses an unacceptably high level of server resources, including, but not limited to, CPU time, memory usage, and network resources, must either: (a) pay extra for a dedicated server or semi-dedicated server, depending on the resources needed, or (b) reduce their use to an acceptable level. Our Resource Abuse Policy sets out these standards. We shall be the sole arbiter of what is considered a high vs. acceptable server usage level.

Shared hosting accounts cannot be transferred or used by anyone other than a customer. You may not sell, lease or assign the connection or parts of the connection to any party other than those named in our records. Allowing ftp access and hosting websites of End Users is not a violation of this AUP.

Shared web hosting accounts may not be used for distributing software or multimedia products. If you wish to distribute software and/or multimedia files, please contact us for permission.

Our web hosting accounts shall not be used to distribute and store an unusual amount of multimedia files. Multimedia files are defined as any graphics, audio, and video files. An unusual amount refers to any web site with disk space usage for storing the multimedia files exceeding 70% of its total usage, either in terms of total size or number of files.

We do not allow chat rooms on our shared hosting environments. We also do not allow proxy servers or scripts, torrent trackers or torrent clients to be run from our shared/reseller hosting servers, and will not register or install any third party DLLs/EXEs or software on our shared/reseller hosting servers.

C. Provisions for Dedicated and VPS Customers Only

The provisions of this section also apply to all customers with Dedicated and VPS accounts:

You are solely responsible for any breaches of security affecting the servers under your control. If your server is involved in an attack on another server or system, it will be shut down and an immediate investigation will be launched to determine the cause/source of the attack. In such an event, you shall be responsible for the cost to rectify any damage done to your server and any other requirement affected by the security breach.

You may not engage in activities designed to monitor Internet traffic other than your own. This means, that you may not monitor our Internet traffic, nor the Internet traffic of any other entity.

D. Other Uses

1. Background Running Programs

We do not allow background Daemons such as IRC bots; eggdrop; BitchX; XiRCON; and any other program that interferes with normal server operation.

2. IRC

We do not allow IRC server, IRC bots, or IRC shells to be operated on our network.

3. Domain Names

We will take necessary steps to register domain names on your behalf when requested. However, you are responsible for renewing your domain names. We do not take responsibility for failing to renew domain names. If your domain name was registered by us, you must check and take appropriate actions to renew your domain when it is about to expire. We do not handle renewals unless you send, within 7 days prior to its expiration, a ticket to our helpdesk.

Copyright Notice

iSystematic Inc, (we and us refers to iSystematic LLC, iSystematic ) operate under isystematic.com and isystematic.ca domain names ONLY!

iSystematic strictly enforces all applicable legal rights, including but not limited to, copyrights, trademarks, and other intellectual property rights. Unauthorized use, reproduction, distribution, or infringement of any protected content, including the use of our name, logo, or any similar name to deceive visitors or users, is prohibited and will result in legal action.

iSystematic owns the copyright to our current corporate logo of iSystematic is a distinctive design featuring a robotic side face accompanied by four cog wheels. This logo is a registered trademark and serves as a visual representation of our brand identity.

The business name “iSystematic” is also registered as a trademark and is characterized by a specific style featuring a lowercase “i” letter “I” followed by an uppercase letter “S”. This unique combination is legally protected and represents our brand in all business operations and promotional activities.

Our logo and company name are protected under copyright law and have been duly registered as trademarks with the relevant authorities in Delaware, USA, and Canada. This registration ensures legal protection against unauthorized use or reproduction of our intellectual property. Unauthorized use of these elements is strictly prohibited and any violations will be prosecuted to the fullest extent of the law.

TM/MC iSystematic Inc., lic. user/usager lic. iSystematic, iSystematic LLC.