Placeholder Image

Triple Ring Technologies Acceptable Use Policy

Last Revised: November 30, 2020

Triple Ring Technologies prohibits activities that may infringe on the rights of others, including but not limited to security violations, copyright violations, harassment and violation of individual privacy rights. The most current version of this Acceptable Use Policy (“AUP”) can at all times be found at the Triple Ring Technologies website: https://www.tripleringtech.com/acceptableuse. This Acceptable Use Policy (“AUP”) serves as notice that Triple Ring Technologies reserves the right to terminate or otherwise restrict use of any Client’s account found to be in violation of any of Triple Ring Technologies policies or guidelines.

This AUP may be revised from time to time to reflect additional protections put in place. In the event this AUP is revised, Triple Ring Technologies will change the “Last Revised” date at the top. To remain informed about changes to this AUP, be sure to check back frequently to see the most recent version. Once a revision to this AUP is adopted and posted on the Triple Ring Technologies website, it shall replace and supersede all earlier versions of this AUP. Continued use of Triple Ring Technologies Services after a revised AUP has been posted constitutes acceptance of any revised or additional terms of this AUP. Capitalized terms not otherwise defined in this AUP have the meaning ascribed to them in the applicable Collocation Master Service Agreement (“Agreement”).

IF YOU DO NOT AGREE TO ABIDE BY THIS AUP DO NOT USE, OR CONTINUE TO USE, OUR SERVICES AND CONTACT TRIPLE RING TECHNOLOGIES IMMEDIATELY AT (510) 323-2599 SO THAT TRIPLE RING TECHNOLOGIES MAY INITIATE TERMINATION OF YOUR ACCOUNT. USE, OR CONTINUED USE, OF OUR SERVICES SHALL CONSTITUTE APPROVAL OF THIS AUP.

1. Personal Files. Triple Ring Technologies is not responsible for backups of Client’s personal files and information.

2. Network IP address assignments. Any network IP address assignments issued by Triple Ring Technologies are the property of Triple Ring Technologies and are considered to be loaned to Client. In the event Services with Triple Ring Technologies are discontinued for any reason, such addresses will revert to Triple Ring Technologies. Client shall not use IP addresses not assigned by Triple Ring Technologies.

3. Contact Information. Triple Ring Technologies may need to communicate with Client through email. It is the responsibility of Client to furnish Triple Ring Technologies with the appropriate contact email address for such correspondence. It is the responsibility of Client to check email sent to the primary login email address on the account. It is the responsibility of Client to notify Triple Ring Technologies of any changes to their account, such as phone number, address, credit card information, etc. Client will be required to provide verification for security purposes authorizing them to make any changes to that account.

4. Cloud Service Limitations. Client may not use the network for open proxies, streaming services, CDN services, running Torrents or Seed Servers, TOR, IRC or IRC bots, reselling Services, or using their account to provide free bandwidth to others.

5. Prohibited Activities. To better ensure that Triple Ring Technologies accounts are not used for illegal/improper purposes, Triple Ring Technologies has delineated those activities that are deemed illegal or improper. Individuals who engage in the following activities may be subject to account termination or restrictions placed upon their accounts:

(a) Obscene Materials/Speech– Using Triple Ring Technologies network to store or disseminate or otherwise make available child pornography is expressly prohibited. Any account found in violation of this prohibition will be terminated. Triple Ring Technologies is required by Federal law to notify law officials when it becomes aware of child pornography on its network.

(b) Spamming. Sending unsolicited bulk and/or commercial messages over the Internet is prohibited. Any individuals who are responsible for assigned IP addresses being added to a Realtime Blackhole List will incur a Fifty Dollar ($50) clean-up fee per affected IP, which is neither negotiable nor refundable. Maintaining an open SMTP relay, or using SMTP services for spam or other malicious purposes, is prohibited.

(c) Intellectual Property Violations. Engaging in any activity that may violate the intellectual property rights of another is prohibited. Protected intellectual property rights include, without limitation, copyrights, trademarks, service marks, software piracy, trade secrets, patents held personally and by corporate entities. Triple Ring Technologies is required by law to comply with orders to restrict accounts that have been found to violate the intellectual property rights of others.

(d) Licensing. All software used on our servers must be properly licensed and be in compliance with laws of the geography where the software is being used. Client agrees that its usage will not exceed its purchased license quantity. Client is prohibited from removing, modifying or obscuring any copyright, trademark or other proprietary rights notices that are contained in or on any product or reverse engineering, decompiling, or disassembling any product, except to the extent that such activity is expressly permitted by applicable law.

(e) High Risk Use. Any of Triple Ring Technologies Services are not designed or intended for high-risk applications or in any other device or system in which function or malfunction of the software could result in death, personal injury or physical or environmental damage. Any such use or application by Client is unauthorized and outside the scope of this Agreement.

(f) Defamatory/Abusive Language. The use of Triple Ring Technologies network to post or otherwise transmit harassing, abusive, or threatening language is expressly prohibited.

(g) Illegal or Unauthorized Access. Any access to other networks through Triple Ring Technologies must comply with the rules appropriate for that network. Unlawful or intrusive access is strictly prohibited and includes but is not limited to attempting to penetrate security measures and/or port scanning. Such activities will result in termination of Services and/or legal measures. Distribution of Internet Viruses, Worms, Trojan Horses, or other similar activities are prohibited.

(h) Facilitating a Violation of This AUP. Advertising, transmitting, or otherwise making available any software, program, product, or service that is designed to violate this AUP may result in the suspension or termination of Client’s account or such other action as Triple Ring Technologies deems appropriate. Triple Ring Technologies reserves the right to determine if the engagement in activities, whether lawful or unlawful, may be harmful to its subscribers, operations, and reputation, goodwill, or Client relations.

6. Privacy. Triple Ring Technologies recognizes that the Internet is not a completely secure form of communication. Triple Ring Technologies respects the privacy of its Clients and will not intentionally monitor communications from its Clients unless it is directed by governmental authorities to do so. Moreover, Triple Ring Technologies will disclose any information about its Clients in order to comply with a court order, subpoena, summons, discovery request, warrant, statute, regulation, or governmental request. Triple Ring Technologies assumes no obligation to inform Client if such information is requested.

7. Right to Damages. In the event that an act or omission by Client that constitutes a violation of this AUP causes economic damage to Triple Ring Technologies, Triple Ring Technologies will have a right to claim and collect economic damages from Client.