Legal Policy

Information Technology Consulting Services servers are subject to the following use policy:

  • Users may not download or store illegal copies of commercial software on our system.
  • Users may not make threats against another person or organization via e-mail, news or any other electronic media/service we provide.
  • Users may not mount an attack against our system or any other systems. This includes but is not limited to mail bombing, "hacking" or attempting to gain root or unauthorized shell access, ping flooding, tsunami or flood bots or annoyance utilities like "nuke" or "flash." Users may not send "spam" email.
  • Bulk email, aka "spamming," is defined here as delivery and reception of unsolicited email, from one site, the spamming site, to many recipients, generally characterized by lack of the usual bulk-mail controls: removal from mailing lists, access to humans at the spamming site, valid return addresses, etc.
  • Our policy is to consider the sending of unsolicited email to be equivalent to sending unsolicited faxes, and not allowed. Note that we are not implying that unsolicited email is actually illegal; the oft-quoted US Code Title 47, Sec.227 (a)(2)(B) is definitely ambiguous on this issue. It is, however, now against the acceptable use of our network. Trying to "hack" root login or unauthorized shell access on our machines is forbidden.
  • Users may not run packet sniffers or similar programs.
  • It is our general policy to not interfere with anyone's communications regardless of purpose or intent; however, Modern Solutions will take immediate action to prevent, if possible, communication or activities that (a) we perceive to be or are informed are harmful to our services (such as bandwidth problems, flood-pinging and/or SMTP port attacks, etc) or (b) we are substantially informed that are illegal. Note that it is not Information Technology Consulting Services responsibility to determine what is illegal and what is not. If we must block access, we will do so only as little as is required to solve the immediate problem, and will attempt to restore access as soon as the (perceived) problem is resolved.
  • Because of the above, we do not allow "adult content" or "pornographic" web sites of any kind on our machines. The bandwidth and system load requirements are beyond what we are willing to sell to any individual client.
  • Use of Information Technology Consulting Services constitutes acceptance of these terms and conditions. Violation will result in immediate account termination.