Acceptable Use Policy

Use of IT Freedom’s services is subject to our acceptable use policy (“AUP”), contained herein. By accessing or using our services, you agree to abide by this policy, whether you are a customer of ours, one of our customer’s customers, employees, agents, members, or end-users, or any other party. You are not authorized to access or otherwise use our services unless you fully comply with this policy. If you are a customer of ours, you are responsible for any violations of this policy by any user that uses our services through you, whether you authorized such use or not. We do not exercise editorial control over the content of any web site, electronic mail transmission, news group, or other material created or accessible over or through our services. We may remove any materials that, by our sole discretion, are illegal, subject us to liability, or otherwise violate this policy. We may cooperate with legal authorities and/or third parties in the investigation of any suspected or alleged crime or civil wrongdoing. Your violation of this policy may result in suspension or termination of your access to our services or your IT Freedom account.

Policy Violations

The following constitute violations of this policy:
  • Illegal Use: Using the Services to transmit any material (by email, uploading, posting, or otherwise) that, intentionally or unintentionally, violates any applicable local, state, national or international law, or any rules or regulations promulgated there under.
  • Harm to Minors: Using the Services to harm, or attempt to harm, minors in any way.
  • Threats: Using the Services to transmit any material (by email, uploading, posting, or otherwise) that threatens or encourages bodily harm or destruction of property.
  • Harassment: Using the Services to transmit any material (by email, uploading, posting, or otherwise) that harasses another.
  • Fraudulent Activity: Using the Services to make fraudulent offers to sell or buy products, items, or services or to advance any type of financial scam, such as “pyramid schemes,” “Ponzi schemes,” and “chain letters.”
  • Forgery or Impersonation: Adding, removing or modifying identifying network header information in an effort to deceive or mislead is prohibited. Attempting to impersonate any person by using forged headers or other identifying information. The use of anonymous remailers or nicknames does not constitute impersonation. Using deliberately misleading headers (“munging” headers) in news postings in order to avoid spam email address collectors.
  • Unsolicited Commercial Email/Unsolicited Bulk Email: Using the Services to transmit any unsolicited commercial email or unsolicited bulk email. Activities that have the effect of facilitating unsolicited commercial email or unsolicited bulk email, whether or not that email is commercial in nature.
  • Unauthorized Access: Using the Services to access, or to attempt to access, the accounts of others, or to penetrate, or attempt to penetrate, security measures of IT Freedom’s or another entity’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in the corruption or loss of data.
  • Copyright or Trademark Infringement: Using the Services to transmit any material (by email, uploading, posting, or otherwise) that infringes any copyright, trademark, patent, trade secret, or other proprietary rights of any third party, including, but not limited to, the unauthorized copying of copyrighted material, the digitization and distribution of photographs from magazines, books, or other copyrighted sources, and the unauthorized transmittal of copyrighted software. Collection of Personal Data. Using the Services to collect, or attempt to collect, personal information about third parties without their knowledge or consent and in violation of applicable law.
  • Reselling our Services: Reselling our services without our permission.
  • Network Disruptions and Unfriendly Activity: Using the Services for any activity that adversely affects the ability of other people or systems to use IT Freedom Services or the Internet. This includes “denial of service” (DoS) attacks against another network host or individual user. Interference with or disruption of other network users, network services or network equipment is prohibited. It is the User’s responsibility to ensure that their network is configured in a secure manner. A User may not, through action or inaction, allow others to use their network for illegal or inappropriate actions. A User may not permit their network, through action or inaction, to be configured in such a way that gives a third party the capability to use their network in an illegal or inappropriate manner.
  • News and Messages: IT Freedom Users should use their best judgment when posting to any newsgroup. Many groups have charters, published guidelines, FAQs, or “community standards” describing what is and is not considered appropriate. Usenet can be a valuable resource if used properly. IT Freedom may cancel any postings that violate this Policy.
  • Traffic and Unknown Third Parties: Using the Services to route or relay traffic between unknown third parties or as a source of denial of service attacks, worms, or other service sending traffic to unknown third parties; any such traffic may be de-prioritized, throttled, or otherwise restricted without notice.

Reporting Violations

If you believe that there is a violation of this policy, we request that you report it to us at: IT Freedom, Inc. Attention: Abuse 8711 Burnet Road, Suite C-21 Austin, Texas 78757 512-351-7990

Policy Revisions

We may revise, amend, or modify this policy at any time and in any manner. Any revision, amendment, or modification will be posted at
Web Analytics