General Statement: Trinity is dedicated to the unrestricted free transmission of information via the Internet and its many resources. Our goal is to deliver enterprise quality on-demand gaming- and voice-related services to all of our customers.
Trinity is dedicated to protecting the source and distribution of information and protecting the rights and privileges of those utilizing it. Trinity does not purport to be the content or server or gaming police; our duty in the process of information dissemination and server operation is simply to act as conduit between interested parties. Not withstanding anything found herein, Trinity follows all local, state and federal laws pursuant to the services delivered over the internet and directly related to our network and internal systems. The purpose of the acceptable use policy is to inform all Customers of anticipated customer use. Due to the myriad of possibilities in maintaining a network comprised of thousands of servers, this document is intended to act as a guideline to service and not to be all encompassing.
Network: The primary purpose of the Trinity public network is to transmit information (packets) to and from Customer servers and data storage services. Proper use of the network is to utilize the network in any way so long as you do not violate any local, state, or federal laws or generate harm to the network or interfere with the use of services of other users utilizing the same network. All Customers are granted equal access to the network. Violation, misuse, or interference of the network will result in a violation of the AUP and shall result in methods of resolution under the acceptable use policy.
Server Content: Trinity does not actively monitor dedicated server content, game server content, chat logs, or anything else operating on our system for review. Trinity believes in the free dissemination of information via our services. Server content will only be reviewed upon complaint by verified third parties. Content that does not violate local, state and federal law or the acceptable use policy is deemed in compliance and shall remain intact. Content deemed in violation will be addressed pursuant to the methods of resolution under the acceptable use policy.
IP Addresses: All Internet Protocol (IP) Addresses are owned and managed by Trinity and/or its lessors and contractors. IP Addresses are non-transferable from Trinity and Customer retains no ownership or transfer rights to IP Addresses. All IP Addresses are assigned by the Trinity engineering team on a per server basis. Attempted use of IP addresses not originally allocated for use or IP addresses use on non-assigned servers is a violation of the acceptable use policy. Violation of the IP Address policy will result in methods of resolution under the acceptable use policy. All IP Addresses are currently registered to their respective owners via Arin.net assignments. Private IP assignments are available to qualified Customers.
IRC: Trinity absolutely prohibits the use of IRC servers connected to public IRC networks or servers. IRC servers that result in interference of service, malicious network activity or increased demand on network security services are in direct violation of the acceptable use policy. Violation of the IRC policy will result in methods of resolution under the acceptable use policy.
The following list represents violations of Acceptable Use Policy and will be subject to immediate redress under the methods of resolution as described in the acceptable use policy.
1.Copyright Infringement: Direct copyright infringement as defined and noted under Title 17, Section 512 of the United States Code are a direct violation of the acceptable use policy.
2.Unsolicited Email: The sending or receiving of mass unsolicited email (SPAM) is a direct violation of the acceptable use policy. This includes the direct sending and receiving of such messages, support of such messages via web page, splash page or other related sites, or the advertisement of such services.
3.Email Bombing: The sending, return, bouncing or forwarding of email to specified user(s) in an attempt to interfere with or over flow email services is a direct violation of the acceptable use policy.
4.Proxy Email (SPAM): The use of dedicated services to proxy email unsolicited users is a direct violation of the acceptable use policy. Proxy email is defined as the use of dedicated services to act in concert with other services located inside and outside the network to achieve mass unsolicited email (SPAM) to unrelated third parties.
5.UseNet SPAM: The use of dedicated services to send, receive, forward, or post UseNet unsolicited email or posts is a direct violation of the acceptable use policy. This includes UseNet services located within the Trinity network or unrelated third party networks.
6.Illegal Use: Any use of dedicated services in direct attempt of statutory illegal activities is a direct violation of the acceptable use policy. This includes, but is not limited to: death threats, terroristic threats, threats of harm to another individual, multi-level marketing schemes, "ponzi schemes", invasion of privacy, credit card fraud, racketeering, defamation, slander, and other common illegal activities.
7.Child Pornography: Trinity has a zero stance policy on child pornography and related sites. The hosting of child pornography or related sites or contact information is in direct violation of federal law and the acceptable use policy. Maximum and rapid enforcement and reporting action is taken against this particular violation. Absolutely keep it off our systems.
8.Threats & Harassment: The Trinity network can be utilized for any type of individual, organizational or business use. This does not include threats or harassment to individuals, organizations or businesses unless it falls within the bounds of protected free speech under the first amendment. Trinity seeks to serve only as the medium of exchange for information and refrains from decisions on freedom of speech.
9.Fraudulent Activities: Trinity prohibits utilizing dedicated services or network services for fraudulent activities. Notification of fraudulent activities by verified third parties can result in violation of the acceptable use policy.
10.Denial of Service: Trinity absolutely prohibits the use of dedicated services or network services for the origination or control of denial of service attacks or distributed denial of service attacks. Any relation to DOS or DDOS type activity is a direct violation of the acceptable use policy.
11.Terrorist Websites: Trinity prohibits the use of dedicated services for the hosting of terrorist related websites. This includes sites advocating human violence and hate crimes based upon religion, ethnicity, or country of origin.
12.Distribution of Malware: Trinity prohibits the storage, distribution, fabrication, or use of malware including virus software, root kits, password crackers, adware, key stroke capture programs and other programs normally used in malicious activity. Programs used in the normal ordinary course of business are deemed acceptable. Example: Security Company hosting at Trinity analyzes the latest root kit for new security analysis software.
13.Phishing - Trinity strictly prohibits any activity associated with Phishing or systems designed to collect personal information (name, account numbers, usernames, passwords, etc.) under false pretense. Splash pages, phishing forms, email distribution, proxy email or any relation to phishing activities will result in immediate removal.
Disclosure to Law Enforcement: Occasionally, Trinity is required by law to submit customer information to law enforcement officials when presented with a valid subpoena from a court with proper jurisdiction. Information requested is disclosed as directed pursuant to the subpoena. Trinity utilizes great care in keeping customer information safe and private and will only release information described in the subpoena. Trinity will notify customer of the information request as allowed by the subpoena.
Methods of Resolution for Violations under the Acceptable Use Policy: The ultimate goal of Trinity is to balance the rights and interest of our customers in the highly evolving Internet world. Trinity understands the challenges of hosting companies, resellers, businesses, organizations and other customers who may have third party violations occur due to the nature of their business. The goal to our methods of resolution is to mitigate any service interruptions while resolving any potential violations under the policy. Our sales, support and abuse staff are dedicated to working with you in resolving potential violations and are available via phone or email. The methods of resolution below form the framework for a resolving all potential violations. Timing for resolution differs according to the degree of the violation, the nature of the violation, involvement of law enforcement, involvement of third party litigation, or other related factors. Overall, Trinity is dedicated to working with the Customer in resolving all potential violations prior to any service interruptions.
• Step 1: First alleged violation of AUP: a ticket will be generated under the master user account with information regarding the potential violation of the acceptable use policy. This is often a fact finding email requiring further information or notifying Customer of the potential violation and the required actions to resolve the issue.
• Step 2: Acknowledgment of violation of AUP: a ticket is generated under the master user account with information specific to the violation. This ticket will also include any additional facts about the situation and will notify customer of the action required to resolve the violation.
• Step 3: Violation of AUP disregarded, not properly addressed, or continuing violation: if a ticket has been disregarded, not properly addressed, or resolved by the customer for a specified period of time, Trinity engineers will turn the network port to the specified services off. As soon as the violation is addressed, the public access is restored and service continues as normal.
• Step 4: Failure to address violation and remove violation: if customer fails to address the violation AND resolve the violation, a suspension of services will occur. This is a last resort for Trinity and requires a complete failure in the resolution process on behalf of the Customer. A permanent suspension of services includes reclamation of all dedicated services and data destroyed at the end of the current billing cycle.
• Disclaimer - Trinity retains the right, at its sole discretion, to refuse new
service to any individual, group, or business. Trinity also retains the right to
discontinue service with notice for repeated violation of the acceptable use policy over time.