Acceptable Use Policy ("AUP") applies
to all services provided by First Class Solutions, Inc. ("FCS")
Please read this AUP in its entirety. All users of our Service will be bound
by this AUP, which may be updated from time to time without notice so please
check back periodically for any substantive changes. Violation of this AUP
is grounds for termination of the Service. If you do not wish to be bound by
these policies, please do not use the Service.
FCS strives to provide its customers with the highest quality Internet
service that is available and at the same time respect the standards that have
been created within the Internet community. To that end we believe that certain
activities and conduct are inappropriate or abusive and will not be tolerated
on our network. This list is not meant to be exhaustive, but merely illustrative
of examples of conduct deemed by FCS. to be inappropriate and improper
and therefore prohibited on the FCS network. If you need to report a possible
violation or require further information, please send email to abuse.
FCS.'s network may only be used for lawful purposes. The transmission of material
that is in violation of any federal, state or local law, or that is protected
by trademark, trade secret or other intellectual property, is strictly prohibited.
Customers are prohibited from using the FCS network to transmit material that
is judged by to be illegal, proprietary, obscene, criminal or in some fashion
inconsistent with the generally accepted standards of the Internet community.
FCS neither sanctions nor permits hosted site content or the transmission of
data that contains illegal or obscene material or fosters or promotes illegal
activity, including but not limited to, gambling, the offering for sale of illegal
weapons, and the promotion or publication of any material that may violate hate
Anyone who publishes materials and information which are accessible through the
FCS network is solely responsible for the content of such materials and information
and to know and comply with all laws applicable to the publication and distribution
of such materials and information. FCS does not accept responsibility for the
content of the materials and information published by others which is accessible
through the FCS network and does not accept responsibility for the violation
of any laws resulting from such publication or distribution.
FCS reserves the right to immediately suspend or terminate any site or transmission
that violates this AUP, without prior notice. In the event of such termination,
Customer agrees that the unused portion of any fees Customer may have paid for
any Services rendered to Customer by FCS are an appropriate recompense to FCS
for the time required to respond to and address issues created by Customer's
illegal or obscene site/content, and Customer agrees not to seek recovery of
Further, should Customer violate this AUP, FCS will actively assist and cooperate
with law enforcement agencies and government authorities in collecting and tendering
information about Customer, Customer's site, the illegal or obscene content,
and those persons that may have inappropriately accessed, acquired, or used the
illegal or obscene content.
Customer shall neither permit, allow, nor participate in the illegal or unauthorized
accessing (often known as "hacking" or "cracking") of computers or networks.
Customer shall not use our systems to engage in illegal activities including,
but not limited to breaking into remote systems, credit card fraud, theft, vandalism,
threats, or violence. These unacceptable uses carry potential civil and criminal
penalties under both federal laws and the laws of most states and may constitute
grounds for immediate termination.
Unsolicited Commercial E-mail and Unsolicited Bulk E-mail ("SPAM"). Unsolicited
e-mail, including commercial advertising and informational announcements sent
without the recipient either requesting such information or otherwise explicitly
expressing an interest in the material, is strictly prohibited. SPAM activity
that does not originate from a FCS Server but attempts to direct recipients via
a link or otherwise to a site on the FCS network is also a violation of this
Unauthorized use of the FCS network in connection with the transmission of
unsolicited bulk e-mail ("SPAM"), including the transmission of counterfeit e-mail,
may result in civil and criminal penalties against the sender, including those
provided by the Computer Fraud and Abuse Act (18 U.S.C. § 1030 et seq.)
System and Network Security. Violations of system or network security are prohibited,
and may result in criminal and civil liability. Examples of system or network
security violations include, without limitation, the following:
- Unauthorized access to or use of data, systems or networks, including any
attempt to probe, scan or test the vulnerability of a system or network or to
breach security or authentication measures without express authorization of
the owner of the system or network.
- Unauthorized monitoring of data or traffic on any network or system without
express authorization of the owner of the system or network.
- Interference with Service to any user, host or network including, without
limitation, electronic junk mailing, flooding, or deliberate attempts to overload
a system and broadcast attacks, forging of any TCP-IP packet header or any part
of the header information in an e-mail or a newsgroup posting.
Forged Headers and/or Addresses. Forging headers or messages means sending
e-mail so that its origin appears to be another user or machine, or a nonexistent
machine. It is also forgery to configure the reply to address of the e-mail without
the authorization and permission of the web site. These practices are prohibited.
Mailing List Subscriptions. List owners are encouraged to confirm all subscription
requests from the apparent subscriber before starting to send any list e-mail.
List owners must ensure that unsubscribe requests are handled from people who
were unaware that they had joined a mailing list. It is not acceptable to subscribe
people to a list merely because he or she has visited your web site or used one
of your products; the person must make an explicit request to be listed. However
some reports occur because people have genuinely forgotten that he or she has
made such a request. If you run a mailing list, FCS strongly suggests to keep
copies of administrative requests (web logs, or e-mails including headers) so
that you may demonstrate your subscription requests were genuine.
Misuse of System Resources. Customer shall not misuse system resources
including, but not limited to, employing posts or programs which consume excessive
CPU time or storage space; utilizing excessive bandwidth, excessive dial-in connection
time, permitting use of mail services, mail forwarding capabilities, POP accounts,
or auto-responders other than for the Customer's own account; resale of access
to CGI scripts installed on FCS's servers; or resale of FCS Internet access.
FCS reserves the right to interpret this Acceptable Use Policy in its sole
discretion and to amend, revise, add or delete any provision of this Acceptable
|Custom CGI Execution:
CGI execution is allowed.
||Custom executables are not accepted. Commonly,
these are file types suffixed by .exe and run as an application on the server.
These file types may also be suffixed by .bin if they have been converted using
a utility like 'exe2bin'.
|Custom DLL Registration:
FCS reserves the right to deny the registration of a DLL for any reason, likewise,
we also reserve the right to disable any DLLs at any time without cause. In the
event of a migration, the customer will be responsible for providing FCS information
regarding their registered DLL. The following procedures will be used to
qualify a DLL for registration. Failure to meet any of the below requirements
will disqualify the DLL; however, meeting these requirements does not indicate
an approval of the Custom DLL
If the customer has requested a third-party DLL to be registered the following
steps will be take
1. Customer submits a request to have the DLL reviewed
||Customer will provide DLL.
||Customer will provide vendor URL.
||Customer will provide information concerning the
DLL's licensing if applicable.
||Customer will provide working code (ASP, etc.)
that calls each method (routine) within the DLL.
FCS provides a reasonable time-line for confirmation or denial. Usually 7-10
||FCS researches Vendor.
||FCS determines if the DLL is licensed to run
||FCS determines if the DLL is fully compatible
our servers .
||FCS will register the DLL on a test server
as if it
were the on the customer's site.
||FCS will register the DLL within the customer's
memory space and user context.
||Ensures that the DLL has its own memory
space (the customer's) and that it does not
run as an administrator on the server
||We will not allow the DLL to run as a
SYSTEM process nor under any other user
context other than the customer's.
||FCS will use the provided code to run a test
the DLL for 72 hours.
2. Once the above steps have been performed, FCS will make the decision to allow
or deny the registration of the DLL.