I. GENERAL

A. Purpose
This Acceptable Use Policy sets forth guidelines for acceptable use of the IIJ America Network. All users of the IIJ America Network are required to comply with this policy.

B. Definitions
As used in this Acceptable Use Policy, the terms shall have the respective meanings set forth below:
“IIJ America” includes, without limitation, IIJ America Inc., and any division, subsidiary, affiliate, or parent corporation of any of the foregoing.

“IIJ America Network” includes, without limitation, IIJ America’s networks, and all systems, services, products, and third-party networks that utilize, or are utilized in connection with, IIJ America’s networks.

C. Revisions
IIJ America reserves the right to modify this Acceptable Use Policy at any time.

II. COMPLIANCE

A. General
All users of the IIJ America Network are required to comply with this Acceptable Use Policy, as well as all applicable laws and regulations.

B. Goals
IIJ America seeks to promote a high level of responsible behavior in connection with the use of the Internet, and has formulated this Acceptable Use Policy to accomplish the following goals:
To protect the reputation and resources of IIJ America, its customers, and the Internet community at large, from irresponsible or illegal activities.

To ensure the privacy, security, and reliability of the IIJ America Network, the network and systems of IIJ America’s customers, and (as much as IIJ America is reasonably able to do so) the Internet at large.

To establish guidelines for the acceptable use of the IIJ America Network.
To define generally those actions which IIJ America considers abusive and prohibited.
To outline procedures for handling and reporting abuse to IIJ America.

C. Responsibilities
IIJ America provides an unfiltered connection to the Internet. No data, documents, materials, or information that enters the IIJ America Network is reviewed before being transmitted to users. Accordingly, IIJ America neither controls nor accepts responsibility for the content of any communications that are transmitted or made available to users, regardless of whether they originated from users of the IIJ America Network. In addition, IIJ America expressly disclaims any responsibility for the accuracy or quality of information provided by third parties that may be obtained through the use of the IIJ America Network. Customer assumes total risk and responsibility for any and all access to the Internet or use, alteration or transport of any content or information therefrom or otherwise obtained via, or provided by, the IIJ America Network.

Each user is responsible for complying with this Acceptable Use Policy, and for providing reasonable assistance to IIJ America in investigating and resolving issues, problems, and/or complaints arising out of the services provided to such user.

D. Configuration
All users of the IIJ America Network are responsible for configuring their own systems to provide the maximum possible accountability. For example, users should ensure there are clear “path” lines in news headers so that the originator of a post may be identified. Users should also configure their Mail Transport Agents (MTA) to authenticate (by look-up on the name or similar procedures) any system that connects to perform a mail exchange, and should generally present header data as clearly possible. As another example, users should maintain logs of dynamically assigned IP addresses.

E. Reporting Violations
Customers of IIJ America are responsible for immediately reporting to IIJ America (via e-mail or phone) any network issue which could compromise the stability, service or security of any use by IIJ America or its customers of the IIJ America Network.

F. Resellers and Downstream Service Providers
Some users may be customers of Internet Service Providers (ISPs) that receive Internet Connection Service through IIJ America. Such ISPs (also known as resellers or downstream service providers) are responsible for informing their customers of this Acceptable Use Policy and for enforcing its restrictions with regard to their customers’ actions.

Complaints about customers of any such reseller or downstream service provider shall be forwarded to such reseller or downstream service provider for resolution. If the reseller or downstream service provider continues to fail to take appropriate action, IIJ America may in its sole discretion take such further action as it deems appropriate, up to and including termination proceedings.

Violations of this Acceptable Use Policy by a customer or end?user of a reseller or downstream service provider shall be considered violations of this Acceptable Use Policy by such reseller or downstream service provider.

III. CONSEQUENCES OF NON-COMPLIANCE

Violation of this Acceptable Use Policy is strictly prohibited. In the event of any actual or potential violation, IIJ America reserves the right to suspend or terminate, either temporarily or permanently, any or all services provided by IIJ America, to block any abusive activity, or to take any other actions as deemed appropriate by IIJ America in its sole discretion.

Users who violate this Acceptance Use Policy may incur criminal or civil liability. IIJ America may refer violators to civil or criminal authorities for prosecution, and will cooperate fully with applicable government authorities in connection with the civil or criminal investigations of violations.

IV. PROHIBITED USE

The examples of prohibited use set forth below and throughout this Acceptable Use Policy are non?exclusive, and are provided as guidelines to customers and other users of the IIJ America Network.

A. Illegal Use
The IIJ America Network may be used only for lawful purposes. The transmission, distribution, or storage of any information, data, or material in violation of any applicable law or regulation is prohibited. Without limitation of the foregoing, it is strictly prohibited to create, transmit, distribute, or store any information, data, or material which:

Infringes any copyright, trademark, trade secret, or other intellectual property right.
Is obscene or constitutes child pornography.
Is libelous, defamatory, hateful, or constitutes an illegal threat or abuse.
Violates export control laws or regulations.
Encourages conduct that would constitute a criminal offense or give rise to civil liability.
In the event of suspected, alleged, or actual illegal activity, IIJ America will notify or cooperate with applicable law enforcement authorities for potential civil or criminal investigation or prosecution.

B. Abuse
The following general actions are considered abuse and are strictly prohibited
Any conduct which violates the accepted norms and expectations of the Internet community at large (whether or not detailed in this Acceptable Use Policy). IIJ America reserves the right, in its sole discretion, to make a determination whether any particular conduct violates such norms and expectations.

Resale of IIJ America’s services or products, unless expressly authorized in a separate written agreement with IIJ America.

Any conduct that restricts or inhibits any other user, whether a customer of IIJ America or a user of any other system or network, from using or enjoying any of IIJ America’s services or products, as determined by IIJ America in its sole discretion.

Harassment, whether through language, frequency, or size of messages.
Creating, forwarding, posting, or distribution of chain messages of any type (also known as “pyramid” or “Ponzi” schemes).

Forging of message headers or a sender’s identity, or taking any similar action with the intent of bypassing restrictions or limits on access to a specific service or site (such as a moderated newsgroup or a site utilizing filters). This prohibition does not restrict the legitimate use of aliases or anonymous re-mailers.
Falsifying identity or contact information (whether given to IIJ America, to the InterNIC, or put in a message header) to circumvent this Acceptable Use Policy. This prohibition does not restrict the legitimate use of aliases or anonymous re-mailers.

Furnishing false or incorrect data to IIJ America on written or online applications, contracts, or other materials or information provided to IIJ America, including fraudulent use of credit card numbers or “bill to” telephone numbers.

Attempting to circumvent or alter the processes or procedures to measure time, bandwidth utilization, or other methods to document use of IIJ America’s products and services.

C Security
Violations of system or network security are prohibited, and may result in criminal and civil liability. IIJ America will investigate potential security violations, and may notify applicable law enforcement agencies if violations are suspected.

Network security violations include, without limitation, the following: (i) unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network; (ii) unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network; and (iii) forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting.

It is strictly prohibited to attempt to circumvent the authentication procedures or security of any host, network, network component, or account (i.e. “cracking”) to access data, accounts, or servers which the user is not expressly permitted or authorized to access. This prohibition applies whether or not the attempted intrusion is successful, and includes unauthorized probes or scans performed with the intent to gather information on possible security weaknesses or exploitable configurations.

Users of the IIJ America Network are responsible for educating themselves and configuring their systems with at least basic security. Should systems at a user’s site be violated, the user is responsible for reporting the violation and then fixing the exploited system. For instance, should a site be abused to distribute unlicensed software due to a poorly configured FTP (File Transfer Protocol) Server, the user is responsible for re-configuring the system to stop the abuse.

Users are further prohibited from interfering or attempting to interfere with service to any other user, host, or network on the Internet (“denial of service attacks”). Examples of such prohibited activity include without limitation (a) sending massive quantities of data (i.e. “flooding” with ICMP, SMTP, or any other type of traffic that exceeds accepted norms of size and/or frequency) with the intent of filling circuits, overloading systems, and/or crashing hosts, (b) attempting to attack or disable any user, host, or site, or (c) using, distributing, or propagating any type of program, script, or command designed to interfere with the use, functionality, or connectivity of any Internet user, host, system, or site (for example, by propagating messages, via e-mail, Usenet posting, or otherwise, that contain computer worms, viruses, control characters or Trojan horses).

Users are prohibited from intentionally or negligently injecting false data into the Internet, for instance in the form of bad routing information (including but not limited to the announcing of networks owned by someone else or reserved by the Internet Assigned Numbers Authority) or incorrect DNS information.

D. E-Mail
Users are prohibited from engaging in improper use or distribution of electronic mail (“e-mail”) over the Internet. Without limitation of the foregoing, it is strictly prohibited to engage in any of the following activities:

Sending unsolicited bulk e-mail (“UBE”, or “spamming”). This includes, but is not limited to, the distribution of UBE for commercial, informational, advertising, political, or religious purposes.
Setting up “mailback” or “drop box” addresses in order to receive responses from UBE, either directly by the user or by a third party on behalf of the user.

Using a mail transport agent (MTA) outside of a user’s own site to relay mail (unless a user has received express permission to do so). Even if permission has been received, users are prohibited from forging their identities to make it appear as though the e-mail sourced from the relay.

Sending UBE, or posting news, to advertise or promote resources whose connectivity depends in any way on the IIJ America Network, regardless of whether such UBE or news posting is made using the IIJ America Network. For example, using another ISP’s services to send UBE which advertises a web page hosted by or via the IIJ America Network is prohibited.

Hiring or using any third party service for the purpose of distributing UBE or excessively “multi-posting” or “cross-posting” any Usenet posting in the name of a user. Users will be held responsible for the actions of any third party agent that acts on behalf of or for the benefit of the user, and such users shall be held directly accountable for any violations of this Acceptable Use Policy by such third party agent.

Bulk e-mail may be sent only to recipients who have expressly requested receipt of such e-mail. Users that send solicited bulk e-mail are required to maintain records of all bulk e-mail subscription requests, and to provide IIJ America with such records upon request of IIJ America, to enable IIJ America to investigate complaints from third parties. The sender of any solicited bulk e-mail shall, upon the request of a recipient, immediately remove such recipient from all applicable mailing lists and refrain from further transmissions of e-mail to such recipient.

Use of any auto-responder messages, mailing lists, or any other programs or scripts run by a user to handle or re-distribute e-mail is the sole responsibility of the user, and shall be operated in a reasonable manner. This responsibility includes, but is not limited to, maintaining up-to-date mailing lists to minimize mail bouncing and to facilitate the processing of removal requests, configuring auto-responders so that they do not create mail loops, and the prompt handling of any complaints regarding UBE re-distributed through a mailing list onsite.

E. USENET (also known as NETNEWS or NEWSGROUPS)
IIJ America recommends that users not post to any newsgroup until they have familiarized themselves with the subjects, established guidelines, and restrictions of such newsgroup. All Usenet guidelines and restrictions are incorporated herein by reference, and users of the IIJ America Network agree to adhere to such guidelines unconditionally.

Without limitation of the foregoing, it is strictly prohibited to engage in any of the following activities:
Making any posting for commercial purposes (including without limitation the pointing to specific URLs for commercial purposes), except where such postings are expressly permitted under the charter and/or Frequently Asked Questions (FAQ) of an applicable newsgroup.

Posting binary files to newsgroups whose charter or name does not include allowances for such files.

Posting via IIJ America’s newsfeed any solicitation for mailback to an e-mail address (including addresses of non-IIJ America users) networks with the intention of bypassing this Acceptable Use Policy.

Canceling newsgroup postings other than their own, or using auto-responders or cancel-bots (or similar automated or manual routines) which generate excessive network traffic or disrupt Usenet newsgroup/e-mail use by others (except in cases of official newsgroup moderators performing their duties).

Engaging in “Excessive Cross-Posting” (ECP) or “Excessive Multi-Posting” (EMP) or “Usenet spam” (no matter what the content might be) as defined by the Internet community and expressed in the news.admin.net-abuse.* newsgroups and FAQs.

Disrupting newsgroups with materials, postings, or activities that are (as determined by IIJ America in its sole discretion) frivolous, unlawful, obscene, threatening, abusive, libelous, hateful, excessive, or repetitious, unless such materials or activities are expressly allowed or encouraged under the newsgroup’s name, FAQ, or charter.

Using filtering messages (e.g. NoCeM) in an intrusive manner, or at other than the user’s server level. Generally, filtering messages are considered normal Usenet traffic and are treated as such by IIJ America. Complaints regarding filter use or abuse should be directed either to the source generating them or the sites utilizing them.

Performing any unauthorized creation, cancellation, or removal of newsgroups.

The legitimacy of a given post or cancellation is determined by the official newsgroup or mailing-list moderator. Therefore, IIJ America defers to their judgment on these issues. If no such official entity exists, it is at IIJ America’s discretion to determine whether any post or cancellation is compliant with this Acceptable Use Policy and Internet community standards for that newsgroup.

F. World Wide Web
IIJ America strictly prohibits users from engaging in any of the following web-related activities:
The exploitation or attempted exploitation of any scripts presented on web pages (e.g. forms for answering questions or for entering data).

Excessive use of bandwidth by utilizing programs, scripts, or commands to abuse a web site (for example, by connecting for an excessive amount of time, repeatedly engaging site-local scripts, or related behavior).
“Walking” a database for the purpose of collecting data contained therein (whether or not this behavior requires that the reader of the page must knowingly ignore files such as robot.txt” which is designed to guide cataloguing robots/programs).

Operating a robot on a site’s page after the site has asked that the behavior cease.
Configuring a web page to act maliciously against users that visit that web page.

VMware Partner Logo


IIJ GIO IIJ America PLESK CPanel