Acceptable Use Policy

This Acceptable Use Policy ("AUP") as amended from time to time applies as follows: Customers agree to comply with this AUP. Customer acknowledges and agrees that it is responsible for continual compliance with this policy, in order to ensure the integrity, security and reliability of the Email Hosting Services, and its networks, systems, facilities and data. A breach of the AUP by Reseller Account will be deemed to be a breach by the Reseller.


In this AUP the following terms will be used and have the subsequent definitions assigned to them:

Sending Spam

No Customer may send, or attempt to send, unsolicited email messages ("Spam"). Spam is not only annoying to Internet users; it violates federal and state laws and seriously affects the efficiency and cost-effectiveness of the Email Hosting Services and Email Marketing Services. Sending Spam can lead to industry blacklisting of Customer's business and mail servers, resulting in interruption and/or termination of Customer's Email Hosting Services.

Specifically, Customer shall not:

1.     Send, or attempt to send, Spam of any kind from the Network;

2.     Send, or attempt to send, Spam of any kind from third-party networks using a return email address that is hosted on the Network, or referencing an email address hosted on the Network;

3.     Send email messages which result in complaints from the recipient or from the recipient's email provider, or which result in blacklisting of the sender's email address or mail server;

4.     Send email messages which are excessive and/or intended to harass or annoy others;

5.     Continue to send email to a recipient that has indicated that he/she does not wish to receive it;

6.     Take any actions intended to cloak the Customer's identity or contact information, including but not limited to intentionally omitting, deleting, forging or misrepresenting message headers or return addresses; or

7.     Take any other action that results in blacklisting of the sender's email address or mail server, or negatively impacts other Customers who use the Email Hosting Services.

In the absence of positive, verifiable proof to the contrary by a Customer, will consider complaints by recipients of emails to be conclusive that the recipient did not subscribe or otherwise request the email(s) about which a complaint was generated.


Customer is prohibited from violating, or attempting to violate, the security of Network. Any violations may result in criminal and civil liabilities to the Customer. will investigate any alleged violations and will cooperate with law enforcement agencies if a criminal violation is suspected. Examples of violations of the security of the Network include, but are not limited to: (i) accessing data not intended for Customer, (ii) logging into a server or account which the Customer is not authorized to access, (iii) attempting to probe, scan or test the vulnerability of a system, (iv) breach of security or authentication measures, (v) attempting to interfere with service to any User, host or network, or (vi) taking any action in order to obtain services to which the Customer is not entitled.

Illegal Use

The Email Hosting Services may only be used for lawful purposes. For example, Customer may not use the Network to create, transmit, distribute, or store content that: (i) violates a trademark, copyright, trade secret or other intellectual property rights of others, (ii) violates export control laws or regulations, (iii) violates the privacy, publicity or other personal rights of others, (iv) impairs the privacy of communications, (v) contains obscene, offensive, unlawful, defamatory, harassing, abusive, fraudulent, or otherwise objectionable content as reasonably determined by, (vi) encourages conduct that would constitute a criminal offense or give rise to civil liability, (vii) constitutes deceptive online marketing, (viii) violates reasonable regulations of, (ix) causes technical disturbances to the Network, its affiliated networks, or the network used by Customer to access the Email Hosting Services or violate the policies of such networks, including, but not limited to, intentional introduction of any viruses, Trojan horses, worms, time bombs, cancel bots or other computer programming routines that are intended to damage, detrimentally interfere with, surreptitiously intercept or expropriate any system or data, or (x) assists, encourages or permits any persons in engaging in any of the activities described in this section. If Customer becomes aware of any such activities, Customer is obligated to immediately notify and take all other appropriate actions to cause such activities to cease.


Customer is responsible for all content that is transmitted, received and stored by through Customer's use of the Email Hosting Services and Email Marketing Services. takes no responsibility for content passing through or stored on the Network, including but not limited to, viruses, mail floods or other disabling features, or content provided on third party websites that are linked to by content passing through or stored on the Network. does not adopt, nor warrant the accuracy of, the content of any linked website and undertakes no responsibility to update the content. Use of any information obtained via the Network is at Customer's own risk.

Consequences of Unacceptable Use reserves the right to suspend or terminate Customer's access to the Email Hosting Services upon notice of a violation of this policy. Indirect or attempted violations of this policy, and actual or attempted violations by a third party on behalf of Customer, shall be considered violations of this policy by Customer.

Potential Materials

Customer agrees that it shall not violate any copyright or trademark right of or other intellectual property right of with respect to any material provided to Customer by, including any promotional or marketing material.

Administration of Policy

Customer understands that the administration of this policy requires the exercise of discretion and judgment by agrees to exercise good faith in its administration of this policy and in making determinations under the policy. However, Customer agrees that any and all determinations by in connection with the administration and enforcement of this policy shall be final and binding.

Requirements for Using Email Hosting Services

The following requirements apply only for Customer's use of the Email Hosting Services.

1.     Sending Bulk Mail: Customers may not use the Email Hosting Services to send "Opt-in" Bulk Email. defines "Opt-in" Bulk Email ("Bulk Email") as email messages of similar content that are sent to more than 250 recipients within a relatively short period of time. The term .Opt-in. means that the recipients have signed up to receive the emails voluntarily, and implies that the Bulk Email is not Spam. This restriction does not apply when sending mail to Customer's mailboxes hosted on the Network. has measures in place to prevent Bulk Email from being sent through its servers, and any attempt to do so may not be delivered and may result in interruption and/or termination of Customer's Email Hosting Services. Attempts to circumvent this Bulk Email restriction by breaking up bulk mailings over a period of time or by sending from multiple email accounts will itself be considered a violation of this policy.

2.     Receiving Bulk Email: Customer may not use the Email Hosting Services for the purpose of receiving Bulk Email. Submitting any email address that is hosted on the Network to Bulk Mail organizations such as Safelists, FFAs and spam databases is expressly prohibited. Customer shall permit to block Bulk Mail from such organizations.

3.     Bounces: The Network is not set up to process bounce messages for Bulk Email. Therefore, a Customer may not send Bulk Email from third-party networks using a return address that is hosted on the Network, unless it assures that not more than 100 bounce emails will arrive to the Network as the result of sending Bulk Email from a third-party network.

4.     Shared Mailboxes: Mailboxes are intended for single-user use, by a natural person. Attempting to log into a single mailbox simultaneously from more than one computer, or using automated tools such as Fetchmail or Microsoft Exchange Connector to virtualize one mailbox into multiple mailboxes is expressly prohibited.

5.     Automated Use: Mailboxes are not intended for automated use such as sending emails from web servers, or receiving emails by automated programs. Such use is permitted provided Customer does not violate any conditions of this AUP; however does not provide technical support for this type of use.