Acceptable Use Policy – HCST

Acceptable Use Policy

Business IT Services

HCST Acceptable Use Policy

HCST’s Acceptable Use Policy (the “Policy”) is designed to help protect HCST, HCST’s clients and the Internet community in general from irresponsible or, in some cases, illegal activities. The Policy is a non-exclusive list of the actions prohibited by HCST.  HCST reserves the right to modify the Policy at any time, effective upon posting on our website.

Prohibited Uses of HCST’s Systems, Products and Services

  1. Transmission, distribution or storage of any material in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property right used without proper authorization, and material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws.
  2. Sending unsolicited email messages, including the sending of “junk mail” or other advertising material to individuals who did not specifically request such material via “opt-in” methods (“e-mail spam”). This includes, but is not limited to, bulk-mailing of commercial advertising, informational announcements, and political tracts. It also includes posting the same or similar message to one or more newsgroups (excessive cross-posting or multiple-posting). HCST accounts or services may not be used to solicit customers from, or collect replies to, messages sent from another Internet Service Provider where those messages violate this Policy or that of the other provider. Further details are available in HCST’s Electronic Mail Advertisements Policy.
  3. Maintaining an “Open Relay” email system.
  4. Unauthorized use, or forging, of mail header information (e.g. “spoofing”).
  5. Unauthorized attempts by a user to gain access to any account or computer resource not belonging to that user (e.g., “cracking”).
  6. Obtaining or attempting to obtain service by any means or device with intent to avoid payment.
  7. Unauthorized access, alteration, destruction, or any attempt thereof, of any information of any HCST customers or end-users by any means or device.
  8. Knowingly engage in any activities that will cause a denial-of-service (e.g., synchronized number sequence attacks) to any HCST customers or end-users whether on the HCST network or on another provider’s network.
  9. Advertising, transmitting, or otherwise making available any software, program, product, or service that is designed to violate this AUP or the AUP of any other Internet Service Provider, which includes, but is not limited to, the facilitation of the means to send e-mail spam, initiation of pinging, flooding, mail-bombing, denial of service attacks, and piracy of software.
  10. Using HCST’s Services to interfere with the use of the HCST network by other customers or authorized users.

Each HCST client is responsible for the activities of its end-users and, by accepting service from HCST, is agreeing to ensure that its end-users abide by this Policy. Complaints about end-users of a HCST client will be forwarded to the HCST client’s contacts for action. If violations of the HCST Acceptable Use Policy occur, HCST reserves the right to terminate services with or take action to stop the offending customer from violating this AUP as HCST deems appropriate, without notice.

HCST also is concerned with the privacy of on-line communications and web sites. In general, the Internet is neither more nor less secure than other means of communication, including mail, facsimile, and voice telephone service, all of which can be intercepted and otherwise compromised.  As a matter of prudence, however, HCST urges its subscribers to assume that all of their on-line communications are insecure. HCST cannot take any responsibility for the security of information transmitted over HCST’s facilities.

HCST will not intentionally monitor private electronic mail messages sent or received by its subscribers unless requested by the client, or when required to do so by law, governmental authority, or when public safety is at stake. HCST may, however, monitor its service electronically to determine that its facilities are operating satisfactorily. Also, HCST may disclose information, including but not limited to, information concerning a subscriber, a transmission made using our network, or a web site, in order to comply with a court order, subpoena, summons, discovery request, warrant, statute, regulation, or governmental request. HCST assumes no obligation to inform the subscriber that subscriber information has been provided and in some cases may be prohibited by law from giving such notice. Finally, HCST may disclose subscriber information or information transmitted over its network where necessary to protect HCST and others from harm, or where such disclosure is necessary to the proper operation of the system.

Report Policy violations to