top of page

ACCEPTABLE USE POLICY

The Acceptable Use Policy sets forth the principles, rules, and regulations that govern the use by the Customer of Seneca BizTek networks, systems, services, and products. This Acceptable Use Policy has been established to promote the integrity, security, reliability, and privacy of Seneca BizTek networks, systems, and Customer data contained within.

When using Seneca BizTek networks, systems, products, and services the Customer is prohibited from engaging in certain activities that include, but are not limited to, those described below. Such prohibited activities may, at the sole discretion of Seneca BizTek , be grounds for termination of Agreement with a Customer, for the application of additional service charges or for the involvement of law enforcement agencies. Seneca BizTek reserves the right to remove any content or restrict the use of the Services for activities or content that in Seneca BizTek ’ reasonable judgment, violate the terms or conditions under which Seneca BizTek provides the Services or violate this Policy.

Indirect or attempted violations of the policy, and actual or attempted violations by a third party on behalf of a Seneca BizTek Customer or a Customer’s end user, shall be considered violations of the policy by such Customer.

Seneca BizTek reserves the right to change the Policy by delivering notice of its decision to change the Policy to the Customer at least 15 days prior to the changes taking effect. If you have any questions about this Policy, please contact Seneca BizTek at email@senecabiztek.com

Prohibited Uses of Seneca BizTek Services and Products

This section of the Acceptable Use Policy identifies the uses and actions that Seneca BizTek considers in its reasonable judgment to be unacceptable and/or abusive, and thus, is strictly prohibited. The Customer may only use Seneca BizTek networks, systems, services and products in a manner that, in Seneca BizTek sole judgment, is consistent with the purposes of such networks, systems, services and products. The following examples of prohibited uses and actions are non exclusive and are provided for general guidance only.

  • To violate any law of any applicable jurisdiction, including, without limitation, laws governing advertising, alcohol, antitrust, child protection, drugs, encryption, exportation, food, financial services, firearms, telecommunications and tobacco;

  • Communication of libelous, defamatory, scandalous, threatening, harassing, or private information without the permission of the person(s) involved, or posting content that is likely to cause emotional distress, whether through content, frequency, or size;

  • To engage in or to facilitate gambling activities;

  • To post, send, or receive any content that is obscene, pornographic, lewd, lascivious, or excessively violent;

  • To offer, solicit, sell, buy, rent, or license any goods, products, services, or information in, from, or to any location in which such activity is unlawful;

  • To advocate, promote, or otherwise encourage violence against any government, organization, group, individual or property, or to provide instruction, information, or assistance in causing or carrying out such violence;

  • To post, send, receive, display, distribute, or execute any content, including, without limitation, text, graphics, images, music, recordings, computer programs, links, frames, and “meta tags,” that violates any copyright, right of publicity, patent, trademark, service mark, trade name, mask work, trade secret or other intellectual property right of others;

  • To delete or alter author attributions, copyright notices, or trademark notices, unless expressly permitted in writing by the owner;

  • To violate the terms of applicable software licensing agreements;

  • To obtain or attempt to obtain unauthorized access, such as attempting to circumvent or circumventing any authentication or other security feature of any system, network, or account. This includes accessing data not intended for the user, logging into a server or account the user is not authorized to access, or probing the security of any system, network, or account;

  • To interfere or attempt to interfere with service to any user, host, or network by use of any program, script, command, or otherwise. This includes “denial of service” attacks, “flooding” of networks, deliberate attempts to overload a service or to burden excessively a service’s resources, and attempts to “crash” a host;

  • To introduce worms, harmful code and/or Trojan horses;

  • To attempt to circumvent the approval process for posting to a moderated newsgroup or bulletin board or to attempt to evade spam filters;

  • To cancel or supersede posts other than your own, with the exception of official newsgroup or bulletin board moderators performing their duties;

  • To send or post unsolicited messages or e-mail, whether commercial or not, a) to any recipients who have requested that messages not be sent to them, or b) to a large number of recipients, including users, newsgroups, or bulletin boards, at one time;

  • To send or post a message whose subject or content is unrelated to the subject matter of the newsgroup or bulletin board to which it is posted;

  • To send or post a message or e-mail with deceptive, absent, or forged header or sender identification information;

  • To propagate chain letters and pyramid schemes, whether or not the recipient wishes to receive such mailings;

  • To use Internet Relay Chat “bots”;

  • To hold Seneca BizTek , its affiliates, officers, employees and/or shareholders up to public scorn or ridicule

Need more details? Contact us

We are here to assist. Contact us by phone or email.

bottom of page