All services provided by the Provider may be used for lawful purposes only. Transmission, storage, or presentation of any information, data, or material in violation of any United States Federal, State, or City law is prohibited. This includes, but is not limited to: copyrighted material, material that is threatening or obscene, "adult only" content material, or material, protected by trade secrets and other statute.
Materials, accessible to the customer through the Provider's services, may be subject to protection under the United States or other copyright laws, or laws protecting trademarks, trade secrets or proprietary information. Except when exclusively permitted by the owner of such rights, the customer may not use the Provider's services in a manner that would infringe, violate, dilute, or misappropriate any such rights, with respect to any material, which the customer accesses or receives through the Provider's network. If the customer uses a domain name in connection with the Provider's service, he/she may not use that domain name in violation of any third party trademark, service mark, or similar rights.
When using the Provider's services, the customer retains all intellectual property rights on their own content, trademarks, and any other data related to the site/account content. The Provider will use this content/data/trademarks only for the provision of the hosting service, unless other actions are required by law.
Customers may not use the Provider's network in an attempt to circumvent user authentication or security of any host, network, or account. This includes but is not limited to: accessing data not intended for the customer, logging into a server or account the customer is not exclusively authorized to access, password cracking, probing the security of other networks in search of weaknesses, or violation of any other organization's security policy. Customers may not attempt to interfere or deny service to any user, host or network. This includes, but is not limited to: flooding, mail bombing or other deliberate attempts to overload or crash a host or network. The Provider will fully cooperate with investigations of violations of systems or network security. This also includes cooperating with law enforcement authorities in the investigation of suspected criminal violations. Users who violate system or network security may incur criminal or civil liability.