Acceptable Use Policy

This Acceptable Use Policy (the "Policy") specifies the actions prohibited by Verizon Japan Ltd ("Verizon Enterprise Solutions ") to users of the Verizon Enterprise Solutions Internet Service ("Service") and/or the Verizon Enterprise Solutions Network. Verizon Enterprise Solutions reserves the right to modify this Policy at any time, effective upon posting of the modified Policy to this URL. Any modification to this Policy will be made when Verizon Enterprise Solutions feels it is appropriate and it is the user's responsibility to ensure their awareness of any such changes.

For the purposes of this Use Policy, "user(s)" shall mean "(a) customer(s) or anyone who uses or accesses the Service and/or the Verizon Enterprise Solutions Network". "Verizon Enterprise Solutions Network" shall mean the telecommunications and Internet system(s), points or presence, network hubs and host computers that Verizon Enterprise Solutions, all entities controlled by, controlling, or under common control with Verizon Enterprise Solutions, and/or subcontractors have the right to operate under applicable law.

1. ILLEGAL USE

Users may use the Service and the Verizon Enterprise Solutions Network only for lawful purposes. Transmission, distribution or storage of any material in violation of any law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or intellectual property right used without proper authorization, and material that is obscene, defamatory, constitutes an illegal threat or violates export control laws.

2. THE NETWORK

  1. The user acknowledges that Verizon Enterprise Solutions is unable to exercise control over the content of the information passing over the Verizon Enterprise Solutions Network. Therefore, Verizon Enterprise Solutions is not responsible for the content of any message whether or not the posting was made by a Verizon Enterprise Solutions customer.
  2. The Verizon Enterprise Solutions Network may be used to link into other networks worldwide and the user agrees to conform to the use policies of these networks.
  3. In addition the user undertakes to conform to the Internet protocols and standards.
  4. The user may not circumvent user authentication or security of any host, network, or account (referred to as "cracking" or "hacking"), nor interfere with service to any user, host, or network (referred to as "denial of service attacks").
  5. The user may not use application that overloads the Verizon Enterprise Solutions Network by whatever means. Use of IP multicast other than by means provided and coordinated by Verizon Enterprise Solutions is likewise prohibited.
  6. Users who violate systems or network security may incur criminal or civilliability. Verizon Enterprise Solutions will fully co-operate with investigations of suspected criminal violations, violation of systems or network security under the leadership of the police, relevant authorities, etc.

3. SYSTEMS AND NETWORK SECURITY

Violations of system or network security are prohibited, and may result in criminal and civil liability. Verizon Enterprise Solutions will investigate incidents involving such violations and will involve and co-operate with the police, relevant authorities, etc. if a criminal violation is suspected. Examples of system or network security violations include, without limitation, the following:

  1. Unauthorised access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorisation of the owner of the system or network;
  2. Unauthorised monitoring of data or traffic on any network or system without express authorisation of the owner of the system or network;
  3. Interference with service to any user, host or network including, without limitation, mail-bombing, flooding, deliberate attempts to overload a system and broadcast attacks;
  4. Forging of any TCP-IP packet header or any part of the header information in an email or newsgroup posting.

If approached with complaints relating to any of the above violations, Verizon Enterprise Solutions will co-operate and assist the police, relevant authorities, etc. with their investigations in order to bring such misuse and violations to an end.

4. E-MAIL

  1. It is explicitly prohibited to send unsolicited mail messages ("junk mail" or "spam") of any kind (commercial advertising, political tracts, announcements) etc.
  2. Users may not forward or propagate chain letters or malicious e-mail.
  3. A user may not solicit mail for any address other than that of the user, except with consent of the owner of the referred address.

5. USENET NEWS

Excessive cross-posting (i.e, posting the same article to large numbers of newsgroups) and posting of irrelevant material to newsgroups is forbidden. Posting binaries to a non-binary newsgroup is also forbidden.

Complaints regarding Illegal Use or System or Network Security issues, Email abuse, USENET abuse or Spamming should be sent to abuse@jp.verizonbusiness.com.

INDIRECT OR ATTEMPTED VIOLATIONS OF THE POLICY, AND ACTUAL OR ATTEMPTED VIOLATIONS BY A THIRD PARTY ON BEHALF OF A VERIZON BUSINESS CUSTOMER OR A CUSTOMER'S END USER, SHALL BE CONSIDERED VIOLATIONS OF THE POLICY BY SUCH CUSTOMER OR END USER.