THIS SYSTEM IS FOR THE USE OF AUTHORIZED USERS ONLY!



IT IS EVERY USER'S RESPONSIBILITY TO BE AWARE OF THIS POLICY. Use of the Quantavox network and facilities constitutes acceptance of this policy.

The Quantavox team holds the safety, security, and privacy of its customers, and employees as our paramount concerns in all aspects of our business. The Quantavox Information Technology (QIT) department maintains policies about the use and security of its systems in the interests of protecting its users and ensuring the reliability of mission critical systems. All users of our facilities are expected to be familiar with these policies. Violations of QIT policies can lead to the suspension of computer account(s) pending investigation of circumstances. Serious violations QIT policy will be referred directly to the appropriate security personnel and/or outside authorities. Unauthorized use of the Quantavox computing facilities can be a criminal offense. The penalties may be as severe as suspension or termination of employment/services/partenrships with Quantavox and its subsidiaries and/or criminal prosecution by appropriate law enforcement agencies.

Access/User Responsibilities:
IT IS EVERY USER'S RESPONSIBILITY TO BE AWARE OF THIS POLICY. Any user who finds a possible security lapse on any QIT system is obligated to report it to QIT. Do not attempt to use the system under these conditions until the system administrator has investigated and resolved the problem. The user agrees to remain entirely liable for any and all activities conducted via the user's account. Each user is responsible for all matters pertaining to the proper use of their account. This includes choosing safe passwords, (e.g., passwords that are at least eight characters long, are not found in any dictionary, and contain a combination of numbers and letters) and ensuring that file protections are set correctly (where applicable). The QIT permits access to systems on the understanding that the information in those systems is confidential. Each user must take appropriate measure to preserve the confidentiality of that information. In addition, system and security administrators conduct regular reviews of file system security and login names, including password checks. Users found to have easily guessed passwords may be required to change them the next time they log on. Users may not share passwords and login accounts. Every user is provided with an account in his/her own name, accessible with a private password to access specific computer systems/resources maintained by QIT. These accounts are to be used solely for the performance of assigned user/administrator/customer/partner functions within QIT. Individual QIT login names and/or passwords cannot be transferred to or used by another individual. It is the responsibility of Departmental Supervisors to advise QIT when employees leave unexpectedly and/or with short notice so that the data in their accounts can be protected/deactivated/deleted. Unauthorized attempts by the user to gain access to another user's QIT login name and/or password or to gain privileged access or access to any account, applications, and/or data not belonging to the user on any QIT system is not permitted. No QIT system may be used for unethical, illegal, or criminal purposes, or to damage any part of the QIT network or accounts on QIT network, as well as other networks or accounts on other networks.
Use of QIT facilities by outside individuals or organizations requires special permission from QIT and to the appropriate software vendors where applicable. Use of any Quantavox administrative system by outside individuals or organizations outside requires explicit authorization from the Quantavox team and all appropriate data custodians. Use of QIT systems for commercial uses, except by approved outside organizations, is strictly prohibited. Such prohibited uses include, but are not limited to, development of programs, data processing or computations for commercial use and preparation and presentation of advertising material. QIT reserves the right to prevent other Internet users from accessing its network, either in part or in whole, for any reason deemed detrimental to the QIT network or computer facilities.

Conduct:
Frivolous, disruptive, or inconsiderate conduct in the computer labs or terminal areas is not permitted. Users are prohibited from using the QIT network or computer facilities for the purpose of harassing or threatening other people. No QIT system may be used for playing computer games.

Connectivity:
The user is responsible for providing and maintaining the necessary cabling, hardware and software used for dial-up service at the user's site. All telephone company installation and recurring charges are the user's responsibility. It is understood that QIT does not own or control the telecommunications facilities used to access its network, except those specifically identified as belonging to QIT. Dial-up accounts are not to be used for permanent network connectivity or nailed connections (connections that remain up even though no interactive usage occurs).

Content:
QIT exercises no control whatsoever over the content of the information passing through its network. The user can not use the QIT network to transmit certain kinds of information which violates export control laws and regulations of the United States, whether that information is received abroad or by foreign nationals within the United States. Since QIT exercises no control whatsoever over the content of information passing through its network, the entire burden of complying with such laws and regulations rests with the user. The user agrees to comply with such laws and regulations and to indemnify and hold QIT harmless from any damages it may suffer resulting from any violation of the export control laws of the United States. In short, transmission of any material in violation of any local, state, federal or international regulation(s) is prohibited. This includes, but is not limited to, copyrighted material, material legally judged to be threatening or obscene, or material protected by trade secret. Copying, storing, displaying, or distributing copyrighted material using Quantavox systems or networks without the express permission of the copyright owner, except as otherwise allowed under the copyright law, is prohibited. Under the Federal Digital Millennium Copyright Act of 1998, repeat infringements of copyright by a user can result in termination of the user's access to the Quantavox systems and networks.

Damages:
QIT will not be responsible for any damage the user suffers from use of QIT network. This includes, but is not limited to, loss of data resulting from delays or service interruptions caused by QIT's own negligence, QIT's vendors, other third parties, or the user's errors or omissions. Use of any information obtained via QIT's network is at the user's own risk. QIT specifically denies any responsibility for the accuracy or quality of information obtained through its network. The user agrees to indemnify and hold harmless QIT from any claims resulting from the user's use of the service which damages the user or another party.

Data Integrity/Ownership:
All data archived by QIT for recovery purposes is the property of QIT.

Email:
Electronic mail on all our systems is as private as we can make it. Attempts to read another person's electronic mail or other protected files is prohibited and will be treated with the utmost seriousness. The system administrators will not read mail or non-world-readable files unless absolutely necessary in the course of their duties, and will treat the contents of those files as private information at all times. Undeliverable mail is directed to the system administrators for purposes of assuring reliable e-mail service. User's cannot use the QIT network to distribute unsolicited bulk electronic mail (UBE) or inappropriate commercial postings (spam) to Usenet newsgroups. UBE or spam directing recipients to a site served by QIT network is prohibited. No QIT system may be used for sending nuisance messages such as chain letters and obscene or harassing messages. Users are not allowed to "impersonate" other users or user groups, real or fabricated, by modifying email header information in an effort to deceive the recipient(s); i.e., email spoofing is specifically prohibited. QIT policy prohibits the use of Quantavox resources to solicit contributions or support for any charity, except those authorized by the Quantavox team.

Resources:
All users of QIT login names and administrative systems should be aware that these systems are QIT resources. Many people use the QIT systems for daily work. Obstructing this work by consuming gratuitously large amounts of system resources (disk space, CPU time, print quotas) or by deliberately crashing the machine(s) will not be tolerated. It is the user's responsibility to comply with this policy by running large jobs at off-peak hours. At no time may the user consume excessive network resources, including but not limited to, disk space, RAM, processor time, network bandwidth, etc., that could cause denial of service to other users of QIT resources.
All users of QIT login names and administrative systems should be aware that these systems are QIT resources. Many people use the QIT systems for daily work. Obstructing this work by consuming gratuitously large amounts of system resources (disk space, CPU time, print quotas) or by deliberately crashing the machine(s) will not be tolerated. It is the user's responsibility to comply with this policy by running large jobs at off-peak hours. At no time may the user consume excessive network resources, including but not limited to, disk space, RAM, processor time, network bandwidth, etc., that could cause denial of service to other users of QIT resources.

System Monitoring/Legal Action:
All access, access attempts, and use are recorded in various system logs. System and security administrators review the logs routinely in the course of their work. Formal security audits including the review of system logs will occur at least twice yearly, and are subject to increase in frequency when abnormal and/or suspicious data is discovered during the course of regular system maintenance and/or monitoring. QIT facilities and computer systems are for the use of authorized users only. Individuals using QIT computer systems without authority, or in excess of their authority, are subject to having all of their activities on QIT computer systems monitored and recorded by system personnel. In the course of such monitoring individuals improperly using the QIT computer systems, or in the course of system maintenance, the activities of authorized users may also be monitored. Anyone using this QIT computer systems expressly consents to such monitoring and is advised that if such monitoring reveals evidence of criminal activity, system personnel may provide the evidence of such monitoring to law enforcement officials. QIT reserves the right to cooperate with law enforcement to the extent permissible by law. QIT's network may only be used for lawful purposes and in accordance with this policy. This policy may be modified by QIT at any time. Continued use of QIT's network following such modifications constitutes acceptance of this policy, as modified. If any provision of this policy is held by a court of competent jurisdiction to be contrary to law, the remaining provisions of this policy will remain in full force and effect. This policy supersedes all previous representations, understandings, or agreements and shall prevail not withstanding any variance with terms and conditions of any order submitted.

IT IS EVERY USER'S RESPONSIBILITY TO BE AWARE OF THIS POLICY. Use of the Quantavox network and facilities constitutes acceptance of this policy.


THIS SYSTEM IS FOR THE USE OF AUTHORIZED USERS ONLY!


Copyright © Quantavox Consulting. All rights reserved.
Quantavox, quantavox.com, quantavox.net, quantavox.org,
quantavox.biz, quantavox.info, and quantavox.cc are trademarks of Quantavox Consulting.