Versatile Web Technologies does not allow adult-related Web content on its servers
nor does it design adult related sites.
The Internet is a global communication tool, and Versatile Web
Technologies has clients across the US and around the world. Because
there are varying ideas across the nation/world of what is considered
"adult-related Web content", we use the following as a definition
of "adult content":
site whose revenue is gained in part or whole from its adult
or videos showing frontal nudity on either men or women
for non-scientific or non-artistic purposes.
hyperlinks to sites who violate policy #1.
Why do we have this policy?
A shared server is an environment where many servers reside
on a machine together. An average "adult-content site" gets
more hits than 100 standard websites, and some of the smaller
adult sites get around 5 GB of transfer per day. With these
types of resources being utilized, our servers would be severely
slowed if we allowed these high traffic sites to also reside
on our servers. On top of that, we would be forced to raise
our prices to pay for the additional bandwidth. We strive
to keep our servers fast and inexpensive, and our bandwidth
clear; therefore, adult sites are not an option.
Also, our research has proved that most businesses do not
wish to be affiliated with a company who also designs and
hosts pornography-related sites - whether or not the site
is on the same server or on its own dedicated server. We wish
to project a professional image, and it is difficult to do
so if we host these types of sites. We believe that to have
your site affiliated with, or on the same servers as, adult
sites could lead potential prospects away from your business.
As a result, we will not host adult sites because it may endanger
the majority of our clients.
Versatile Web Technologies reserves the right to decide what it considers "adult content", "adult material", "sexually explicit", or "sexually related". Let us know if you are unsure of the approval of your site before placing an order.
(unsolicited commercial e-mail)
and misuse of e-mail is a serious problem, and Versatile Web Technologies
will not tolerate it. If you have been the victim of SPAM
sent by one of our customers, please forward the e-mail, including
its headers, to email@example.com.
of SPAM, or
UCE (Unsolicited Commercial E-mail)
bulk UCE, promotional material, or other forms of solicitation
sent via e-mail that advertise any Ip address belonging
to Versatile Web Technologies or any URL (domain) that is hosted by
Versatile Web Technologies.
postings to newsgroups advertising any Ip or URL hosted
by Versatile Web Technologies.
use of webpages set up on ISps that allow SPAM-ing (also
known as "ghost sites") that directly or indirectly reference
customers to domains or Ip addresses hosted by Versatile Web Technologies.
transmitting, or otherwise making available any software,
program, product, or service that is designed to facilitate
a means to SPAM.
or misrepresenting message headers, whether in whole or
in part, to mask the true origin of the message.
information on mail abuse, please visit the Mail Abuse prevention System (MAPS) website.
Across the Web, it is generally accepted
that SPAM is an inconsiderate and improper business practice.
Versatile Web Technologies
SPAM is not only harmful because of its negative impact on
consumer attitudes toward Versatile Web Technologies, but also because
it can overload the network and resources, especially on our
shared server environments.
Since it is unsolicited, users who receive SPAM often become
angry and send complaints to our upstream providers. This
upsets our providers who abhor SPAM for the same reasons that
Versatile Web Technologies does - it causes negative consumer attitudes
and drains resources. We strive to maintain favorable business
relationships in the Web community and obviously will not
allow any practice that threatens these relationships.
Versatile Web Technologies reserves the right to terminate,
without warning, any account that violates this policy. Usage
of Versatile Web Technologies services constitutes acceptance and understanding
of this policy.
Versatile Web Technologies reserves the right
to decide what it considers "SPAM", "UCE", "mail bombing",
or "bulk e-mail", and to determine from all of the evidence
whether or not the e-mail recipients were from an "opt-in"
principles For preventing Abuse
Should you choose to e-mail from Versatile Web Technologies
servers, especially if you use mailing lists, you must read
and adhere to the following guidelines, which are offered
as a statement of Internet standards and best current practices
for proper mailing list management and preventing e-mail abuse.
lists are an excellent vehicle for distributing focused, targeted
information to an interested, receptive audience. Consequently,
mailing lists have been used successfully as a highly effective
direct marketing tool.
some marketers misuse mailing lists through a lack of understanding
of Internet customs and rules of the forum pertaining to e-mail.
Others fail to take adequate precautions to prevent the lists
they manage from being used in an abusive manner.
e-mail addresses of new subscribers must be confirmed or
verified before mailings commence. This is usually accomplished
by means of an e-mail message sent to the subscriber to
which s/he must reply, or containing a URL which s/he must
visit, in order to complete the subscription. However it
is implemented, a fundamental requirement of all lists is
the verification of all new subscriptions.
list administrators must provide a simple method for subscribers
to terminate their subscriptions, and administrators should
provide clear and effective instructions for unsubscribing
from a mailing list. Mailings from a list must cease promptly
once a subscription is terminated.
list administrators should make an "out of band" procedure
(e.g., a means of contact by which messages may be sent
for further correspondence via e-mail or telephone) available
for those who wish to terminate their mailing list subscriptions
but are unable or unwilling to follow standard automated
list administrators must ensure that the impact of their
mailings on the networks and hosts of others is minimized
by proper list management procedures such as pruning of
invalid or undeliverable addresses, or taking steps to ensure
that mailings do not overwhelm less robust hosts or networks.
list administrators must take adequate steps to ensure that
their lists are not used for abusive purposes. For example,
administrators can maintain a "suppression list" of e-mail
addresses from which all subscription requests are rejected.
Addresses would be added to the suppression list upon request
by the parties entitled to use the addresses at issue. The
purpose of the suppression list would be to prevent subscription
of addresses appearing on the suppression list by unauthorized
third parties. Such suppression lists should also give properly
authorized domain administrators the option to suppress
all mailings to the domains for which they are responsible.
list administrators must make adequate disclosures about
how subscriber addresses will be used, including whether
or not addresses are subject to sale or trade with other
parties. Once a mailing list is traded or sold, it may no
longer be an opt-in mailing list. Therefore, those who are
acquiring "opt-in" lists from others must examine the terms
and conditions under which the addresses were originally
compiled and determine that all recipients have in fact
opted-in specifically to the mailing lists to which they
are being traded or sold.
list administrators should make adequate disclosures about
the nature of their mailing lists, including the subject
matter of the lists and anticipated frequency of messages.
A substantive change in either the subject matter or frequency
of messages may constitute a new and separate mailing list
requiring a separate subscription. List administrators should
create a new mailing list when there is a substantive change
in either the subject matter or frequency of messages. A
notification about the new mailing list may be appropriate
on the existing mailing list, but existing subscribers should
never be subscribed automatically to the new list. For example,
if Company A acquires Company B, and Company B has compiled
opt-in mailing lists, Company A should not summarily incorporate
Company B's mailing lists into its own.
* This SPAM (UCE) Accepted Use policy and all other Versatile Web
Technologies policies are subject to change by Versatile Web Technologies
without notice. Continued usage of the services after a change to
this policy is implemented and posted on the Versatile Web Technologies
site constitutes your acceptance of such change or policy. We encourage
you to regularly check this site for any changes or additions.