Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Introduces AUP - Acceptable Use Policy #9

Open
wants to merge 5 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
9 changes: 7 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,9 @@
This repository tracks all versions of the Exoscale Terms and Conditions.
This repository tracks all versions of the Exoscale contractual documents such as:

* Terms and Conditions.
* End User Service Agreement
* Acceptable Use Policy

The goal is for customers and observers to facilitate and track changes
with full transparency.

Expand All @@ -7,6 +12,6 @@ The repository is structured as follow:
* Current version: [terms.markdown](terms.markdown)
* Previous version: [terms-previous.markdown](terms-previous.markdown)

An archive folder is also published to track older differences from the files.
The GIT versioning system makes it easier to track older differences from the files.

The terms and conditions are published under the [exoscale website](https://www.exoscale.com/terms/)
154 changes: 154 additions & 0 deletions aup-previous.markdown
Original file line number Diff line number Diff line change
@@ -0,0 +1,154 @@
**EXOSCALE ACCEPTABLE USE POLICY (EUSA) **

Applicable starting October 12th, 2020

[Previous version](https://github.com/exoscale/terms/blob/master/aup-previous.markdown)
[Compare](https://github.com/exoscale/terms/commits/master)

# 1. Introduction

This Acceptable Use Policy ("AUP") describes prohibited use of the
services provided by Akenes SA (hereafter "Exoscale") and activities
that are not allowed on the Exoscale Services. The examples in
this policy are not exhaustive. Exoscale may modify the AUP at any time
and inform it's clients accordingly. If you violate the AUP, authorize
or assist others to do so, Exoscale is entitled to suspend or terminate
your account on the Exoscale Services as described in the
Exoscale Terms and Conditions or Exoscale End User Service Agreement.

Capitalized terms used in this AUP and not otherwise defined herein shall have the meaning given in the Exoscale Terms and Conditions or Exoscale End User Service Agreement.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe put links to these documents here (or a reference if you want it to look "professional")?


# 2. No Illegal, Harmful or Offensive Use or Content

You may not use, or encourage, promote, facilitate or instruct others to
use, the Exoscale services or website for any illegal, harmful or
offensive use, or to transmit, store, display, distribute or otherwise
make available content that is illegal, harmful, or offensive.

Prohibited activities or content include but are not limited to:

- Illegal Activities. Any illegal activities, for example, including disseminating,

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

for example and including are the same thing.
I'd use for example, because you already used including but not limited to the sentence before.
Unless including refers to "child pornography", at which point you probably need a comma (or I'd shift it later in the line, so it's less confusing)

promoting or facilitating child pornography or otherwise
unlawfully exploits persons under 18 years of age.

- Harmful or Fraudulent Activities. Activities that may be harmful to others, our operations or
reputation, including offering or disseminating fraudulent goods,
services, schemes, or promotions (e.g., make-money-fast schemes,
ponzi and pyramid schemes, phishing, or pharming), or engaging in
other deceptive practices.

- Infringing Content. Content that infringes or misappropriates the intellectual property
or proprietary rights of others.

- Offensive Content. Content that is defamatory, obscene, abusive, invasive of privacy,
or otherwise objectionable, including content that constitutes
child pornography, relates to bestiality, or depicts
non-consensual sex acts.

- Harmful Content. Content or other computer technology that may damage, interfere
with, surreptitiously intercept, or expropriate any system,
program, or data, including viruses, Trojan horses, worms, time
bombs, or cancelbots.

- Violent Content. Publishing, transmitting or storing any content or links to any
content that is excessively violent, incites violence, threatens
violence, contains harassing content or hate speech, creates a
risk to a person\'s safety or health, or public safety or health,
compromises national security or interferes with an investigation
by law enforcement.

- Deceptive Content. Content that is unfair or deceptive under the consumer protection
laws of any jurisdiction.

# 3. No Security Violations

You may not use the Service to violate the security or integrity of any
network, computer or communications system, software application, or
network or computing device (each, a "System"). Prohibited activities
include:

- Unauthorized Access. Accessing or using any System without permission, including
attempting to probe, scan, or test the vulnerability of a System
or to breach any security or authentication measures used by a
System.

- Interception. Monitoring of data or traffic on a System without permission.

- Falsification of Origin. Forging TCP-IP packet headers, e-mail
headers, or any part of a message describing its origin or route.
This prohibition does not include the use of aliases or anonymous
remailers.

# 4. No Network Abuse

You may not make network connections to any users, hosts, or networks
unless you have permission to communicate with them. Prohibited
activities include:

- Monitoring or Crawling. Monitoring or crawling of a System that impairs or disrupts the
System being monitored or crawled.

- Denial of Service (DoS) - Distributed (DDOS) or not. Inundating a target with communications
requests so the target either cannot respond to legitimate
traffic or responds so slowly that it becomes ineffective.

- Covert Usage. Distributing software that covertly gathers or transmits information about a user.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nitpick: this item has no return after it :-)

- Unauthorized Access. Unauthorized access to or use of data, Systems or networks, including any attempt to probe, scan or test the vulnerability of a System or to breach security or authentication measures without express authorization of the owner of the System.

- Intentional Interference. Interfering with the proper functioning of any System, including any
deliberate attempt to overload a system by mail bombing, news
bombing, broadcast attacks, or flooding techniques.

- Operation of Certain Network Services. Operating network services like open proxies, open mail relays, or
open recursive domain name servers.

- Avoiding System Restrictions. Using manual or electronic means to avoid any use limitations placed
on a System, such as access and storage restrictions.

- Withholding Identity. Any activity intended to withhold or cloak identity or contact information, including the omission, deletion, forgery or misreporting of any transmission or identification information, such as return mailing and IP addresses.

- Spam. Any action which directly or indirectly results in any
of our IP space being listed on any abuse database (i.e. Spamhaus).

# 5. No Email or Other Message Abuse

You will not distribute, publish, send, or facilitate the sending of
unsolicited mass e-mail or other unsolicited messages, promotions,
advertising, or solicitations (like "spam"). You will not alter or
obscure mail headers or assume a sender's identity without the sender's
explicit permission. You will not collect replies to messages sent from
another internet service provider if those messages violate this Policy
or the acceptable use policy of that provider.

# 6. Email policy

You must comply with the laws and regulations applicable to bulk or
commercial email in your jurisdiction. In addition, you will comply with
the following restrictions.

- You must have a Privacy Policy posted for each domain associated with the mailing;
- You must have the means to track anonymous complaints; and
- You must not obscure the source of your e-mail in any manner.
- You must post an email address for complaints (such as [email protected]) in a conspicuous place on any website associated with the email, and you must promptly respond to messages sent to that address;
- Your intended recipients have given their consent to receive e-mail via some affirmative means, such as an opt-in procedure, and you can produce the evidence of such consent within 72 hours of receipt of a request by the recipient or Exoscale;
- You must use reasonable means to ensure that the person giving consent is the owner of the e-mail address for which the consent is given;
- You must include the recipient's e-mail address in the body of the message or in the "TO" line of the e-mail.
- You must honor revocations of consent and notify recipients of the same;

These policies apply to messages sent using the Service, or to messages sent from any System by you or any person on your behalf that directly or indirectly refer the recipient to a site hosted via the Service. In addition, you may not use a third party e-mail service that does not practice similar procedures for all its customers. These requirements apply to distribution lists created by third parties to the same extent as if you created the list.

# Third Party Conduct

You are responsible for violations of this AUP by anyone using your Service with your permission or on an unauthorized basis as a result of your failure to use reasonable security precautions. Your use of the Service to assist another person in an activity that would violate this AUP if performed by you is a violation of the AUP.

You must use reasonable efforts to secure any device or network within your control against being used in breach of the applicable laws against spam and unsolicited email, including where appropriate by the installation of antivirus software, firewall software and operating system and application software patches and updates. Our right to suspend or terminate your Service applies even if a breach is committed unintentionally or without your authorization, including through a Trojan horse or virus.

# Consequences of Violation of AUP

If you breach the AUP we may suspend or terminate your Service in accordance with the Agreement. We may intercept or block any content or traffic belonging to you or to users where the Service is being used unlawfully or not in accordance with this AUP.

No credit will be available under the Service Level Agreement for interruptions of service resulting from any AUP violation.

# Reporting of Violations of this AUP

If you become aware of any violation of this AUP, you will immediately notify us and provide us with assistance, as requested, to stop or remedy the violation. To report any violation of this AUP, please contact us at [email protected].
162 changes: 162 additions & 0 deletions aup.markdown
Original file line number Diff line number Diff line change
@@ -0,0 +1,162 @@
**EXOSCALE ACCEPTABLE USE POLICY (EUSA) **

Applicable starting October 12th, 2020

[Previous version](https://github.com/exoscale/terms/blob/master/aup-previous.markdown)
[Compare](https://github.com/exoscale/terms/commits/master)

## 1. Introduction

This Acceptable Use Policy ("AUP") describes prohibited use of the
services provided by Akenes SA (hereafter "Exoscale") and activities
that are not allowed on the Exoscale Services. The examples in
this policy are not exhaustive. Exoscale may modify the AUP at any time
and inform it's clients accordingly. If you violate the AUP, authorize
or assist others to do so, Exoscale is entitled to suspend or terminate
your account on the Exoscale Services as described in the
Exoscale Terms and Conditions or Exoscale End User Service Agreement.

Capitalized terms used in this AUP and not otherwise defined herein
shall have the meaning given in the Exoscale Terms and Conditions
or Exoscale End User Service Agreement.

## 2. No Illegal, Harmful or Offensive Use or Content

You may not use, or encourage, promote, facilitate or instruct others to
use, the Exoscale services or website for any illegal, harmful or
offensive use, or to transmit, store, display, distribute or otherwise
make available content that is illegal, harmful, or offensive.

Prohibited activities or content include but are not limited to:

- Illegal Activities. Any illegal activities, for example, including disseminating,
promoting or facilitating child pornography or otherwise
unlawfully exploits persons under 18 years of age.

- Harmful or Fraudulent Activities. Activities that may be harmful to others, our operations or
reputation, including offering or disseminating fraudulent goods,
services, schemes, or promotions (e.g., make-money-fast schemes,
ponzi and pyramid schemes, phishing, or pharming), or engaging in
other deceptive practices.

- Infringing Content. Content that infringes or misappropriates the intellectual property
or proprietary rights of others.

- Offensive Content. Content that is defamatory, obscene, abusive, invasive of privacy,
or otherwise objectionable, including content that constitutes
child pornography, relates to bestiality, or depicts
non-consensual sex acts.

- Harmful Content. Content or other computer technology that may damage, interfere
with, surreptitiously intercept, or expropriate any system,
program, or data, including viruses, Trojan horses, worms, time
bombs, or cancelbots.

- Violent Content. Publishing, transmitting or storing any content or links to any
content that is excessively violent, incites violence, threatens
violence, contains harassing content or hate speech, creates a
risk to a person\'s safety or health, or public safety or health,
compromises national security or interferes with an investigation
by law enforcement.

- Deceptive Content. Content that is unfair or deceptive under the consumer protection
laws of any jurisdiction.

## 3. No Security Violations

You may not use the Service to violate the security or integrity of any
network, computer or communications system, software application, or
network or computing device (each, a "System"). Prohibited activities
include:

- Unauthorized Access. Accessing or using any System without permission, including
attempting to probe, scan, or test the vulnerability of a System
or to breach any security or authentication measures used by a
System.

- Interception. Monitoring of data or traffic on a System without permission.

- Falsification of Origin. Forging TCP-IP packet headers, e-mail
headers, or any part of a message describing its origin or route.
This prohibition does not include the use of aliases or anonymous
remailers.

## 4. No Network Abuse

You may not make network connections to any users, hosts, or networks
unless you have permission to communicate with them. Prohibited
activities include:

- Monitoring or Crawling. Monitoring or crawling of a System that impairs or disrupts the
System being monitored or crawled.

- Denial of Service (DoS) - Distributed (DDOS) or not. Inundating a target with communications
requests so the target either cannot respond to legitimate
traffic or responds so slowly that it becomes ineffective.

- Covert Usage. Distributing software that covertly gathers or transmits information about a user.

- Unauthorized Access. Unauthorized access to or use of data, Systems or networks,
including any attempt to probe, scan or test the vulnerability of a System or
to breach security or authentication measures without express authorization of
the owner of the System.

- Intentional Interference. Interfering with the proper functioning of any System, including any
deliberate attempt to overload a system by mail bombing, news
bombing, broadcast attacks, or flooding techniques.

- Operation of Certain Network Services. Operating network services like open
proxies, open mail relays, or open recursive domain name servers.

- Avoiding System Restrictions. Using manual or electronic means to
avoid any use limitations placed on a System, such as access and storage restrictions.

- Withholding Identity. Any activity intended to withhold or cloak identity
or contact information, including the omission, deletion, forgery or misreporting
of any transmission or identification information, such as return mailing and IP addresses.

- Spam. Any action which directly or indirectly results in any
of our IP space being listed on any abuse database (i.e. Spamhaus).

## 5. No Email or Other Message Abuse

You will not distribute, publish, send, or facilitate the sending of
unsolicited mass e-mail or other unsolicited messages, promotions,
advertising, or solicitations (like "spam"). You will not alter or
obscure mail headers or assume a sender's identity without the sender's
explicit permission. You will not collect replies to messages sent from
another internet service provider if those messages violate this Policy
or the acceptable use policy of that provider.

## 6. Email policy

You must comply with the laws and regulations applicable to bulk or
commercial email in your jurisdiction. In addition, you will comply with
the following restrictions.

- You must have a Privacy Policy posted for each domain associated with the mailing;
- You must have the means to track anonymous complaints; and
- You must not obscure the source of your e-mail in any manner.
- You must post an email address for complaints (such as [email protected]) in a conspicuous place on any website associated with the email, and you must promptly respond to messages sent to that address;
- Your intended recipients have given their consent to receive e-mail via some affirmative means, such as an opt-in procedure, and you can produce the evidence of such consent within 72 hours of receipt of a request by the recipient or Exoscale;
- You must use reasonable means to ensure that the person giving consent is the owner of the e-mail address for which the consent is given;
- You must include the recipient's e-mail address in the body of the message or in the "TO" line of the e-mail.
- You must honor revocations of consent and notify recipients of the same;

These policies apply to messages sent using the Service, or to messages sent from any System by you or any person on your behalf that directly or indirectly refer the recipient to a site hosted via the Service. In addition, you may not use a third party e-mail service that does not practice similar procedures for all its customers. These requirements apply to distribution lists created by third parties to the same extent as if you created the list.

## 7. Third Party Conduct

You are responsible for violations of this AUP by anyone using your Service with your permission or on an unauthorized basis as a result of your failure to use reasonable security precautions. Your use of the Service to assist another person in an activity that would violate this AUP if performed by you is a violation of the AUP.

You must use reasonable efforts to secure any device or network within your control against being used in breach of the applicable laws against spam and unsolicited email, including where appropriate by the installation of antivirus software, firewall software and operating system and application software patches and updates. Our right to suspend or terminate your Service applies even if a breach is committed unintentionally or without your authorization, including through a Trojan horse or virus.

## 8. Consequences of Violation of AUP

If you breach the AUP we may suspend or terminate your Service in accordance with the Agreement. We may intercept or block any content or traffic belonging to you or to users where the Service is being used unlawfully or not in accordance with this AUP.

No credit will be available under the Service Level Agreement for interruptions of service resulting from any AUP violation.

## 8. Reporting of Violations of this AUP

If you become aware of any violation of this AUP, you will immediately notify us and provide us with assistance, as requested, to stop or remedy the violation. To report any violation of this AUP, please contact us at [email protected].
3 changes: 2 additions & 1 deletion eusa.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -12,8 +12,9 @@ SLA, and all documents referenced within those documents (together, the
provisions your Subscription.

Applicable starting January 16th, 2019

[Previous version](https://github.com/exoscale/terms/blob/master/eusa-previous.markdown)
[Compare](https://github.com/exoscale/terms/commits/master)
[Compare](https://github.com/exoscale/terms/commits/master/eusa.markdown)

## 1. Definitions

Expand Down
Loading