A-M-I-Ltd is dedicated to the use of the Internet and mobile phones to improve the lives of individuals throughout the world.
Our goal is to deliver enterprise quality on-demand Internet Marketing Services and Products to all of our Customers at a reasonable price and make available the benefits of the Internet as broadly as possible.
A-M-I-Ltd is committed to encouraging the use of the Internet and mobile phones through its Services and Third Party Services, but such use must be consistent with the laws and regulations governing use of the Internet and mobiles and must protect the right of its other customers to use its Services.
The AUP is designed to achieve these goals.
Customer agrees to comply with the AUP and is responsible for the use of the Services and Third Party Services by all entities and individuals whom Customer permits to use the Services, Third Party Services or the Customer Offering. In addition to its rights under Section 19.1 of the Terms of Service, A-M-I-Ltd has the right to change or modify the terms of the AUP at any time, effective when posted to the Customer Portal. Customer’s use of the Services or Third Party Services after changes to the AUP are posted shall constitute acceptance of any changed or additional terms.
The Public Network of A-M-I-Ltd provides public Internet and Mobile access to Customer servers and data storage services on A-M-I-Ltd’s network. All Customers are granted equal access to the Public Network.
The Private Network of A-M-I-Ltd provides Customer with secure private network connectivity from Customer’s private backend network directly to Customer servers and data storage devices on A-M-I-Ltde’s internal network and to other Services. Customer may use the Private Network to upload/download content, administer Customer servers and data storage devices, transmit information between Customer servers and data storage devices, transmit information between Customer’s private backend servers and Customer servers and data storage devices provided by A-M-I-Ltd, administer the Customer Content, retrieve data, access server consoles, and otherwise manage the Customer Content.
The following list provides a number of general prohibited uses of the Services and/or Third Party Services that are violations of this AUP. Please note that the following list does not represent a comprehensive or complete list of all prohibited uses.
Unlawful Activities. The Services and/or Third Party Services shall not be used in violation of any criminal, civil or administrative violation of any applicable local, state, provincial, federal, national or international law, treaty, court order, ordinance, regulation or administrative rule. This includes, but is not limited to:
- Unlawful gambling activities
- Threats, harassment and abuse of any individual, organization or business
- Fraudulent activities
- Terrorist websites or other sites advocating human violence and hate crimes based upon religion, ethnicity or country of origin
- Unlawful high yield investment plans, Ponzi schemes or linking to and or advertising such schemes
- Child Pornography: In particular, the Services and/or Third Party Services shall not be used to publish, submit, receive, upload, download, post, use, copy or otherwise produce, transmit, distribute or store child pornography.
- Unsolicited Email: The use of the Services and/or Third Party Services to send or receive mass unsolicited email (“SPAM”). This prohibition includes the direct sending and receiving of such messages, support of such messages via web page, splash page or other related sites, or the advertisement of such services. The falsifying of packet header, sender, or user information whether in whole or in part to mask the identity of the sender, originator or point of origin or knowingly deleting any author attributions, legal notices or proprietary designations or labels in a file that the Customer mails or sends.
- Email Bombing: The sending, return, bouncing or forwarding of email to specified user(s) in an attempt to interfere with or overflow email services.
- Proxy Email: The use of the Services and/or Third Party Services as a proxy email server to forward email to unrelated Third Parties.
- UseNet SPAM: The use of Services to send, receive, forward, or post UseNet unsolicited email or posts. This includes UseNet services located within the 1Mobil-e network or unrelated networks of Third Parties.
- Hacking: The use of the Services and/or Third Party Services or hacking, attacking, gaining access to, breaching, circumventing or testing the vulnerability of the user authentication or security of any host, network, server, personal computer, network access and control devices, software or data without express authorization of the owner of the system or network.
- Threatening Material or Content: The Services and/or Third Party Services shall not be used to host, post, transmit, or retransmit any content or material that harasses, or threatens the health or safety of others. In addition, A-M-I-Ltd reserves the right to decline to provide Services and/or Third Party Services if the content is determined by A-M-I-Ltd to be obscene, indecent, hateful, malicious, racist, defamatory, fraudulent, libelous, treasonous, excessively violent or promoting the use of violence or otherwise harmful to others.
- Violation of Intellectual Property Rights: The Services and/or Third Party Services shall not be used to publish, submit/receive, upload/download, post, use, copy or otherwise reproduce, transmit, retransmit, distribute or store any content/material or to engage in any activity that infringes, misappropriates or otherwise violates the intellectual property rights or privacy or publicity rights of 1Mobil-e or any other party, including but not limited to any rights protected by any copyright, patent, trademark laws, trade secret, trade dress, right of privacy, right of publicity, moral rights or other intellectual property right now known or later recognized by statute, judicial decision or regulation. Please refer to http://www.a-m-i-ltd.com/legal to file complaints or counter notifications related to copyright or trademark claims.
- Distribution of Malware: The storage, distribution, fabrication, or use of malware, including without limitation, virus software, root kits, password crackers, adware, key stroke capture programs and other programs normally used in malicious activity is prohibited. The use of such programs in the normal ordinary course of business, however, may be requested by Customer and approved by 1Mobil-e on a case by case basis. Example: Security company using the Services to analyze the latest root kit for new security analysis/software.
- Phishing: Any activity designed to collect personal information (name, account numbers, usernames, passwords, etc.) under false pretense. Splash pages, phishing forms, email distribution, proxy email or any activity related to phishing activities may result in the immediate suspension of Customer’s account.
- Violation of Agreements relating for Third Party Services. Any activity which violates any TPS Agreements.
- Denial of Service. Any activity to implement or assist in the implementation of denial of service attack. A-M-I-Ltd absolutely prohibits the use of Services for the origination, propagation or control of denial of service attacks (“DoS”) or distributed denial of service attacks (“DDoS”). Customers may not utilize the Services to perform DoS or DDoS mitigation activities (such as service proxying or data scrubbing) which may result in attracting inbound denial of service attacks toward the Services. Any relation to DoS or DDoS type activity is a direct violation of A-M-I-Ltd’s AUP.
Reporting Violation of the Acceptable Use Policy
A-M-I-Ltd accepts reports of alleged violations of this AUP via email sent to email@example.com. Reports of alleged violations must be verified and must include the name and contact information of the complaining party, and the IP address or website allegedly in violation, and a description of the alleged violation. Unless otherwise required by law, such as the DMCA, A-M-I-Ltd owes no duty to Third Parties reporting alleged violations. A-M-I-Ltd will review all verified Third Party reports and will take such actions as it deems appropriate in its sole discretion.
A-M-I-Ltd will comply with and respond to valid (as A-M-I-Ltd determines in its sole discretion) subpoenas, warrants, and/or court orders. If permitted by applicable law or regulation, A-M-I-Ltd will forward such subpoenas, warrants, and/or orders to Customer and Customer may respond; however, A-M-I-Ltd reserves the right to respond to any such subpoena, warrant and/or order if it is the named party in such subpoena, warrant, and/or order.
Methods of Resolution for Violations of A-M-I-Ltd’s Acceptable Use Policy
The goal of our Methods of Resolution is to mitigate service interruptions while resolving potential violations under this AUP. Our sales, support and abuse staffs are dedicated to working with the Customer in resolving potential violations, and are available via phone, ticket, or email. The Methods of Resolution below is provided for informational purposes only and forms the framework and guidance with respect to resolving potential violations, but in the event of any conflicts between the Acceptable Use Policy (in particular its enforcement) and Terms of Services, the Terms of Services shall control. Timing for resolution differs according to the degree of the violation, the nature of the violation, involvement of law enforcement, involvement of third party litigation, or other related factors.
Step 1: First alleged violation of AUP: a ticket will be generated under A-M-I-Ltd to provide the Customer’s master user with information regarding the potential violation of A-M-I-Ltd’s AUP. This is often a fact-finding email requiring further information or notifying Customer of the potential violation and the required actions to resolve the issue.
Step 2: Acknowledgement of violation of AUP: a ticket is generated under the Customer’s master user account with information specific to the violation. This ticket will also include any additional facts about the situation and will notify Customer of the action required to resolve the violation.
Step 3: Violation of AUP disregarded, not properly addressed, or continuing violation if a ticket has been disregarded, not properly addressed, or resolved by the Customer for a specified period of time: A-M-I-Ltd engineers will turn the public network port to the specified dedicated services off. Access to the dedicated services may then be achieved through the secure private service network for Customer resolution. As soon as the violation is addressed, the public access shall be restored and service will continue as normal.
Step 4: Failure to address violation and resolve violation: if Customer fails to address the violation AND fails to resolve the violation, a suspension of services shall occur. This is a last resort for 1Mobil-e and only results when the Customer completely fails to participate in A-M-I-Ltd’s resolution process. A permanent suspension of services includes reclamation of all dedicated services and the destruction of Customer’s data.
Advanced Marketing on the Internet Ltd
London EC2M 4QP UK
Tel. UK: 020 3318 3200