Web site design and hosting for professionals
No nonsense web sites to present your professional image
Comments or problems encountered with this web site can be sent to webmaster
Terms of Service
Sterling Consulting™ Network, a division of Sterling Consulting™, offers its services under the following Terms of Service, also known as an Acceptable Use Policy (AUP). Sterling Consulting™ Network reserves the right to modify this Policy at any time to stay in compliance with any laws, regulations and security requirements. By using Sterling Consulting Network services, any customer, employee or third party unconditionally accepts the terms of this policy
Sterling Consulting™ Network may be used only for lawful purposes. Transmission, distribution or storage of any material in violation of any applicable law or regulation coming to or from any unauthorized network or system is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property rights used without proper authorization; government and military data protected by law and national security; university and academic data protected by public policy; and material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws. Any violation of the above which compromises the integrity of Sterling Consulting™ Network or any other network is strictly prohibited.
ACCESS TO UPDATE WEB SITE
Sterling Consulting™ Network offers its web hosting and e-mail services at low rates as a service to our customers. We do all the actual web site design, coding and maintenance. We may allow direct update access to specific customers from time to time at our sole discretion. But the basic reason we offer the services and rates that we do is because we are in the the web site development business and web hosting is simply a courtesy to our clients. In addition, we also normally restrict such access for security reasons on behalf of all of our customers.
NETWORK AND MACHINE RESOURCES
Sterling Consulting™ Network reserves the right to monitor and allocate network and machine resources. Sterling Consulting Network in its sole discretion and upon reasonable notice to customer reserves the right to discontinue any hosting account and/or any script which causes excessive server load and/or uses excessive server and network resources.
SYSTEM AND NETWORK SECURITY
Violations of system or
network security are prohibited, and may result in criminal and civil liability.
Sterling Consulting Network will investigate incidents involving such violations
and may involve and cooperate with law enforcement authorities if a criminal
violation is suspected. Sterling Consulting™
Network respects the privacy of
customer data and vigilantly protects that data and ALL customers who host with
Network. If any violation of the law or this AUP is
suspected, Sterling Consulting™
Network reserves the right to investigate. Use of
Network constitutes consent to monitoring. Examples of
unlawful acts, system, or network security violations include, without
limitation, the following:
Sending unsolicited mail messages, including, without limitation, unwanted advertising and informational announcements, is explicitly prohibited. A user shall not use another site's mail server to relay mail without the express permission of the site owner. Legitimate mailing lists and subscriber lists are acceptable. Otherwise, it is spam.
Posting the same messages
to multiple newsgroups (excessive cross-posting or multiple-posting, also known
as "SPAM") is expressly prohibited.
INDIRECT OR ATTEMPTED VIOLATIONS OF THE POLICY, AND ACTUAL OR ATTEMPTED VIOLATIONS BY A THIRD PARTY ON BEHALF OF A STERLING CONSULTING™ NETWORK CUSTOMER OR A CUSTOMER'S END USER, SHALL BE CONSIDERED VIOLATIONS OF THE POLICY BY SUCH CUSTOMER OR END USER.
If your web site is hosted on Sterling Consulting™ Network servers and you use another ISP to SPAM from in order to reference your Sterling Consulting Network site by IP address or domain name, you are violating Sterling Consulting™ Network policy and possibly the law.
Any type of denial of service attack from valid or invalid addresses is a violation of Sterling Consulting Network security policy and against the law.
If you have been granted password privileges for FTP or telnet, sharing your password with an unauthorized user or third party is strictly prohibited.
Complaints regarding illegal Use or System or Network Security issues should be sent to email@example.com
Complaints regarding email abuse should be sent to firstname.lastname@example.org
Complaints regarding USENET abuse or SPAM should be sent to email@example.com
The Digital Millennium Copyright Act provides limitations for service provider liability relating to material online with regard to information residing, at the discretion of the user, on a system or network that the service provider controls or operates. 17. U.S. 512(c). The designated agents for notification of claimed infringement are:
INTERACTION WITH STERLING CONSULTING NETWORK STAFF
Any threat, vulgar and profane language directed at any Sterling Consulting™ Network staff member through phone or email may result in immediate termination of an account. Any violation of this policy by any employee, contractor or third party programmer of Sterling Consulting™ Network should be reported immediately. Bottom line is let's work together toward a mutually beneficial relationship and create a prosperous and responsible Internet community.