ACCEPTABLE USE POLICY
1. General. This Acceptable Use Policy sets forth guidelines for the acceptable use of K² Cloud Engineering Limted' network. All Subscribers to K² Cloud Engineering Limted' services are required to comply with this policy.
2. Illegal Use. The K² Cloud Engineering Limted network may only be used for lawful purposes. Transmission, distribution or storage of any material in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property right used without proper authorization, and material that is libelous, defamatory, constitutes an illegal threat, violates export control laws or regulations or encourages conduct that would constitute a criminal offense or give rise to civil liability.
3. System and Network Security. Violations of system or network security are prohibited. Examples of system or network security violations include, without limitation:
a. Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network
b. Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network
c. Interference with service provided to any user, host or network including, without limitation, mailbombing, flooding, computer worms or viruses, deliberate attempts to overload a system and broadcast attacks and
d. Forging of any tcp-ip packet header or any part of the header information.
4. Abuse. The following acts are considered to be abusive of the K² Cloud Engineering Limted network and are prohibited:
a. Any conduct which violates the accepted norms and expectations of the Internet community at large including, without limitation, posting or distributing information or materials which are abusive or threatening. K² Cloud Engineering Limted reserves the right determine, in its sole discretion, whether any particular conduct violates such norms and expectations
b. Resale of any K² Cloud Engineering Limted services or products unless expressly authorized in writing by K² Cloud Engineering Limted
c. Falsifying Subscriber information in applications, contracts and other materials provided to K² Cloud Engineering Limted including fraudulent use of credit card numbers or "bill to" numbers
d. Falsifying identity or contact information to circumvent this Acceptable Use Policy or otherwise
e. Forging of message headers or a sender's identity, or taking any similar action with the intent of bypassing restrictions or limits on access to a specific service or site
f. Creating, forwarding, posting or distributing chain messages of any type (also known as "pyramid" or "ponzi" schemes) and
g. Attempting to circumvent or alter the processes or procedures to measure time, bandwidth utilization or other methods to document use of K² Cloud Engineering Limted services.
5. E-mail. K² Cloud Engineering Limted prohibits Subscribers from engaging the following e-mail related activities:
a. Sending unsolicited bulk e-mail ("UBE", or "SPAM"). This includes but is not limited to the distribution of UBE for commercial, informational, advertising, political, or religious purposes
b. Setting up "mailback" or "drop box" addresses in order to receive responses from UBE, either directly by the Subscriber or by a third party on behalf of the Subscriber and
c. Engaging in any of the foregoing activities by using the service of another provider, but channeling such activities through a K² Cloud Engineering Limted account, remailer, or otherwise through a K² Cloud Engineering Limted service or using a K² Cloud Engineering Limted account as a maildrop for responses or otherwise using the services of another provider for the purpose of facilitating the foregoing activities if such use of another party's service could reasonably be expected to adversely affect a K² Cloud Engineering Limted service.
d. Running a mail server with open relay, i.e. which allows the unchallenged forwarding of e-mail. K² Cloud Engineering Limted reserves the right to implement technical mechanisms which block UBE before it is forwarded or otherwise sent to its intended recipients.
6. Compromised Servers or Network Equipment. K² Cloud Engineering Limted prohibits the continued operation of servers that have been compromised by third parties or automated agents.
7. World Wide Web. K² Cloud Engineering Limted prohibits Subscribers from engaging in any of the following web-related activities:
a. Exploiting or attempting to exploit any scripts presented on a web page
b. Utilizing programs, scripts or commands to abuse a web site, e.g. by using bandwidth excessively and
c. Hosting a web page which acts maliciously against users that visit that page.
8. Indirect Violations. INDIRECT OR ATTEMPTED VIOLATIONS OF THE POLICY, AND ACTUAL OR ATTEMPTED VIOLATIONS BY A THIRD PARTY ON BEHALF OF A SUBSCRIBER OR A SUBSCRIBER'S END USER SHALL BE CONSIDERED VIOLATIONS OF THE POLICY BY SUCH SUBSCRIBER OR END USER.
9. Reporting. Subscribers to K² Cloud Engineering Limted' services are required to immediately report to K² Cloud Engineering Limted (i) any event or issue which could compromise the stability, service or security of the K² Cloud Engineering Limted network and (ii) any known violation of this Acceptable Use Policy.
10. Consequences of Non-Compliance. Violation of this Acceptable Use Policy is strictly prohibited. In the event of any actual or potential violation, K² Cloud Engineering Limted reserves the right to (i) suspend or terminate, either temporarily or permanently, any or all services provided by K² Cloud Engineering Limted to Subscriber, (ii) block and/or filter any abusive activity or (iii) take any other actions as deemed appropriate by K² Cloud Engineering Limted in its sole discretion. Nothing contained in this policy shall be construed to limit K² Cloud Engineering Limted' actions or remedies in any way with respect to any violation of this Acceptable Use Policy. Subscribers who violate this Acceptable Use Policy may incur criminal or civil liability. K² Cloud Engineering Limted may refer violators to civil or criminal authorities for prosecution and will cooperate fully with applicable government authorities.
11. Changes to Policy. K² Cloud Engineering Limted reserves the right to modify this Acceptable Use Policy at any time without notice. A current version of the policy is posted on K² Cloud Engineering Limted' web site at
12. Complaints/Questions. Complaints or questions regarding this Acceptable Use Policy should be sent to email@example.com.