Acceptable Use Policy
This acceptable use policy covers the products, services, and technologies (collectively referred to as the “Products”) provided by Jan’s File Cabinet under any ongoing agreement. It’s designed to protect us, our customers, and the general Internet community from unethical, irresponsible, and illegal activity.
Jan’s File Cabinet customers found engaging in activities prohibited by this acceptable use policy can be liable for service suspension and account termination. In extreme cases, we will report such customers to the relevant authorities.
This policy is effective as of 27 June 2021.
Last updated: 16 January 2023
We provide our facilities with the assumption your use will be “business as usual,” as per our offer schedule. Additional fees may be charged, or capacity may be restricted if your use is excessive.
We oppose all forms of abuse, discrimination, rights infringement, and any action that harms or disadvantages any group, individual, or resource. We expect our customers and, where applicable, their users (“end-users”) likewise to engage our Products with similar intent.
Our customers are responsible for their actions and those of anyone using our Products with the customer’s permission. Additionally, this responsibility applies to anyone using our Products on an unauthorized basis due to the customer’s failure to put reasonable security measures in place.
By accepting Products from us, our customers agree to ensure adherence to this policy on behalf of anyone using the Products as their end users. We will forward complaints regarding the actions of customers or their end-users to the contact for the account in question.
If a customer — or their end-user or anyone using our Products as a result of the customer — violates our acceptable use policy, we reserve the right to terminate any Products associated with the offending account or the account itself. In addition, we may take any remedial or preventative action we deem appropriate without notice. No credit will be available for interruptions of service resulting from any violation of our acceptable use policy.
Copyright infringement and access to unauthorized material.
Our Products must not be used to transmit, distribute or store any material violating any applicable law. This includes but isn’t limited to the following:
Any material protected by copyright, trademark, trade secret, or other intellectual property right used without proper authorization and any obscene or defamatory material constitutes an illegal threat or violates export control laws.
Customers are solely responsible for all material they input, upload, disseminate, transmit, create, or publish through or on our Products. In addition, the customer is solely responsible for obtaining legal permission to use any works included in such material.
SPAM and unauthorized message activity
Our Products must not be used for sending unsolicited bulk or commercial messages violating the laws and regulations applicable to your jurisdiction (“spam”). This includes but isn’t limited to sending spam, soliciting customers from spam sent from other service providers, and collecting replies to spam sent from other service providers.
Our Products must not be used to run unconfirmed mailing lists or telephone number lists (“messaging lists”). This includes subscribing email addresses or telephone numbers to any messaging list without the permission of the email address or telephone number owner. This also applies to storing any email addresses or telephone numbers subscribed in this way. All messaging lists run on or hosted by our Products must be “confirmed opt-in.” Verification of the address or telephone number owner’s express permission must be available for the lifespan of the messaging list.
We prohibit using email lists, telephone number lists, or databases purchased from third parties intended for spam or unconfirmed messaging list purposes on our Products.
This spam and unauthorized message activity policy applies to messages sent using our Products. It also includes messages sent from any network by the customer or on the customer’s behalf that directly or indirectly refer the recipient to a site hosted via our Products.
Unethical, exploitative, and malicious activity
Our Products must not be used for advertising, transmitting, or otherwise making available any software, program, product, or service designed to violate this acceptable use policy or the acceptable use policy of other service providers. This includes facilitating the means to send spam and the initiation of network sniffing, pinging, packet spoofing, flooding, mail-bombing, and denial-of-service attacks.
In addition, our Products must not be used to access any account or electronic resource where the group or individual attempting to gain access does not own or is not authorized to access the resource (e.g., “hacking,” “cracking,” “phreaking,” etc.).
Furthermore, our Products must not be used to intentionally or recklessly introduce viruses or malicious code into our Products and systems.
Finally, our Products must not be used for purposely engaging in activities designed to harass another group or individual. Our definition of harassment includes but is not limited to denial-of-service attacks, hate speech, and advocacy of racial or ethnic intolerance. It also includes activity intended to threaten, abuse, infringe upon the rights of, or discriminate against any group or individual.
Other activities considered unethical, exploitative, and malicious include:
Obtaining (or attempting to obtain) services from us with the intent to avoid payment;
Using our facilities to obtain (or attempt to obtain) services from another provider with the intent to avoid payment;
The unauthorized access, alteration, or destruction (or any attempt thereof) of any information about our customers or end-users by any means or device;
Using our facilities to interfere with the use of our facilities and network by other customers or authorized individuals;
Publishing or transmitting any content or links that incite violence, depict a violent act, depict child pornography, or threaten anyone’s health and safety;
Any act or omission in violation of consumer protection laws and regulations;
Any violation of a person’s privacy.
Our Products may not be used by any person or entity involved with or suspected of involvement in activities or causes relating to illegal gambling, terrorism, or narcotics trafficking. This also applies to any person or entity involved with or suspected of involvement with arms trafficking. This includes the proliferation, development, design, manufacture, production, stockpiling, or use of nuclear, chemical, or biological weapons, weapons of mass destruction, or missiles. This includes any affiliation with others who support the above activities or causes.
Unauthorized use of Jan’s File Cabinet property
We prohibit the impersonation of Jan’s File Cabinet and the representation of a significant business relationship with Jan’s File Cabinet. We also prohibit the ownership of any Jan’s File Cabinet property to fraudulently gain service, custom, patronage, or user trust. This includes our Products and brand.
About this policy
This policy outlines a non-exclusive list of activities and intent we deem unacceptable and incompatible with our brand.
We reserve the right to modify this policy at any time by publishing the revised version on our website. The revised version will be effective from the earlier of:
the date the customer uses our Products after we publish the revised version on our website; or
30 days after we publish the revised version on our website.
Read our Terms of Service.