Your use of Razizeh and any services offered on or through Razizeh (collectively, the "Razizeh Services" or „Services“) is subject to the terms of this Acceptable Use Policy ("AUP"). This AUP is incorporated by reference into each contract Razizeh enters into with a customer (each, a "Customer") for the use of such Services. Razizeh may modify this AUP at any time without notice.
The AUP was last revised on July 10, 2017.
Anyone may report a violation of the AUP by following the instructions in Section III.
Prohibited Uses. Customers and Users may not:
1. Utilize the Services to send unsolicited bulk and/or commercial messages over the Internet (known as “spam” or "spamming"). It is not only harmful because of its negative impact on consumer attitudes toward Razizeh, but also because it can overload Razizeh 's network and disrupt service to its Customers subscribers. Maintaining an open SMTP relay is prohibited. Any direct action, configuration, or setting that causes excessive outbound email traffic is subject to review and possible action. When a complaint is received, Razizeh has the absolute and sole discretion to determine from all of the evidence whether the email recipients were from an "opt-in" email list, or whether the outbound email traffic generated from an account is suitable for a shared hosting environment.
2. Utilize the Services in connection with any illegal activity. Without limiting the general application of this rule, Customers and Users may not:
a) Utilize the Services to copy material from third parties (including text, graphics, music, videos or other copyrightable material) without proper authorization;
b) Utilize the Services to misappropriate or infringe the patents, copyrights, trademarks or other intellectual property rights of any third party;
c) Utilize the Services to traffic in illegal drugs, illegal gambling, obscene materials or other any products or services that are prohibited under applicable law;
d) Utilize the Services to Forge or misrepresent message headers, whether in whole or in part, to mask the originator of the message; or
e) Utilize the Services in any manner that violates applicable law.
3. Utilize the Services in connection with any tortious or actionable activity. Without limiting the general application of this rule, Customers and Users may not:
a) Utilize the Services to publish or disseminate information that (A) constitutes slander, libel or defamation, (B) publicizes the personal information or likeness of a person without that person’s consent or (C) otherwise violates the privacy rights of any person. Utilize the Services to threaten persons with bodily harm, to make harassing or abusive statements or messages, or to solicit the performance of acts or services that are illegal under applicable law.
b) Utilize the Services in connection with any other disruptive or abusive activity. Without limiting the general application of this rule, Customers and Users may not:
i) Utilize the Services to cause denial of service attacks against Razizeh or other network hosts or Internet users or to otherwise degrade or impair the operation of Razizeh’s servers and facilities or the servers and facilities of other network hosts or Internet users; or
ii) Post messages or software programs that consume excessive CPU time, or storage space, or network bandwidth; or
iii) Utilize the Services to offer mail services, mail forwarding capabilities, POP accounts or auto responders other than for the User’s own account; or
iv) Utilize the Services to resell access to CGI scripts installed on Razizeh’s servers; or
vi) Utilize the Services to subvert, or assist others in subverting, the security or integrity of any Razizeh systems, facilities or equipment; or
vii) Utilize the Services to gain unauthorized access to the computer networks of Razizeh or any other person; or
viii) Utilize the Services to provide passwords or access codes to persons not authorized to receive such materials by the operator of the system requiring the password or access code; or
ix) Utilize the Services to (A) forge the signature or other identifying mark or code of any other person, (B) impersonate or assume the identity or any other person, or (C) engage in any other activity (including "spoofing") to attempt to deceive or mislead other persons regarding the true identity of the User (excluding the use of anonymous re-mailers or Internet nicknames); or
x) Utilize the Services to distribute or post any virus, worm, Trojan horse, or computer code intended to disrupt services, destroy data, destroy or damage equipment, or disrupt the operation of the Services; or
xi) Utilize the Services to conduct port scans or other invasive procedures against any server (except any server for which the User is an authorized system administrator); or
xii) Utilize the Services to distribute, advertise or promote software or services that have the primary purpose of encouraging or facilitating unsolicited commercial e-mail or Spam;
xiii) Utilize the Services to solicit or collect, or distribute, advertise or promote, e-mail address lists for the purpose of encouraging or facilitating unsolicited commercial e-mail or Spam; or
xiv) Utilize the Services in any manner that might subject Razizeh to unfavorable regulatory action, subject Razizeh to any liability for any reason, or adversely affect Razizeh’s public image, reputation or goodwill, including, without limitation, sending or distributing sexually explicit, hateful, vulgar, racially, ethnically or otherwise objectionable materials as determined by Razizeh in its sole discretion; or
xv) While on a shared hosting platform, utilize, operate, enable, execute, compile, upload or publicly store source code, executable code, programs, or software packages designed to perform tasks not directly associated with website/email hosting, including, without limitation, (A) directly opening any listening port, (B) starting any ‘daemon’ process, (C) performing local/remote security scans, (D) simulating local shell/OS access by means of a tunneled/encapsulated connection to a remote host, (E) circumventing firewall restrictions, (F) connecting to any IRC/Peer to Peer file sharing server/network, (G) providing ‘tracker’ services to ‘BitTorrent’ clients and/or (H) exploiting web browser vulnerabilities, as determined by Razizeh in its sole discretion; or
xvi) Attempt to attack, disrupt, or abuse the support- and contact-related mechanisms of Razizeh, including, but not limited to, telephone lines, email addresses, fax lines, bulletin boards or contact/signup forms; or
xvii) Utilize the Services in any other manner to interrupt or interfere with the Internet usage of other persons;
a) Warning the Customer; and/or
b) Suspending the offending Customer from the Services; and/or
c) Terminating the offending Customer from the Services; and/or
d) Imposing fees or charges on the offending Customer account in accordance with the applicable service contract; and/or
e) Removing the offending content; and/or
f) Taking other action in accordance with this AUP, the applicable service contract or applicable law.
Razizeh requests anyone who believes that there is a violation of this AUP or has a question about this AUP to please direct the relevant information to: support@Razizeh.com
If available, the following information should be provided in the report:
Please note that if you are reporting an email, the email with full header information provides all of the above, as do syslog files.
Owners of copyrighted works who believe that their rights under U.S. copyright law have been infringed may take advantage of certain provisions of the Digital Millennium Copyright Act of 1998 (the “DMCA”) to report alleged infringements. It is Razizeh's policy in accordance with the DMCA and other applicable laws to reserve the right to terminate the Razizeh Services provided to any customer or user who is either found to infringe third party copyright or other intellectual property rights, including repeat infringers, or who Razizeh, in its sole discretion, believes is infringing these rights. Razizeh may terminate the Razizeh Services at any time with or without notice for any affected customer or user.
Copyright owners may report alleged infringements of their works by sending Razizeh's authorized agent a notification of claimed infringement that satisfies the requirements of the DMCA. Upon Razizeh's receipt of a satisfactory notice of claimed infringement for these works, Razizeh will respond expeditiously to either directly or indirectly (i) remove the allegedly infringing work(s), if applicable or (ii) disable access to the work(s). Razizeh will also notify the affected customer or user of the Razizeh Services of the removal or disabling of access to the work(s).
Copyright owners may send Razizeh a notification of claimed infringement to report alleged infringements of their works under the DMCA (but not the Copyright Alerts System) to:
Copyright owners may use their own notification of claimed infringement form that satisfies the requirements of Section 512(c)(3) of the U.S. Copyright Act. Under the DMCA, anyone who knowingly makes misrepresentations regarding alleged copyright infringement may be liable to Razizeh, the alleged infringer, and the affected copyright owner for any damages incurred in connection with the removal, blocking, or replacement of allegedly infringing material.
If you receive a DMCA notification of alleged infringement as described above, and you believe in good faith that the allegedly infringing works have been removed or blocked by mistake or misidentification, then you may send a counter notification to Razizeh. Upon Razizeh's receipt of a counter notification that satisfies the requirements of the DMCA, Razizeh will provide a copy of the counter notification to the person who sent the original notification of claimed infringement and will follow the DMCA's procedures with respect to a received counter notification. In all events, you expressly agree that Razizeh will not be a party to any disputes or lawsuits regarding alleged copyright infringement.