Net Abuse Policy

 

The Latest
The Latest

New
Offering

SmartCLOUD™ Compute
SmartCLOUD™ Compute

Free Trial

SmartCLOUD™ DaaS
SmartCLOUD™ DaaS

P O C

SmartCLOUD™ M@il
SmartCLOUD™ M@il

Online
Quotation



Goals

CITIC Telecom CPC's goals are to protect network resources, preserve the privacy and security of CITIC Telecom CPC and our customers' networks, and maximize the utility of CITIC Telecom CPC and the Internet, while recognizing CITIC Telecom CPC's position in the Internet community as a whole.



Interpretation

The provisions of this Policy are intended as guidelines and are not meant to be exhaustive. Generally, conduct that violates law, regulation, or the accepted norms of the Internet community, whether or not expressly mentioned in this Policy, is prohibited. CITIC Telecom CPC reserves the right at all times to prohibit activities that damage its commercial reputation and goodwill.

Security Breaches / Denial of Service

Any attempt to breach authentication or security measures by "denial-of-service" attack, port scanning and probing, any release or malicious activity of a virus or worm whether intentional or unintentional, or any unauthorized attempt to gain access to any other account, host or network is prohibited, and will result in immediate service termination, which may be without notice.

CITIC Telecom CPC is committed to implementing measures to ensure that its infrastructure, as well as that of its customers, cannot be exploited as platforms for denial of service attacks.



E-mail and Usenet News

Using any CITIC Telecom CPC account or server to send duplicative, unsolicited e-mail messages (commercial or otherwise), or to collect the responses from unsolicited e-mail (for example, by maintaining a spamvertised Web site), is prohibited.
CITIC Telecom CPC reserves the right in its sole discretion to determine whether duplicative or mass e-mail messages are "unsolicited." A complaint from the recipient is presumptive evidence that the message was unsolicited. CITIC Telecom CPC has no obligation to refer complaints to the sender or to identify complaining parties.

Conduct that directly or indirectly encourages, permits, or relies on spamming is included in this prohibition. Examples include failure to implement technical or administrative measures to prevent mass unsolicited e-mail, or providing spam "support services" such as e-mail drop boxes or sales of spamware.

Similarly, using any CITIC Telecom CPC account or server to post advertisements or messages that violate the charter of any newsgroup or mailing list is prohibited.

CITIC Telecom CPC reserves the right to make the determination whether a given message violates the newsgroup or mailing list charter. In most cases CITIC Telecom CPC will defer to the judgment of the newsgroup or mailing list moderator or administrator.
Commercial messages that are appropriate under the charter of a newsgroup or mailing list, or that are expressly solicited by the recipients, are permitted.



Harassment or Illegal Activity

Conduct in connection with e-mail, Usenet news, or any other CITIC Telecom CPC service that is an obvious nuisance (such as "mail bombing" or falsifying authorship) or that would be unlawful in other contexts (for example, threats, harassment, defamation, obscenity, distribution or possession of child pornography, or software piracy) is prohibited.



Open Mail Relays

Maintaining an open mail relay invites senders of mass unsolicited commercial e-mail to exploit the server by using it for spamming. Failure or refusal to take appropriate steps to close an open mail relay on CITIC Telecom CPC's network is grounds for temporary suspension or permanent termination of service.



IRC (Internet Relay Chat)

Using programs that interfere with others' use, or running an IRC robot, on any IRC server is prohibited. When logged into any IRC server, users are expected to comply with the rules and policies established by the server's administrator.



Forgery of Identity

Falsifying addressing information or otherwise modifying headers to conceal the sender's or recipient's identity, for the purpose of circumventing this Policy, is prohibited. This provision is not intended to disallow the use of aliases or anonymous remailers for any legitimate purpose.



Copyright, Privacy, and Intellectual Property

Using a CITIC Telecom CPC connection to commit, aid or abet any violation of copyright or intellectual property law is prohibited. Pursuant to this Policy, CITIC Telecom CPC has terminated, and will continue to terminate, in appropriate circumstances, subscribers and account holders who are repeat infringers.

This prohibition includes publishing a private e-mail message to third parties, by any means, without the express prior consent of the author.

The e-mail addresses of CITIC Telecom CPC subscribers are not for sale or commercial distribution to third parties without the express prior consent of the subscriber.



Cooperation with Other Providers

Using CITIC Telecom CPC's facilities to engage in activities that violate the Terms of Service of any other network access provider is prohibited. For example, sending unsolicited commercial e-mail through CITIC Telecom CPC's facilities to the subscribers of any Internet or online service provider that disallows unsolicited commercial e-mail is prohibited.



Consequences of Violation

Violation of this Policy by a CITIC Telecom CPC customer may result in temporary suspension or permanent termination of service, at CITIC Telecom CPC's sole discretion.

CITIC Telecom CPC does not issue service credits for any outages incurred through service disablement resulting from Policy violations.



Modification

CITIC Telecom CPC reserves the right to add, delete, or modify any provision of this Policy at any time without notice.



Reporting Violations

Please send reports of any activity in violation of this Policy to: abuse@citictel-cpc.com

Include the full text of any offending message, with all headers containing timestamps and IP addresses, and (for unsolicited commercial e-mail) please place the subject line of the spam in the subject line of your e-mail.