Rover Technology Fusions
home
Rover Echo - Continuous data protection for individuals and mobile workforces
contact us home member login home
home
home
rover ink rover arc wherever ware products & services about us

Rover Technology Fusions Acceptable Use Policy

This Acceptable Use Policy (“AUP”) applies to all persons and entities (collectively, "customers") using the products and services of Rover Technology Fusions, Rover USA and/or Rover Communications, ("Rover") including Internet service. The policy is designed to protect the security, integrity, reliability, and privacy of both the Rover network and the products and services Rover offers to its customers. Rover reserves the right to modify this policy at any time, effective immediately upon posting of the modification. Your use of Rover's products and services constitutes your acceptance of the AUP in effect at the time of your use. You are solely responsible for any and all acts and omissions that occur during or relating to your use of the service, and you agree not to engage in any unacceptable use of the service.

Rover Technology Fusions seeks to create and foster an on-line community that can be used and enjoyed by all its members. To further that goal, Rover Technology Fusions has developed an Acceptable Use Policy. Although much of what is included here is common sense, Rover Technology Fusions takes these issues very seriously and will enforce its rules to ensure enjoyment by all of its members. Rover Technology Fusions therefore has reserved the right to remove any content posted to its system that it deems offensive, inappropriate or violative of its policies. It also reserves the right to suspend or cancel a subscriber's account for engaging in inappropriate conduct. (Subscribers, of course, also remain legally responsible for any such acts.) In using Rover Technology Fusions, subscribers accept this non-exhaustive list of restrictions as well as those set forth in the Rover Technology Fusions Cable Modem Service Subscription Agreement and agree to use Rover Technology Fusions only for lawful purposes and not to use or allow others to use Rover Technology Fusions in violation of the following guidelines:

  • Unless you have specifically subscribed for commercial grade service, the Rover Technology Fusions service is provided to you for personal, non-commercial use only. This service cannot be used for any enterprise purpose whatsoever whether or not the enterprise is directed toward making a profit. If it is your intention to use this service for these purposes, please contact your local cable operator to inquire whether commercial Rover Technology Fusions service programs are available.

  • The Rover Technology Fusions service may not be used to engage in any conduct that interferes with Rover Technology Fusions's ability to provide service to others, including the use of excessive bandwidth.

  • The Rover Technology Fusions service may not be used to breach or attempt to breach the security, the computer, the software or the data of any person or entity, including Rover Technology Fusions, to circumvent the user authentication features or security of any host, network or account, to use or distribute tools designed to compromise security, or to interfere with another's use of the Rover Technology Fusions service through the posting or transmitting of a virus or other harmful item or to deliberately overload or flood that entity's system.

  • In using the Rover Technology Fusions service, you may not use an IP address or client ID not assigned to you, forge any TCP/IP packet header or any part of the header information in an e-mail or newsgroup posting or probe, scan or test the vulnerability of any system or network by the use of sniffers, SNMP tools or any other method.

  • The Rover Technology Fusions service may not be used to post or transmit content that violates child pornography statutes or contains graphic visual depictions of sexual acts or sexually explicit conduct involving children, or other depictions of children, the primary appeal of which is prurient.

  • The Rover Technology Fusions service may not be used to upload, post, transmit or otherwise make available any materials or content that violate or infringe on the rights or dignity of others. These include, but are not limited to, materials infringing or compromising intellectual property rights or any party's ability to maintain trade secrets and other personal information as private; hate speech; threats of physical violence; harassing conduct; sexually oriented material that is offensive or inappropriate; and unsolicited bulk e-mail.

  • The Rover Technology Fusions service may not be used to engage in or foster any consumer fraud such as illegal gambling, "Make Money Fast" schemes, chain letters, Pyramid, or other investment schemes, or to make or encourage people to accept fraudulent offers of products, items or services, originating from your account, or through a third party which implicates your account or to post or transmit off-topic or commercial messages on bulletin boards.

  • You may not engage in any of the above activities using the service of another Internet provider, while channeling such activities through your Rover Technology Fusions account or using this account as a mail drop for responses.

  • Posting, transmission, re-transmission, or storing material on or through any of Rover’s products or services, if in the sole judgment of Rover such posting, transmission, re-transmission or storage is: (a) in violation of any local, state, federal, or non-United States law or regulation (including rights protected by copyright, trade secret, patent or other intellectual property or similar laws or regulations); (b) threatening or abusive; (c) obscene; (d) indecent; or (e) defamatory. Each customer shall be responsible for determining what laws or regulations are applicable to his or her use of the products and services.

  • Installation or distribution of "pirated" or other software products that are not appropriately licensed for use by customer. Using any program/script/command, or sending messages of any kind, designed to interfere with, or to disable a user's terminal session.

  • Actions that restrict or inhibit anyone - whether a customer of Rover or otherwise - in his or her use or enjoyment of Rover’s products and services, or that generate excessive network traffic through the use of automated or manual routines that are not related to ordinary personal or business use of Internet services.

  • Causing or attempting to cause security breaches or disruptions of Internet communications. Examples of security breaches include but are not limited to accessing data of which the customer is not an intended recipient, or logging into a server or account that the customer is not expressly authorized to access. Examples of disruptions include but are not limited to port scans, flood pings, packet spoofing and forged routing information.

  • Executing any form of network monitoring that will intercept data not intended for the customer.

  • Circumventing user authentication or security of any host, network or account.

  • Introduction of malicious programs into the Rover network or servers or other products and services of Rover (e.g., viruses, Trojan horses and worms).

  • Furnishing false or incorrect data on the order form contract (electronic or paper) including fraudulent use of credit card numbers or attempting to circumvent or alter the processes or procedures to measure time, bandwidth utilization or other methods to document "use" of Rover’s products or services.

  • Sending unsolicited mail messages, including the sending of "junk mail" or other advertising material to individuals who did not specifically request such material, who were not previous customers of the customer or with whom the customer does not have an existing business relationship (e.g., E-mail "spam").

  • Harassment, whether through language, frequency, or size of messages. Creating or forwarding "chain letters" or other "pyramid schemes" of any type.

  • Solicitations of mail or any other E-mail address other than that of the poster's account or service, with the intent to harass or collect replies. Unauthorized use or forging of mail header information.

  • Use of unsolicited E-mail originating from within the Rover network or networks of other Internet Service Providers on behalf of or to advertise any service hosted by Rover or connected via the Rover network.

  • Exporting, re-exporting, or permitting downloads of any content in violation of the export or import laws of the United States or without all required approvals, licenses and exemptions.

Abusable Resources.

Upon notification of the existence of an abusable resource (e.g., news server, unsecured mail relay, or smurf amplifier), the customer shall immediately take all necessary steps to avoid any further abuse of such resource. Any abuse of an open resource that occurs after the customer has received such notification shall be considered a violation of this policy and enforced as such.

Enforcement.

Rover may immediately suspend and/or terminate the customer's service for violation of any provision of this policy upon verbal or written notice, which notice may be provided by voicemail or E-mail. Prior to suspension or termination, Rover attempts to work with our customers to cure violations of this policy and ensure that there is no re-occurrence; however, Rover reserves the right to suspend or terminate based on a first offense.

Electronic Communications Privacy Act Notice

Rover makes no guarantee of confidentiality or privacy of any information transmitted through or stored upon Rover technology, and makes no guarantee that any other entity or group of users will be included or excluded from Rover’s network. In addition, Rover may periodically monitor transmissions over its network for maintenance, service quality assurance or any other purpose permitted by the Electronic Communications Privacy Act, P.L. No. 99-508, as amended open.

Copyright ®1999- Rover Technology Fusions | sitemap | disclaimer



Rover Technology Fusions, Tampa, Florida, considers information security to be of paramount importance. Rover Technology Fusions employees are bonded, insured and specifically trained to understand their responsibilities in keeping all customer information safe and confidential. Rover Technology Fusions employees follow precise security procedures and use state of the art technologies to protect your information against unauthorized access, disclosure, alteration and misuse. Rover Technology Fusions first priority is the security and privacy of your data.

Rover Technology Fusions does not give, sell or transfer your information to a third party for any reason. Rover Technology Specializes is Digital Writing, especially with the Logitech IO pen, Maxell pen and other digital writing pens. Utilizing the best of breed Anoto, and Vision Objects technology, Rover Technology Fusions creates commercial grade applications for business. Whether its digital writing, workflow analysis, tablet PC, forms development, digital forms, forms processing, digital ink, Anoto writing, word recognition, character recognition, Rover Technology speaks your Language. Rover, based in Tampa Florida sells the Rover INK Workflow solution to customers across the globe, within the US and throughout Florida.

Rover Tech Fusions also specializes in backup recovery through its Rover Echo productline. Whether its Continuous Data Protection, CDP, IBM, back-up software, Rover SPARC, laptop backup, IBM CDP, IBM SPARC, USB flash drive, USB credit card flash drive, USB flash card, back up computer files, backup your computer, computer back up, continuous data protection, disaster recovery backup, ibm continuous data protection, laptop storage, rover, rover sparc, rover tech fusions, rover technology fusions, rover usa, Tivoli, Tivoli continuous data protection Rover speaks your language. If you are looking for Rover, Rover USA, Rover Wireless, Technology Fusions, Tech Fusions we are part of the same family.