Online Conduct Policy

As a provider of web site hosting, Internet access, and other Internet-related services, Longstone IT offers its customers and subscribers the means to acquire and disseminate a wealth of public, private, commercial, and non-commercial information. Longstone IT respects that the Internet provides a forum for free and open discussion and dissemination of information, however, when there are competing interests at issue, Longstone IT reserves the right to take certain preventative or corrective actions. In order to protect these competing interests, Longstone IT has developed an On-Line Conduct Policy (OCP), which supplements and explains certain terms of each customer’s respective service agreement and is intended as a guide to the customer’s rights and obligations when utilizing Longstone IT’s services.

This OCP will be revised from time to time. A customer’s use of Longstone IT’s services after changes to the OCP are posted on Longstone IT’s web site,, will constitute the customer’s acceptance of any new or additional terms of the OCP that result from those changes.

No one party owns or controls the Internet. When subscribers obtain information through the Internet, they must keep in mind that Longstone IT cannot monitor, verify, warrant, or vouch for the accuracy and quality of the information that subscribers may acquire. Because Longstone IT cannot monitor or censor the Internet, and will not attempt to do so, Longstone IT cannot accept any responsibility for injury to its subscribers that results from inaccurate, unsuitable, offensive, or illegal Internet communications.

Longstone IT does not review, edit, censor, or take responsibility for any information its subscribers may create. When users place information on the Internet, they have the same liability as other authors for copyright infringement, defamation, and other harmful speech. Also, because the information they create is carried over Longstone IT’s network and may reach a large number of people, including both subscribers and non-subscribers of Longstone IT, subscribers’ postings to the Internet may affect other subscribers and may harm Longstone IT’s business reputation and operations. The following activities are prohibited:

Spamming – Sending unsolicited bulk and/or commercial messages over the Internet (known as “spamming”). It is not only harmful because of its negative impact on consumer attitudes toward Longstone IT, but also because it can overload Longstone IT’s network and disrupt service to Longstone IT subscribers. Also, maintaining an open SMTP relay is prohibited. When a complaint is received, Longstone IT has the discretion to determine from all of the evidence whether the email recipients were from an “opt-in” email list.

Intellectual Property Violations – Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including copyrights, trademarks, service marks, trade secrets, software piracy, and patents held by individuals, corporations, or other entities. Also, engaging in activity that violates privacy, publicity, or other personal rights of others. Longstone IT is required by law to remove or block access to customer content upon receipt of a proper notice of copyright infringement. It is Longstone IT’s policy to terminate the privileges of customers who commit repeat violations of copyright laws.

Obscene Speech or Materials – Using Longstone IT’s network to advertise, transmit, store, post, display, or otherwise make available child pornography or obscene speech or material. Longstone IT is required by law to notify law enforcement agencies when it becomes aware of the presence of child pornography on or being transmitted through Longstone IT’s network.

Defamatory or Abusive Language – Using Longstone IT’s network as a means to transmit or post defamatory, harassing, abusive, or threatening language.

Forging of Headers – Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.

Illegal or Unauthorized Access to Other Computers or Networks – Accessing illegally or without authorization computers, accounts, or networks belonging to another party, or attempting to penetrate security measures of another individual’s system (often known as “hacking”). Also, any activity that might be used as a precursor to an attempted system penetration (i.e. port scan, stealth scan, or other information gathering activity).

Distribution of Internet Viruses, Worms, Trojan Horses, or Other Destructive Activities – Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the network or any connected network, system, service, or equipment.

Facilitating a Violation of this OCP – Advertising, transmitting, or otherwise making available any software, program, product, or service that is designed to violate this OCP, which includes the facilitation of the means to spam, initiation of pinging, flooding, mailbombing, denial of service attacks, and piracy of software.

Export Control Violations – Exporting encryption software over the Internet or otherwise, to points outside the United States.

Usenet Groups – Longstone IT reserves the right not to accept postings from newsgroups where we have actual knowledge that the content of the newsgroup violates the OCP.

Other Illegal Activities – Engaging in activities that are determined to be illegal, including advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, and pirating software.

Other Activities – Engaging in activities, whether lawful or unlawful, that Longstone IT determines to be harmful to its subscribers, operations, reputation, goodwill, or customer relations.

The responsibility for avoiding the harmful activities just described rests primarily with the subscriber. Longstone IT will not, as an ordinary practice, monitor the communications of its subscribers to ensure that they comply with Longstone IT policy or applicable law. However, when Longstone IT becomes aware of harmful activities it may take any action to stop the harmful activity, including but not limited to, removing information, shutting down a web site, implementing screening software designed to block offending transmissions, denying access to the Internet, or take any other action it deems appropriate.

Longstone IT anticipates that customers and subscribers will cooperate with Longstone IT in any corrective or preventive action that Longstone IT deems necessary. Failure to cooperate with such corrective or preventive measures is a violation of Longstone IT policy.

Longstone IT also is concerned with the privacy of on-line communications and web sites. In general, the Internet is neither more nor less secure than other means of communication, including mail, facsimile, and voice telephone service, all of which can be intercepted and otherwise compromised. As a matter of prudence, however, Longstone IT urges its subscribers to assume that all of their on-line communications are insecure. Longstone IT cannot take any responsibility for the security of information transmitted over Longstone IT’s facilities.

Longstone IT will not intentionally monitor private electronic mail messages sent or received by its subscribers unless required to do so by law, governmental authority, or when public safety is at stake. Longstone IT may, however, monitor its service electronically to determine that its facilities are operating satisfactorily. Also, Longstone IT may disclose information, including but not limited to, information concerning a subscriber, a transmission made using our network, or a web site, in order to comply with a court order, subpoena, summons, discovery request, warrant, statute, regulation, or governmental request. Longstone IT assumes no obligation to inform the subscriber that subscriber information has been provided and in some cases may be prohibited by law from giving such notice. Finally, Longstone IT may disclose subscriber information or information transmitted over its network where necessary to protect Longstone IT and others from harm, or where such disclosure is necessary to the proper operation of the system.

Finally, Longstone IT wishes to emphasize that in signing the service agreement, subscribers indemnify Longstone IT for any violation of the service agreement, law, or Longstone IT policy, that results in loss to Longstone IT or the bringing of any claim against Longstone IT by any third-party. This means that if Longstone IT is sued because of a subscriber’s or customer of a subscriber’s activity, the subscriber will pay any damages awarded against Longstone IT, plus costs and legal fees.

Any complaints about a subscriber’s violation of this OCP should be sent to