Datamationģ Acceptable Use Policy

This Acceptable Use Policy specifies the actions prohibited by Datamation Imaging Services Corporation ("DISC") to users of the Datamation Hosting Service. DISC reserves the right to modify the Policy at any time, effective upon posting of the modified Policy to https://login.datamationis.com/AccUsePolicy.htm.

Illegal/Prohibited Use
The Datamation Hosting Service may be used only for lawful purposes. Transmission, distribution or storage of any material in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property right used without proper authorization, and material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws.

Interference
Users of the Datamation Hosting Service shall not overload, overtax, surcharge or otherwise use it or the system in a manner that unreasonably and materially interferes with its use by another user by negatively affecting, reducing, limiting or impacting the speed or responsiveness of the system (whether intentionally or not).

Unauthorized Uses
Hosting Services are intended for use only as a document storage, access, and retrieval system in support of a subscriber's or end-user's need to store, access, and retrieve documents. It is not intended for use as a temporary data or document storage and transportation mechanism or system. Documents, either individually or in volume, may not be uploaded to Datamation and then retrieved by and/or transferred to any person and shortly thereafter be deleted from the Datamation Hosting Service. This type of activity within a Datamation account will be considered unauthorized data or document transportation, whether by a subscriber, end-user or reseller, in violation of this Acceptable Use Policy under the subscriber's or reseller's agreement with Datamation.

Datamation Hosting Services are sold on a per-User-per-Entity basis can only be utilized by a single company, enterprise, proprietorship or individual (Entity). If per-Entity services are required by or for more than one Entity, they must be purchased for each individual Entity and each individual user. Per-Entity services are not authorized for use on a project-level basis that involves multiple Entities. Utilizing per-Entity services at a project level for more than one Entity, whether by a subscriber, end-user or reseller, will be considered an unauthorized use, in violation of this Acceptable Use Policy under the subscriberís or resellerís agreement with Datamation.

Software Installations
Datamation may make available software to be installed by users. Any new installations of said software must be performed using the latest available version. Installing older versions of the software will be considered a violation of this Acceptable Use Policy.

System and Network Security
Violations of system or network security are prohibited and may result in criminal and civil liability. DISC will investigate incidents involving such violations and may involve and will cooperate with law enforcement if a criminal violation is suspected. Examples of system network security violations include, without limitation, the following:

  • Unauthorized access to or use of data, systems or networks.
  • Exceeding authorized access to or use of data, systems or networks.
  • Any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network.
  • Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network.
  • Unauthorized destruction, disclosure, modification or deletion of all or any part of data, systems or networks.
  • Interference with service to any user, host or network.
  • Mailbombing, flooding, deliberate attempts to overload a system, broadcast attacks or denial of service attacks.
  • Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting.
  • Intentional or reckless damage to data, systems or networks.
  • Exploitation of a vulnerability of the system or network.
  • Disclosure of a password or other authentication means to an unauthorized person.
  • Any other action or intentional inaction that adversely impacts the data, system or network or its operation, intended use, function, image or reputation.
  • Any act relating to the data, system or network that violates applicable law.

Each of the foregoing is considered to be a violation regardless of whether it is caused by or results from methods or techniques now known or later discovered.

INDIRECT OR ATTEMPTED VIOLATIONS OF THE POLICY, AND ACTUAL OR ATTEMPTED VIOLATIONS BY A THIRD PARTY ON BEHALF OF A DATAMATION CUSTOMER OR A CUSTOMER'S END USER, SHALL BE CONSIDERED VIOLATIONS OF THE POLICY BY SUCH CUSTOMER OR END USER. ANY SUCH VIOLATION OF THE POLICY MAY RESULT IN SUCH CUSTOMERíS OR END USERíS USE OF DATAMATION OR THE HOSTING SYSTEM BEING RESTRICTED, LIMITED OR TERMINATED, INCLUDING ON A TEMPORARY BASIS PENDING RESOLUTION OF ANY SUCH VIOLATION TO THE REASONABLE SATISFACTION OF DISC.

Complaints regarding Illegal or Unauthorized Use of System or Network Security issues should be sent to sysadm@datamationis.com.

For live incidents, please contact Datamation Administration at 1-630-321-0601.