Chancellor's Office ACCEPTABLE USE POLICY for Guests (Effective date: June 1, 2006)
Chancellor's Office has created this Acceptable Use Policy (the "Policy") so you will understand when and under what circumstances we may suspend or terminate your use of your service (the "Service") and access to Chancellor's Office sites containing information and data available via your computer and/or a wireless device (the "Chancellor's Office Sites"). By using our Service or accessing the Chancellor's Office Sites, you consent to the acceptable use practices described in this Policy, that we may modify from time to time.
Our goal is for all of our subscribers to have an easy and productive experience every time they access the Chancellor's Office Sites or use our Service. Therefore, you may only use our Service for lawful purposes and in a manner that does not interfere with use by other subscribers or our systems. To assure this, we reserve the right, but are not obligated, to suspend or terminate your access to the Chancellor's Office Sites and/or your use of the Service at any time, if we determine in our sole discretion that your conduct on the Chancellor's Office Sites or our Service involves such behavior. Examples of inappropriate use are as follows:
- Harmful or Offensive Content: uploading, downloading, posting, distributing, publishing, or otherwise transmitting (collectively, "Disclosing") any message, data, information, image, text, or other material (collectively, "Content") that is unlawful, libelous, defamatory, slanderous, obscene, pornographic, indecent, lewd, harassing, threatening, harmful, invasive of privacy or publicity rights, abusive, inflammatory, or otherwise harmful or offensive;
- Dangerous Content: disclosing any Content that would constitute or encourage a criminal offense, violate the rights of any party, or that would otherwise create liability or violate any local, state, national, or international law;
- Infringing Content: disclosing any Content that may infringe any patent, trademark, trade secret, copyright or other intellectual or proprietary right of any party. Infringement may result from the unauthorized copying and posting or distributing ring tones, graphics, pictures, photographs, logos, software, articles, music, or videos. By posting any Content, you represent and warrant that you have the lawful right to distribute and reproduce such Content;
- False Representation: impersonating any person or entity or otherwise misrepresenting your affiliation with a person or entity without proper consent to do so;
- Interference: interfering with other users of Services;
- Deceptive Content or Spam: using e-mail, text messaging services , or multimedia messaging services to Disclose deceptive Content-such as letters relating to pyramid schemes, or communications offering or disseminating fraudulent goods, services, schemes, or promotions-or any form of unsolicited commercial e-mail or "spam" (electronic messages sent to multiple e-mail addresses or wireless devices where the recipient has not consented to receive such messages, except messages whose primary purpose is to facilitate, complete, confirm, provide, or request information about a commercial transaction, an existing employment relationship, or an existing commercial relationship that the recipient has previously agreed to enter into with the sender).
- Unapproved Promotions or Advertising of Goods or Services: Without our prior written permission, Disclosing any unsolicited promotions of goods or services, commercial solicitation or any advertising, promotional materials, or any other solicitation of other users for goods or services except in those areas (e.g., a classified bulletin board) that are designated for such purpose;
- Off-Topic Content: Disclosing any Content that is off-topic according to the description of a group or list or sending unsolicited mass e-mailings if such Content is not appropriate to the context and/or purpose of the discussion, group or list;
- Content Harmful to Other Systems: Disclosing harmful Content, including without limitation, viruses, Trojan horses, worms, time bombs, zombies, cancelbots, or any other computer programming routines that may damage, interfere with, surreptitiously intercept or expropriate any system, program, data, or personal information.
Network Usage
Violations of system or network security are prohibited, and may result in criminal and civil liability. Chancellor's Office may investigate incidents involving such violations and may involve and will cooperate with law enforcement if a criminal violation is suspected. Examples of system or network security violations include, without limitation, the following:
- Modifications to Transmissions: Installation of any amplifiers, enhancers, repeaters, or other devices that modify, disrupt, or interfere in any way with the radio frequency licensed to us to provide Service.
- Hacking: Unauthorized access to or use of data, systems, or networks, including any attempt to probe, scan, or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network.
- Interception: Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network.
- Intentional Interference: Interference with service to any user, host, or network including, without limitation, mail bombing, news bombing, other flooding techniques, deliberate attempts to overload a system, or broadcast attacks.
- Falsification of Origin: Forging any TCP-IP packet header, e-mail header, or any part of a message header.
- Avoiding System Restrictions: Using manual or electronic means to avoid any use limitations placed on the Services.
Enforcement of this Policy
We reserve the right to strictly enforce this Policy by, without limitation, issuing warnings, suspending, or terminating Service, refusing to transmit, removing, screening, or editing Content prior to delivery or actively investigating violations and prosecuting them in any court or appropriate venue. We may block access to certain categories of numbers (e.g. 976, 900, and certain international destinations) or certain sites at any time in our sole discretion.
We may access, use, and disclose transaction information about your use of our Service, and any Content transmitted by you via the Chancellor's Office Sites or through the Service, to the extent permitted by law, in order to comply with the law (e.g., a lawful subpoena); to enforce or apply our subscriber agreements; to initiate, render, bill, and collect for our Services; to protect our rights or property, or to protect users of our Services from fraudulent, abusive, or unlawful use of, or subscription to, our Service.
Your Responsibility
You are solely liable for any transmissions you initiate through our Service or any Content you Disclose. Unless you are participating in an area of the Chancellor's Office Sites or Service that requires or allows anonymity, you will always use your real name in online communications. You agree to indemnify and hold us harmless from any claim, action, demand, loss, or damage (including attorneys' fees) made or incurred by any third party arising out of or relating to your violation of this Policy.
Updating this Policy
We may revise and update this Policy if our practices change, as technology changes, or as we add new services or change existing ones.
Contacting Us
If you have any questions, comments, or concerns about this Policy, please contact:
|