J P S T R E A M

Welcome

Acceptable Usage Policy - Terms of Service

By using JPstream a BitCap Holding Network. (hereinafter JPstream) web hosting services, you agree to comply with our policies. You are expected to use the Internet with respect, courtesy, and responsibility, giving due regard to the rights of other Internet users. We expect you to have a basic knowledge of how the Internet functions, the types of uses which are generally acceptable, and the types of uses which are to be avoided. Common sense is the best guide as to what is considered acceptable use. The following are unacceptable uses:

Illegality in any form, including but not limited to activities such as unauthorized distribution or copying of copyrighted software, violation of International export restrictions, harassment, fraud, trafficking in obscene material, drug dealing, and other illegal activities.

Interpretation

The provisions of this Policy are intended as guidelines and are not meant to be exhaustive. Generally, conduct that violates law, regulation, or the accepted norms of the Internet community, whether or not expressly mentioned in this Policy, is prohibited. JPstream reserves the right at all times to prohibit activities that damage its commercial reputation and goodwill.

Illegal Use

JPstream servers may be used only for lawful purposes. Transmission, distribution or storage of any material in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property right used without proper authorization, and material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws. Examples of non-acceptable content or links: “Pirated software”, “Hackers programs or archives”, “Warez Sites”, “Irc Bots”, “Mp3”.

We will be the sole arbiters as to what constitutes a violation of this provision.

Tortuous Conduct

No one shall post defamatory, scandalous, or private information about a person without their consent, intentionally inflicting emotional distress, or violating trademarks, copyrights, or other intellectual property rights. All customers should be polite and respectful.

System and Network Security

Violations of system or network security are prohibited, and may result in criminal and civil liability. Examples include, but are not limited to the following: unauthorized access, use, probe, or scan of a systems security or authentication measures, data or traffic. Interference with service to any user, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks. Forging of any TCP-IP packet header or any part of the header information in an e-mail or a newsgroup posting.

It is a violation for anyone who, including but not limited to, employs posts or programs which consume excessive CPU time or storage space, permits the use of mail services, mail forwarding capabilities, POP accounts, or auto responders other than for their own account; or resale of access to CGI scripts installed on our servers.

Network Uptime & Credits

This policy also encapsulates our Network Service Level Agreement.

JPStream Customer Service Agreement

This is an agreement between you and JPstream. JPstream regarding your use of JPstream’s computer, interactive information, communication and server management service. This Agreement governs the terms and conditions under which JPstream makes the services offered by JPstream available to individual consumers through a personal computer or similar access, or to individual consumers or small businesses in connection with the ” JPstream ” web hosting or similar services. Under this Agreement, you must comply with JPstream’s then current “Acceptable Use Policy,” as updated from time to time by JPstream, which can be viewed on your client account management area

Modification

JPstream reserves the right to add, delete, or modify any provision of this Policy at any time without notice. Reporting Network Abuse Any party seeking to report any violations JPstream’s policy may contact via e-mail.