The following constitute violations of ISP’s AUP:
(A) Using the Service to gain unauthorized access to any computer systems.
(B) Using the Service to transmit any material (by email, uploading, posting, or otherwise) that, intentionally or unintentionally, violates any applicable local, state, national or international law, or any rules or regulations promulgated thereunder.
(C) Using the Service to interfere with access to the Internet by other parties or disrupt the network used by ISP.
(D) Using the Service to harm, harass, degrade, or intimidate an individual or group of individuals on the basis of religion, gender, race, ethnicity, age, or disability.
(E) Using the Service to transmit any material (by email, uploading, posting, or otherwise) that threatens or encourages bodily harm or destruction of property.
(F) Using the Service to harass, threaten, embarrass or cause distress, unwanted attention or discomfort upon another.
(G) Using the Service to make fraudulent offers to sell or buy products, items, or services or to advance any type of financial scam such as “pyramid schemes,” “ponzi schemes,” and “chain letters.”
(H) Adding, removing or modifying identifying network header information in an effort to deceive or mislead.
(I) Using the Service to transmit any unsolicited bulk email or bulk commercial email (even if opt-in) is prohibited. Activities that have the effect of facilitating unsolicited bulk email or bulk commercial email, whether or not that email is commercial in nature, is prohibited.
(J) Using the Service to access, or to attempt to access, the accounts of others, or to penetrate, or attempt to penetrate, security measures of ISP or another entity’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in the corruption or loss of data.
(K) Using the Service to transmit any material (by email, uploading, posting, or otherwise) that infringes any copyright, trademark, patent, trade secret, or other proprietary rights of any third party, including, but not limited to, the unauthorized copying of copyrighted material, the digitization and distribution of photographs from magazines, books, or other copyrighted sources, and the unauthorized transmittal of copyrighted software.
(L) Using the Service to collect, or attempt to collect, personal information about third parties without their knowledge or consent.
(M) Using the Service to harm minors in anyway.
(N) Reselling the Service without ISP’s authorization.