Unacceptable Use

It is often easier to understand acceptable use by identifying inappropriate use. The following list, while not exhaustive, exemplifies some unacceptable uses:

Creation or Transmission

  • The creation or transmission of any material in violation of any local, provincial, state, or federal law. We must be cognizant that we deal with customers around the world and that laws may vary from one jurisdiction to another.
  • The creation or transmission of material, which is designed or likely to cause annoyance, inconvenience or needless anxiety.
  • The creation or transmission of defamatory material.
  • The creation or transmission of material protected by trade secrets or privacy laws.
  • The transmission of purchased software that would contravene any license agreements imposed on AMS by our Vendors.
  • The creation or transmission of any offensive, obscene or indecent images, data or other material, or any data capable of being resolved into obscene or indecent images or material.
    •  

      Communication

      • The use of profanity, obscenity or other language that may be offensive to another user.
      • Repeated, unsolicited and/or unwanted communication of an intrusive nature is strictly prohibited. Continuing to send e-mail messages or other communications to an individual or organization after being asked to stop is not acceptable.
      • Representation on a Blog, list-serv, or similar IM comment posting venue, to express strong, misleading, or libelous views, which may or may not represent the views of AMS, its employees and/or affiliated individuals.
        •  

          Network

          • Any form of vandalism, including but not limited to, damaging computers, computer systems, or networks, and/or disrupting the operation of the network.
          • Creating and/or placing a computer virus on the network, or working in such a manner that may make it easy for a virus to infect the corporate network.
          • Use of the network for financial gain, commercial activity, or illegal activity. (e.g. hacking, spam)
          • Use of the network for political activity.
          • Use of the network to access pornographic or obscene material.
          • Deliberate unauthorized access to facilities, services, or customer networks accessible via the AMS network.
          • Opening of ‘holes’ in the network to provide unauthorized access to other individuals without consent.
          • Use of another person’s account without consent (System Administrators have implicit permission to manage the all aspects of the network which may include account access).
            •  

              Downloading

              • Copying and/or downloading commercial software or other material in violation of any local, provincial, state, or federal copyright laws. (e.g. downloading music from non law-abiding websites)
                •  

                  Miscellaneous

                  • Wasting employee effort or networked resources, including time and the effort of employees involved in the support and maintenance of those systems.
                  • Corrupting or destroying another employee or user’s data.
                  • Violating the privacy of other employees or users.
                  • Disrupting the work of other employees or users.
                  • Using the AMS network in a way that denies network service to other users.
                  • Continuous use of networking software or hardware after AMS has requested that it be removed because it is deemed inappropriate use and/or causes disruption to the correct functioning of the AMS network and its associated computers.
                  • Disabling of any networking corporate software or hardware used to safeguard, monitor and maintain correct functioning of the AMS network and it’s associated computers.