TERMS OF NETWORK SERVICE |
You agree to comply with the underwritten rules is an obligatory condition to provide you with the Internet access by Lucky.Net?. Please carefully read these rules and avoid their violation.
"User" is any person (natural or legal), who has a valid contract with Lucky.Net? , and using its services.
In case of violation of these rules Lucky.Net? Company reserves the right to decide to limit or terminate the access to the Internet for a login, whose user has violated the rules.
(given provisions are consistent with the norms of the document ofisp-005 (http://www.ofisp.org) with some additions)
The Internet is a global association of computer networks and information resources that belong to different people and organizations. This association is decentralized, and there is no universally obligatory set of rules (laws) of using the Internet. There are, however, generally accepted standards of the Internet,aimed to avoid the disturbing of the activities of one user to the work of other users. The fundamental position of these rules is that rules of use of Internet resources (from the mailbox to the communication channel) determine the owners of these resources, and only they.
These rules describe the generally accepted norms of the Internet, the observance of which is a must for all users. The effect of these rules extends to the use of network resources (hereafter the word Network means Internet and accessible other networks from it).
1. Restrictions on dissemination of unreclaimed information (spam)
Network development has led to one of the main problems of information overload. Therefore, a network community has developed special rules designed to guard users from unwanted / unsolicited information (spam).
In particular, it is invalid:
- Mass mailing of the e-mails (here and below e-mails mean e-mails, ICQ, and other similar means of information exchange) without prior consent (mass mailing). Mass distribution is a distribution to multiplerecipients and multiple distribution to one recipient..
In this and following paragraphs mailing is considered to be concerted if the recipient has expressed a clear unequivocal consent to receive this type of information, the recipient is authenticated in terms of this consent, conditions, which were complied with terms by this agreement (the restriction on the frequency, volume, style,vocabulary, and so applied ) and later there was no expression of his unwillingness to receive such information.
Particularly, the next typical violations do not give a reason to consider the mailing as concerted:
- Mailing to the address, located in the network resources (on the WWW-pages, in Usenet letters and so on) and not accompanied by explicit permission to send him information of this nature.
- Mailing, which is not complied with restrictions, specified in the permit for information;
- Mailing to the address entered in WWW-form, specified in the e-mail or otherwise, and not confirmed by the preliminary inquiry of the address owner to such information.
- Unterminated sending of e-mails longer than one page or containing attachments.
- Unterminated sending of e-mails longer than one page or containing attachments of advertising, commercial or agitation character, as well as letters containing crude and abusive expressions.
- Placing in any conference (hereinafter the conference stands for teleconference (newsgroup), Usenet and other conferences, forums and electronic mailing lists) articles which are not relevant to the theme of this conference or mailing list (off-topic).
- Placing in any conference massages of publicity, commercial or agitation character, exept for the cases when such reports are obviously settled the rules of this conference or their placing was concerted with proprietors or administrators of this conference preliminary.
- Placing in any conference massages, which contain attachments, except as they are expressly permitted by the rules of this conference or such placinghas been agreed with the owners or administrators of of this conference previously.
- Mailing of information to recipients, previously expressed unwillingness to receive such information.
- Using own or provided information resources (mailboxes, email addresses, WWW pages, etc.), as contact when committing any of the above actions, regardless of what point of the web these activities were performed.
2. The prohibition on distribution of certain information types
It is prohibited to place the information on the network resources and to transfer it on the web, distribution, disclosure or use of which is prohibited or restricted bynational legislation or international agreements in force.
3. Prohibition of unauthorized access and network attacks
It is not allowed to exercise unauthorized access to network resources, conducting or participating in network attacks and network hacking, unless the attack on the a network resource is held with the expresspermission of the owner or administrator of the resource. It is also prohibited:
- Actions aimed at the disruption of the normal operation of the Network elements (computers, other equipment or software) that do not belong to the user.
- Actions aimed at gaining unauthorized access, includingprivileged, to network resources (computer, other equipment orinformation resource), and subsequent use of such access, destruction or modification of software or data that do not belong to the user, without agreement with the owners or administrators of the software or information resource.
- Sending to computers or other equipment of the Network meaningless or useless information, which creates parasitic load on this equipment and (or) the intermediate parts of the network, in amounts exceeding the minimum necessary to verify the network connectivity and the availability of its individual elements.
4. Compliance with the rules established by the owners of Internet resources
Apart from the foregoing, the owner of any information or technicalresource in the Network can set its own rules of using it.
Terms of resources using or link to them are published by the owners or administrators of these resources at the connection point to such resources and are binding upon all users of these resources.
User is under an obligation to observe the rules of the resource using or stop using it immediately.
5. Inadmissibility of falsification
Significant part of the Network resources does not require user authentication and allows anonymous use. However, in some cases,the user is required to provide information that identifies him and used access facilities to the web. At the same time the user is prohibited:
- Using the identification data (names, addresses, phone numbers, etc.), of the third parties, unless those persons who have authorized by such use. At the same time, the user must take measures to prevent the use of resources by third parties on his behalf (to ensure the safety of passwords and other codes of authorized access).
- Falsification of own IP-address, as well as the addresses which are used in other network protocols, for data transmission through the network.
- Use non-existent return address when sending e-mails, andsending letters on behalf of the email robots and e-mail systems, except for the notification about the message delivery.
6. Configuration of own resources
When using the Internet user becomes its rightful member, which creates the potential for the use of network resources owned by the userby third parties. Therefore the user must take appropriate action on setting up his resources, which would prevent the unfairuse of these resources by third parties, as well as to respond when detecting cases of such use.
Examples of potentially problematic set of network resources are:
- An open relay e-mail (SMTP-relay);
- Public servers of news for unauthorized publication (conferences, group);
- Means that allow the third parties to conceal the source of the connection unauthorized (open proxy servers, etc.);
- Public broadcast addresses of the local networks;
- Electronic mailing lists with insufficient authorization of subscription or without the possibility of its cancellation.