Call: +1 (630)548-9999
Email: support@ihsystem.com
Privacy Policy

IHSYSTEM Acceptable Use Policy

Acceptable Use Policy
This Acceptable Use Policy (the "Policy") specifies the actions prohibited by IHSYSTEM for users of the IHSYSTEM Internet Data Center and Network. IHSYSTEM reserves the right to modify this Policy at any time, effective upon posting of the modified Policy to this URL: http://www.IHSYSTEM.com/privacy.php

Illegal Use
The IHSYSTEM network may be used only for lawful purposes. Transmission, distribution, or storage of any material in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret, or other intellectual property right used without proper authorization, and material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws.

System and Network Security
Violation of system or network security is prohibited, and may result in criminal and civil liability. IHSYSTEM will investigate incidents involving such violations and may involve and will cooperate with law enforcement if a criminal violation is suspected. Examples of system or network security violations include, without limitation, the following:
Unauthorized access to or use of data, systems, or networks, including any attempt to probe, scan, or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network.
Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network.
Interference with service to any user, host, or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system, and broadcast attacks.
Forging of any TCP-IP packet header or any part of the header information in an e-mail or a newsgroup posting.
Introduction of malicious programs into the network or server (e.g., viruses and worms).

E-mail
Sending unsolicited mail messages, including, without limitation, commercial advertising and informational announcements, is explicitly prohibited. A user shall not use another site's mail server to relay mail without the express permission of the site.

Usenet Posting the same or similar message to one or more newsgroups (excessive cross-posting or multiple-posting also known as SPAM) is explicitly prohibited.
IHSYSTEM reserves the right to immediately discontinue services upon verbal or written notice if user is in violation of this Policy and user shall be responsible for all charges incurred as of the date of termination. Notice may be provided by any means, including voicemail or e-mail.
INDIRECT OR ATTEMPTED VIOLATIONS OF THE POLICY, AND ACTUAL OR ATTEMPTED VIOLATIONS BY A THIRD PARTY ON BEHALF OF A IHSYSTEM CUSTOMER OR A CUSTOMER'S END USER, SHALL BE CONSIDERED VIOLATIONS OF THE POLICY BY SUCH CUSTOMER OR END USER.
IHSYSTEM Interim Designation of Agent to Receive Notification of Claimed Infringement can be found in this document.
Complaints regarding Illegal Use or System or Network Security issues should be sent to abuse@IHSYSTEM.com

Complaints regarding email abuse should be sent to abuse@IHSYSTEM.com.
Complaints regarding USENET abuse or SPAM should be sent to abuse@IHSYSTEM.com.
For live incidents, please contact IHSYSTEM Internet Abuse Investigations at Abuse@IHSYSTEM.com 24-hours per day.

Interim Designation of Agent
Interim Designation of Agent to Receive Notification of Claimed Infringement
This notification is made without prejudice or admission as to the applicability of the Digital Millennium Copyright Act, 17 U.S.C., Section 512(c), to IHSYSTEM.

Full Legal Name of Service Provider
IH Systems Inc.
Alternative Name(s) of Service Provider (including all names under which the service provider is doing business)
IHSYSTEM Internet Data Center

Name of Agent Designated to Receive Notification of Claimed Infringement
Jay Khattek

E-mail Address of Designated Agent to whom Notification should be sent
Jay@IHSYSTEM.com

Spot Light
Disaster Recovery & Business Continuity
AVAILABILITY for the Always-On
Private vs Public Cloud Computing
Private Cloud vs Public
view all
Special Offers
view all
Request a Quote