Content Oasis Acceptable Use Policy
Introduction
Content Oasis’ goal is to provide its customers with the best broadband Internet service possible. In order to help accomplish this, Content Oasis has adopted this Acceptable Use Policy (the “Policy”). This Policy outlines permitted uses of Content Oasis Internet services, including Content Oasis-provided residential and enterprise services (collectively, the “Service”). This Policy is in addition to any other restrictions contained in any applicable terms and conditions or other agreements between you and Content Oasis. All capitalized terms used in this Policy that are not defined here have the meanings given to them in the Broadband Services Agreement, or in the Contract for Technical Services, as applicable. All Content Oasis customers and all others who use the Service (the “customer,” “user,” “you,” or “your”) must comply with this Policy. Your failure, or others’ failure, to comply with this Policy could result in the suspension or termination of your Service and/or account. Therefore, you should take steps to ensure that others you permit to use your Service are aware of this Policy and agree to abide by it. In the event your Service and/or account are terminated, termination or other charges may apply. If you or your business do not agree to comply with this Policy, you must immediately stop all use of the Service and notify Content Oasis so that we may close your account. Content Oasis may revise this Policy from time to time. Content Oasis will use reasonable efforts to make customers aware of any changes to this Policy, which may include sending email announcements or posting information on the Content Oasis website, www.contentoasis.com. Revised versions of this Policy are effective immediately upon posting. Accordingly, customers of the Service should read any Content Oasis announcements they receive and regularly visit the Content Oasis web site and review this Policy to ensure that their activities conform to the most recent version. You can send questions regarding this Policy to, and report violations of it at legal@contentoasis.com.Section I. Prohibited Uses and Activities
What uses and activities does Content Oasis prohibit? In general, the Policy prohibits uses and activities involving the Service that are illegal, infringe the rights of others, or interfere with or diminish the use and enjoyment of the Service by others. For example, these prohibited uses and activities include, but are not limited to, using the Service, Customer-Provided Equipment, or the Content Oasis Equipment, either individually or in combination with one another, to:- undertake or accomplish any unlawful purpose. This includes, but is not limited to, posting, storing, transmitting or disseminating information, data or material which is libelous, obscene, unlawful, threatening or defamatory, or which infringes the intellectual property rights of any person or entity, or which in any way constitutes or encourages conduct that would constitute a criminal offense, or otherwise violate any local, state, federal, or non-Nigerian law, order, or regulation;
- post, store, send, transmit, or disseminate any information or material which a reasonable person could deem to be unlawful;
- upload, post, publish, transmit, reproduce, create derivative works of, or distribute in any way information, software or other material obtained through the Service or otherwise that is protected by copyright or other proprietary right, without obtaining any required permission of the owner;
- transmit unsolicited bulk or commercial messages commonly known as “spam;
- send very large numbers of copies of the same or substantially similar messages, empty messages, or messages which contain no substantive content, or send very large messages or files that disrupts a server, account, blog, newsgroup, chat, or similar service;
- initiate, perpetuate, or in any way participate in any pyramid, “419” or other illegal scheme;
- participate in the collection of very large numbers of email addresses, screen names, or other identifiers of others (without their prior consent), a practice sometimes known as spidering or harvesting, or participate in the use of software (including “spyware”) designed to facilitate this activity;
- collect responses from unsolicited bulk messages;
- use IRC (Internet Relay Chat) or other chat services or tools to flood chats, establish more than two (2) concurrent chat connections per device at any time, or use unattended clones, bots, or other automated programs to engage in chats;
- falsify, alter, or remove message headers;
- falsify references to Content Oasis or its network, by name or other identifier, in messages;
- impersonate any person or entity, engage in sender address falsification, forge anyone else’s digital or manual signature, or perform any other similar fraudulent activity (for example, “phishing”);
- violate the rules, regulations, terms of service, or policies applicable to any network, server, computer database, service, application, system, or web site that you access or use;
- access any other person’s computer or computer system, network, software, or data without his or her knowledge and consent; breach the security of another user or system; or attempt to circumvent the user authentication or security of any host, network, or account. This includes, but is not limited to, accessing data not intended for your business, logging into or making use of a server or account your business is not expressly authorized to access, or probing the security of other hosts, networks, or accounts without express permission to do so;
- use or distribute tools or devices designed or used for compromising security or whose use is otherwise unauthorized, such as password guessing programs, decoders, password gatherers, keystroke loggers, analyzers, cracking tools, packet sniffers, encryption circumvention devices, or Trojan Horse programs. Unauthorized port scanning is strictly prohibited;
- copy, distribute, or sublicense any proprietary software provided in connection with the Service by Content Oasis or any third party, except that your business may make one copy of each software program for back-up purposes only;
- distribute programs that make unauthorized changes to software (cracks);
- service, alter, modify, or tamper with the Content Oasis Equipment or Service or permit any other person to do the same who is not authorized by Content Oasis;
- restrict, inhibit, or otherwise interfere with the ability of any other person, regardless of intent, purpose or knowledge, to use or enjoy the Service (except for tools for safety and security functions or tools implementing authorized internal business policies), including, without limitation, posting or transmitting any information or software which contains a worm, virus, or other harmful feature, or generating levels of traffic sufficient to impede others’ ability to use, send, or retrieve information;
- restrict, inhibit, interfere with, or otherwise disrupt or cause a performance degradation, regardless of intent, purpose or knowledge, to the Service or any Content Oasis (or Content Oasis supplier) host, server, backbone network, node or service, or otherwise cause a performance degradation to any Content Oasis (or Content Oasis supplier) facilities used to deliver the Service;
- make the Service available to anyone other than you, members of your household, your business or your business’ authorized employees, contractors, or users (i.e. members of the public, customers of an establishment, hotel or motel guests and patrons, or persons in a residence hall or apartment building) unless done with Content Oasis’ written approval in accordance with an applicable Broadband Services Agreement and/or Contract for Technical Services;
- resell the Service or otherwise make available to anyone outside the Service Location(s) the ability to use the Service (for example, through WiFi or other methods of networking), in whole or in part, directly or indirectly, unless expressly permitted by an applicable Broadband Services Agreement and/or Contract for Technical Services;
- connect the Content Oasis Equipment to any computer outside of your business’ Service Location(s);
- interfere with computer networking or telecommunications service to any user, host or network, including, without limitation, denial of service attacks, flooding of a network, overloading a service, improper seizing and abusing operator privileges, and attempts to “crash” a host;
- interfere with Content Oasis’s ability to control or block ports for safety and security purposes and as part of its overall network management;
- interfere with Content Oasis’s use and control of its domain name server (“DNS”) used in connection with the Service; and
- accessing and using the Service with anything other than a dynamic Internet Protocol (“IP”) address that adheres to the dynamic host configuration protocol (“DHCP”), unless such an IP address is expressly permitted by an applicable Broadband Services Agreement and/or Contract for Technical Services.