Acceptable Use Policy

Anyone who publishes material and information that are accessible through Data Ideas LLC network is fully responsible for the content of such materials and information. Data Ideas LLC does NOT accept responsibility for the content of the materials and information published by others that are accessible through the Data Ideas Network and does not accept responsibility for any laws violated resulting from such a publication do distribution. Data Ideas LLC does not exercise no control over the content of the information passing through its network. Data Ideas LLC makes no guarantee and assumes no liability for the security of data on any server including “secure servers”. Please remember that NO computer system should be considered safe from intrusion.

You expressly indemnify Data Ideas, LLC, including its employees, assignees, agents, managers or directors, and hold Data Ideas, LLC blameless for any matters arising out of material, information or content published by you (so-called user-generated content), including the event that Data Ideas, LLC must remove such user-generated content for the purposes of complying with local or foreign law.

Abuse Definitions

- Resource Abuse

1.1 - Resource Abuse consists of any activity, intentional or otherwise, that consumes sufficient system resources to negatively affect other clients or equipment.

- Unsolicited Communication

1.2.1 - Any email-based communications sent without the consent of the recipient are considered “Unsolicited Communication(s)”.

1.2.2 - Knowingly permitting or initiating Unsolicited Communications is grounds for immediate termination, and a permanent ban from any future service.

- Malicious Content

1.3.1 - Any type of script, code, or other file that performs harmful action, either to the user affected or as a bulk action triggered by the user, is considered “Malicious Content”.

1.3.2 - Any content that violates the laws of the country it resides in is also considered “Malicious Content”.

1.3.3 - Knowingly permitting or hosting Malicious Content is grounds for immediate termination, and a permanent ban from any future service.

Remedial Action

- Intentional / Malicious Abuse

2.1.1 - Intentional / Malicious usage is defined as any action knowingly performed by the user, or persons user has authorized to access the service, that is categorized in the above Abuse Definitions.

2.1.2 - All services on the user's account will immediately be terminated without compensation, save for situations where a court order demands evidence be turned over to law enforcement, and forfeit ability to hold any further services by Data Ideas LLC.

- Order of Execution During Abuse Offenses

2.2.1 - The offending service will be brought offline, and left in a suspended state.

2.2.2 - A support ticket will be opened to the service owner detailing the offense and the necessary steps required to resolve the situation, if the situation is resolvable. It is the client’s responsibility to attempt to timely remediate any resolvable situation.

2.2.3 - Once the service owner replies to the ticket acknowledging that they understand the issue and how to correct the problem, the service will be reactivated and the service owner will have 24 hours to prevent any further abuse.

Failure to address abuse cases will result in your services being suspended, and in extreme cases, terminated.

TOR (The Onion Router Network).

Data Ideas LLC is a strong believer and supporter of Freedom of Speech and has taken a strong, and in some cases very public, stance against censorship. You're welcome to run Exit, Relay, and Bridge nodes, just follow the rules when doing so.

- Tor Guidelines

3.1.1 - Please open a support ticket informing us if you're running an Exit Node. This is to allow us to keep track of abuse complaints that come in and handle them accordingly.

3.1.2 - Data Ideas LLC understands it is possible to get abuse complaints for Tor users HOWEVER this is not an invitation to start being malicious.

3.1.3 - If you're operating an Exit Node, please make sure your exit policy blocks the following ports:
TCP 25 (SMTP)
TCP 465 (SMTP over SSL)
TCP 587 (SMTP over TLS)
TCP 6660-6667 (IRC - Optional but you may save yourself from DDOS attacks)
TCP 6697 (IRC over SSL - Optional but you may save yourself from DDOS attacks)

DMCA Copyright Infringement.

If you believe that your work has been copied in a way that constitutes illegal copyright infringement, or your intellectual property rights have been otherwise violated, you must provide a Notice to our Copyright department (identified below) that includes the following information: 1)A physical signature of the person authorized to act on behalf of the owner of the copyright or other intellectual property interest; 2) A description of the copyrighted work or other intellectual property that you claim has been infringed; 3) A copy of the filed police report; 4) A description of where the material that you claim is infringing is located on the site; 5) Your address, telephone number, and email address; 6) A statement by you that you have in good faith the belief that the disputed use is not authorized by the copyright owner, its agent, or the law; 7) A statement by you, made under penalty of perjury, that the above information in your Notice is accurate and that you are the copyright or intellectual property owner or authorized agent to act on the copyright or intellectual property owner's behalf. Our agent for notice of claims of copyright infringement can be reached as follows:
Data Ideas LLC.
Attn: Copyright Infringement
P.O. Box 8434
The Woodlands, Texas 77387
By email: abuse@dataideas.com