Laserfiche WebLink
Acceptable User Policy (Ver.1 — 1/18.1) C) Entech Solution, LLC. 2018 <br />Confidential <br />not expressly authorized to access. Examples of disruptions include but are not limited to port <br />scans, flood pings, packet spoofing and forged routing information. <br />8. Executing any form of network monitoring that will intercept data not intended for the <br />customer. <br />9. Circumventing user authentication or security of any host, network or account. <br />10. Interfering with or denying service to any user other than the customer's host (e.g., denial <br />of service attack). <br />11. Using any program/script/command, or sending messages of any kind, designed to interfere <br />with, or to disable a user's terminal session, <br />12. Failing to comply with Entech's procedures relating to the activities of customers on Entech- <br />owned facilities. <br />13. Furnishing false or incorrect data on the order form contract (electronic or paper) including <br />fraudulent use of credit card numbers or attempting to circumvent or alter the processes or <br />procedures to measure time, bandwidth utilization or other methods to document "use" of <br />Entech's products or services. <br />14. Sending unsolicited mail messages, including the sending of "junk mail" or other advertising <br />material to individuals who did not specifically request such material, who were not previous <br />customers of the customer or with whom the customer does not have an existing business <br />relationship (e.g., E-mail "seam"); or distributing, advertising or promoting software or services <br />that have the primary purpose of encouraging or facilitating unsolicited commercial E-mail or <br />spam. <br />15. Harassment, whether through language, frequency, or size of messages. <br />16. Unauthorized use or forging of mail header information. <br />17. Solicitations of mail or any other E-mail address other than that of the poster's account or <br />service, with the intent to harass or collect replies. <br />18. Creating or forwarding "chain letters" or other "pyramid schemes" of any type. <br />19. Use of unsolicited E-mail originating from within the Entech network or networks of other <br />Internet Service Providers on behalf of or to advertise any service hosted by Entech or <br />connected via the Entech network. <br />20. Exporting, re-exporting, or permitting downloads of any content in violation of the export <br />or import laws of the United States or without all required approvals, licenses and exemptions. <br />