Acceptable
Use Policy
Hawk
Host general policy is to act as a neutral provider of access to the global
Internet. Hawk Host reserves the right to suspend or cancel a customers access
to any or all services provided by Hawk Host when Hawk Host decides that the
account has been used inappropriately.
The following are
considered violations of Hawk Host AUP (acceptable use policy)
1. Illegal
use: Hawk Host's services may not be used for illegal purposes, or in support
of illegal activities. Hawk Host reserves the right to cooperate with legal
authorities and/or injured third parties in the investigation of any suspected
crime or civil wrongdoing.
2. Threats:
Use of the Hawk Host service to transmit any material (by e-mail, uploading,
posting or otherwise) that threatens or encourages bodily harm or destruction
of property.
3. Harassment:
Use of the Hawk Host service to transmit any material (by e-mail, uploading,
posting or otherwise) that harasses another.
4. Forgery
or impersonation: Adding, removing or modifying identifying network header information
in an effort to deceive or mislead is prohibited. Attempting to impersonate any
person by using forged headers or other identifying information is prohibited.
The use of anonymous remailers or nicknames does not constitute impersonation.
5. Fraudulent
activity: Use of Hawk Host service to make fraudulent offers to sell or buy
products, items, or services, or to advance any type of financial scam such as
"pyramid schemes" and "chain letters."
6. Unsolicited
commercial e-mail / Unsolicited bulk e-mail (SPAM) Use of the Hawk Host service
to transmit any unsolicited commercial or unsolicited bulk e-mail is expressly
prohibited. Violations of this type will result in the immediate termination of
the offending Hawk Host account.
7. IMPORTANT
NOTICE: Anyone hosting websites or services on their server that support
spammers or cause any of our IP space to be listed in any of the various Spam
Databases will have their server immediately removed from our network. The
server will not be reconnected until such time that you agree to remove ANY and
ALL traces of the offending material immediately upon reconnection and agree to
allow us access to the server to confirm that all material has been COMPLETELY
removed. Severe violations may result in immediate and permanent removal of the
server from our network without notice to the customer. Any server guilty of a
second violation WILL be immediately and permanently removed from our network
without notice.
8. E-mail
/ News Bombing: Malicious intent to impede another person's use of electronic
mail services or news will result in the immediate termination of the offending
Hawk Host account.
9. E-mail
/ Message Forging: Forging any message header, in part or whole, of any
electronic transmission, originating or passing through the Hawk Host service
is in violation of this AUP.
10. Usenet
SPAMing: Hawk Host has a zero tolerance policy for the use of its network for
the posting of messages or commercial advertisements, which violate the rules,
regulations, FAQ or charter of any newsgroups or mailing list. Commercial
messages that are appropriate under the rules of a newsgroup or mailing list or
that are solicited by the recipients are permitted.
11. Unauthorized
access: Use of the Hawk Host service to access, or to attempt to access, the
accounts of others, or to penetrate, or attempt to penetrate, security measures
of Hawk Host's or another entity's computer software or hardware, electronic
communications system, or telecommunications system, whether or not the
intrusion results in the corruption or loss of data, is expressly prohibited
and the offending Hawk Host account is subject to immediate termination.
12. Copyright
or trademark infringement: Use of the Hawk Host service to transmit any
material (by e-mail, uploading, posting or otherwise) that infringes any
copyright, trademark, patent, trade secret or other proprietary rights of any
third party, including, but not limited to, the unauthorized copying of
copyrighted material, the digitization and distribution of photographs from
magazines, books, or other copyrighted sources, and the unauthorized
transmittal of copyrighted software.
13. Collection
of personal data: Use of the Hawk Host service to collect, or attempt to
collect, personal information about third parties without their knowledge or
consent.
14. Network
disruptions and unfriendly activity: Use of the Hawk Host service for any
activity which affects the ability of other people or systems to use Hawk Host
Services or the Internet. This includes "denial of service" (DOS)
attacks against another network host or individual user. Interference with or
disruption of other network users, services or equipment is prohibited. It is
the Member's responsibility to ensure that their network is configured in a
secure manner. A Subscriber may not, through action or inaction, allow others
to use their network for illegal or inappropriate actions. A Subscriber may not
permit their network, through action or inaction, to be configured in such a
way that gives a third party the capability to use their network in an illegal
or inappropriate manner. Unauthorized entry and/or use of another company
and/or individual's computer system will result in immediate account
termination. Hawk Host will not tolerate any subscriber attempting to access
the accounts of others, or penetrate security measures of other systems,
whether or not the intrusion results in corruption or loss of data.
15. Fraud:
Involves a knowing misrepresentation or misleading statement, writing or
activity made with the intent that the person receiving it will act upon it.
16. Copyrights:
Infringement of Copyright, Patent, Trademark, Trade Secret, or Intellectual
Property Right: Distribution and/or posting of copyrighted or the
aforementioned infringements will not be tolerated.
17. Distribution
of Viruses: Intentional distributions of software that attempts to and/or
causes damage, harassment, or annoyance to persons, data, and/or computer
systems are prohibited. Such an offense will result in the immediate
termination of the offending account.
18. Inappropriate
Use of Software: Use of software or any device that would facilitate a
continued connection, i.e. pinging, while using Hawk Host services could result
in suspension service.
19. Third
Party Accountability: Hawk Host subscribers will be held responsible and
accountable for any activity by third parties, using their account, that
violates guidelines created within the Acceptable Use Policy.
20. Reseller
accounts may not be used to offer any form of free domain hosting services.
Violations will result in immediate suspension of service
21. Accounts
may not be used as torrent trackers of any kind. This includes torrent trackers
of legitimate content.
22. Accounts
may not run proxy scripts of any kind. This is not strictly limited to PHPProxy
or CGIProxy this also includes any others.
23. HYIP:
High-yield investment program sites of any kind, including those related to
cryptocurrency.
24. Accounts
may not be used as part of a CDN (content delivery network) or any similar
service meant to serve videos, media, or other high bandwidth applications.
25. Any
accounts receiving a high volume of verified abuse complaints may be removed
from our network.
26. Tor
exit nodes are not allowed to be operated on any of our services.
27. Accounts
may not be used as file mirrors, file repositories, download hosts, or any
other site/service offering file sharing which leads to excessive bandwidth
usage.