Acceptable Use Policy
This Acceptable Use Policy ("AUP") specifies the actions prohibited by Peer5 Inc. Peer5 Inc. is a company incorporated under the laws of the State of Delaware (hereinafter referred to as "Peer5"). This AUP specifies prohibited user behavior of Peer5's Content Delivery Network which is based on third party CDNs and a p2p network operated by Peer5 ("CDN"). Peer5 reserves the right to modify this AUP at any time by posting an updated version of this document at Peer5's website.
Peer5's CDN and all other services may be used only for lawful purposes. Transmission, distribution or storage of any material in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property right used without proper authorization, and material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws.
Peer5 allows "adult content" providers to use Peer5's services. There are no restrictions on what "adult content" providers may serve, however all content
must be legal under the laws of the United States of America and each of the 50 States of the Union, as well as to any other applicable law and any
restrictions that may apply with respect to age limitation and verification of users, etc. "Adult content" providers must abide by all other Terms of
Service and the Services and License Agreement at all times. The use of Peer5's services to store, post, display, transmit, advertise or otherwise make
available child pornography is prohibited. Peer5 will as required by law, notify law enforcement agencies when it becomes aware of the presence of child
pornography on, or being transmitted through its services.
Malicious or Unauthorized Hacking
Violations of system or network security are strictly prohibited, and Peer5 reserves the right to immediately suspended or terminate an account suspected in such violation, without notice. Moreover, an authorized breach of system or network security may result in criminal and civil liability. Peer5 will investigate incidents involving such violations and may involve and will cooperate with law enforcement if a criminal violation is suspected. Examples of system or network security violations include, but are not limited to, the following: Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system and network; Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system and network; Interference with service to any user, host or network including, without limitation, mail-bombing, flooding, deliberate attempts to overload a system and broadcast attacks; Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting.
Posting the same or similar message to one or more newsgroups (excessive cross-posting or multiple-posting, also known as "SPAM") is explicitly prohibited.
Sending unsolicited mail messages (SPAM), including, without limitation, commercial advertising and informational announcements, is explicitly prohibited. A user shall not use another site's mail server or system to relay mail without the express permission of the site. In addition, this policy applies to any email or content transmitted by a user or on a user's behalf which uses a Peer5 account as a mailbox for responses or promotes content hosted or transmitted using Peer5 facilities, or which indicates in any way that Peer5 was involved in the transmission of such email or content.
Complaints regarding suspected Illegal Use or System or Network Security issues should be sent to firstname.lastname@example.org
Infringement Notifications under the Digital Millennium Copyright Act
To file a notice of infringement with Peer5, you must provide a written communication that contains your legal signature (we cannot process a DMCA complaint without a signature) by email (in PDF format), fax or regular mail that sets forth the items specified below. Please note that in addition to being forwarded to the person who provided the allegedly infringing content, a copy of your legal notice will be sent to a third-party which may publish and/or annotate it. As such, your letter (with your personal information removed) may be forwarded to Chilling Effects ( http://www.chillingeffects.org).
To expedite our ability to process your request, please use the following format (including section numbers):
9. Counter Notifications
10. The administrator of an affected site or the provider of affected content may make a counter notification pursuant to sections 512(g)(2) and (3) of the Digital Millennium Copyright Act. When Peer5 receives a counter notification, we may reinstate the material in question. To file a counter notification with Peer5, you must provide a written communication that contains your LEGAL SIGNATURE (we cannot process a DMCA complaint without a signature) by email (in PDF format), fax or regular mail that sets for the items specified below. Please note that you will be liable for damages (including costs and attorney's fees) if you materially misrepresent that a product or activity is not infringing the copyrights of others. Accordingly, if you are not sure whether certain material infringes the copyrights of others, we suggest that you first contact an attorney. A sample counter notification may be found at Chilling Effects.
For any additional questions regarding the DMCA process for Peer5 services, please contact us at email@example.com
Peer5 demonstrates its commitment to customers' privacy by providing this statement. We will do everything in our power to ensure your right to privacy. We are committed to developing long lasting relationships that are built on trust.
Personal Data Transmissions Are Encrypted
When you order from Peer5, all your personal information is protected. We use Secure Sockets Layer (SSL), the industry standard, for encrypting all personal information. Peer5 keeps all your information confidential.
Collection of Personal Data
We may also use third-party cookies to collect statistics in aggregate form in analysis tools such as Google Analytics. Other users may be temporarily exposed to details of your IP address.
Peer5 is dedicated to providing the best content delivery network service possible to every one of our clients. We are also dedicated to staying on top of available technology. While Peer5 strives to provide our clients with reasonable notification, Peer5 reserves the right to change its policy at any time to meet the needs of our customers, changing laws and new technology.
"Please note that by using our services, you are also agreeing to use the services by utilizing a technology provided by a p2p services provider (the "p2p Provider"). The p2p Provider uses your local resources to store content temporarily, upload content to other users, and download content from different users that can effectively contribute to your experience and other users' experience, while temporarily exposing other users to your IP address. The p2p Provider is doing some computation on your device to choose the best sources, negotiate the pieces of information, validate the correctness of pieces and similar actions that are required to operate the p2p network. Please be aware that though p2p Provider strives to limit such effect, the use by p2p Provider of your resources may put a burden on your internet connection and downloading speed, and might increase your use under a limited internet connection package."