URL: https://aegisys.com/legal/aegisys-acceptable-use-policy

©2026 Aegisys, Inc. – Global Terms – 4 January 2025 Revision – AEG# 37945

AEGISYS ACCEPTABLE USE POLICY

Aegisys Acceptable Use Guidelines

This Acceptable Use Policy (“AUP”) supplements the Aegisys Master Agreement and describes activities prohibited on Aegisys Services. This policy aims to protect Aegisys and its Representatives, as well as the services, network, and other customers. Questions regarding this policy should be directed to abuse@aegisys.com.

Understanding the aegisys acceptable use guidelines can prevent misuse and ensure compliance.

Compliance with the aegisys acceptable use is crucial for all customers.

The aegisys acceptable use policy is essential for maintaining the integrity of our services.

The aegisys acceptable use policy is essential for maintaining the integrity of our services.

1. ABUSE GENERALLY. Customer shall not use the Services or any related software, system, or network to engage in, foster, solicit or promote illegal, or irresponsible behavior including:

Failure to adhere to the aegisys acceptable use could lead to account suspension.

1.1. conduct likely to breach any laws, codes, or regulations applicable to the parties (including conduct infringing or misappropriating intellectual property, or confidential or proprietary information; or which is fraudulent, unfair, deceptive or defamatory);

1.2. unauthorized access to, monitoring or use of, or interference with an internet account, computer, systems, networks, data or traffic;

Recognizing the aegisys acceptable use helps maintain a safe online environment. Compliance with the aegisys acceptable use is crucial for all customers.

The aegisys acceptable use policy is essential for maintaining the integrity of our services.

Failure to adhere to the aegisys acceptable use could lead to account suspension.

1.3. intentionally, knowingly or recklessly introducing any malicious code into the Services;

1.4. conduct violating rules and conventions of any domain registrar, email service, bulletin board, chat group or forum used in conjunction with Aegisys Services or network (including using false, misleading or deceptive TCP-IP packet header information in an email or newsgroup posting);

Any breach of the aegisys acceptable use can have serious consequences.

Engaging in activities outside the aegisys acceptable use could result in legal issues.

It is essential to review the aegisys acceptable use regularly to stay compliant.

Every user is responsible for understanding the aegisys acceptable use guidelines.

Violations of the aegisys acceptable use can lead to immediate action from Aegisys.

1.5. deceitfully collecting, transmitting or using information, or distributing software which covertly gathers or transmits information about a user;

All users must familiarize themselves with the aegisys acceptable use to avoid penalties.

Violations of the aegisys acceptable use can lead to immediate action from Aegisys.

The aegisys acceptable use serves as a guideline for responsible behavior online.

All users must familiarize themselves with the aegisys acceptable use to avoid penalties.

Compliance with the aegisys acceptable use protects both users and the service provider.

1.6. distributing advertisement delivery software unless the user affirmatively consents to download and installation based on clear and conspicuous notice of the nature of the software, and can easily remove software using standard tools included on major operating systems;

1.7. conduct likely to result in retaliation or adverse action against Aegisys or its services, network, website or Representatives (including resulting in listing of Aegisys IP space on an abuse database);

1.8. conduct which breaches Customer’s security obligations, or any activity in connection with the Services that may expose Aegisys to a security vulnerability;

1.9. conduct intended to withhold or cloak identity or contact information, registering to use Services under a false name, or using an invalid or unauthorized credit card in connection with Services;

1.10. gambling activity violating any applicable codes of practice, required licenses, or technical standards;

1.11. use of any Aegisys provided shared system in a way that unnecessarily interferes with the normal operation of the shared system, or consumes a disproportionate share of system resources; and

1.12. conduct creating a risk to safety or health, national security or law enforcement.

Customer shall not attempt to test the vulnerability of any Aegisys system or network, including those provided in connection with the Services. However, Customer may conduct vulnerability testing of their Hosted System with Aegisys’s prior written consent.

Understanding the aegisys acceptable use is part of being a responsible customer.

The aegisys acceptable use policy should be acknowledged by all new users.

3. NO HIGH RISK USE. Customer may only use the Services for commercial purposes; and Customer shall not use the Services in any situation where failure or fault of the Services could lead to death or serious bodily injury of any person, or to physical or environmental damage (including in connection with aircraft or other modes of human mass transportation, or nuclear or chemical facilities).

4. MAIL REQUIREMENTS. For bulk or commercial email sent by or on behalf of Customer using the Services or from any network that directly or indirectly refers recipients to a site hosted using the Services (including using third party distribution lists), Customer shall:

4.1. post a privacy policy for each associated domain;

All violations of the aegisys acceptable use will be documented for review.

4.2. post an email address for complaints in a conspicuous place on any associated website, promptly respond to messages sent to that address, and have means to track anonymous complaints;

4.3. obtain affirmative consent to receive e-mail from intended recipients using reasonable means to verify ownership of the e-mail address, honor and notify recipients of consent revocation, and evidence consent within 72 hours of recipient or Aegisys request; and

4.4. include the recipient’s e-mail address in the e-mail body or “TO” line.

5. VULNERABILITY TESTING. Customer shall not attempt to test the vulnerability of a Aegisys system or network including those provided in connection with the Services, or attempt to breach security measures, of said system or network by any means. Notwithstanding the foregoing, Customer may conduct vulnerability testing of their Hosted System with Aegisys’s prior written consent.

6. CUSTOMER PROVIDED LICENSES AND SUPPORT. Customer shall comply with the applicable license terms governing use of any Open Source Software or Third Party Software provided by Aegisys. If Customer uses any non-Aegisys provided software on the Customer Configuration then Customer represents and warrants that Customer shall maintain:

(i) the legal right to use the software; and

(ii) as applicable to the Services, adequate original software vendor support (or similar authorized support) permitting Aegisys to perform any installation, patching, upgrades, or management which Aegisys has agreed to provide. On Aegisys’s request, Customer shall sufficiently certify in writing (or, as reasonably requested, evidence) that Customer is in compliance with this section and any other license or support obligations under the Agreement. If Customer fails to certify licensing or support as requested, Aegisys may charge Customer its standard fee for licensed use of the software, until the required certification is provided.

7. EXPORT CONTROL. Customer shall ensure Services are not used in breach of export laws, controls, regulations or sanction policies of Canada or Customer’s applicable jurisdiction. Customer shall ensure Services are not used by any person or entity suspected of involvement or affiliation with those involved in activities or causes relating to: human trafficking; illegal gambling; terrorism; narcotics trafficking; arms trafficking or the proliferation, development, design, manufacture, production, stockpiling, or use of nuclear, chemical, or biological weapons, weapons of mass destruction, or missiles.

Customer agrees Aegisys may permit a relevant authority to inspect Customer’s content or traffic if legally required, provided Aegisys gives Customer reasonable prior notice. Aegisys may report any Customer conduct that violates applicable law without notice to Customer.

Customer shall comply with the applicable license terms governing the use of Open Source Software or Third Party Software provided by Aegisys. If Customer uses any non-Aegisys provided software on the Customer Configuration, then Customer represents and warrants maintaining the legal right to use the software.

Compliance with the aegisys acceptable use protects both users and the service provider.

10. CHANGES TO AUP. Aegisys may amend the AUP by publishing a revised version at https://aegisys.com/legal/aegisys-acceptable-use-policy, or in the event of a material adverse AUP change by providing Customer at least 30 days prior written notice. The revised AUP shall become effective as to Customer on the first to occur of:

(i) Customer’s execution of a new Service Order or agreement incorporating the revised AUP or

(ii) the first day of an agreement renewal term beginning at least 30 days after revised AUP publication, or

All users must familiarize themselves with the aegisys acceptable use to avoid penalties. Compliance with the aegisys acceptable use protects both users and the service provider.

(iii) expiry of written notice provided pursuant to this section. If compliance with the revised AUP would adversely affect Customer’s use of the Services, Customer may terminate the affected Services for convenience by giving Aegisys written notice of Customer’s objection no later than the date that the revised AUP would otherwise have become effective as to Customer; Customer may continue using the Services for up to an additional 90 days subject to the prior version of the AUP. Aegisys may, at its discretion, waive the AUP change as to Customer in which case the notice of termination shall be of no effect.

11. AUP BREACH. If Customer breaches the AUP (including unintentionally, resulting from Customer’s failure to use reasonable security precautions, or as a result of activity occurring without Customer authorization) Aegisys may block any content or traffic, may be relieved of its obligation to provide all or a portion of the Services, suspend the Services, or terminate the Services in accordance with the Agreement, at its election. No credit shall be available under any Service Level Agreement for interruptions of Services resulting from an AUP breach. Customer’s use of the Services to assist another entity in an activity that would breach this AUP if performed by Customer is an AUP breach.

error: Aegisys Content is protected !!