Internet consultants - web development firm, Consensus-Technology, Consensus Technology website design web design companies
Home Internet Strategy Custom Web Design Search Optimization Social Media Internet Consultants Company Blog

Introduction and Coverage
Consequences of Non-Compliance
Prohibited Use
Complaints and Contact Information For Consensus Technology



This Acceptable Use Policy sets forth guidelines for acceptable use of the Consensus Technology Network. All users of the Consensus Technology Network are required to comply with this policy.

Users must also comply with all terms and conditions of applicable agreements, and with any additional policies that may be applicable to a specific service offered by Consensus Technology.


As used in this Acceptable Use Policy, the terms shall have the respective meanings set forth below:

"Consensus Technology" includes, without limitation, Consensus Technology Incorporated, and any division, subsidiary, or affiliate of any of the foregoing.

"Consensus Technology Network" includes, without limitation, Consensus Technology's networks, and all systems, services, and products that utilize, or are utilized in connection with, Consensus Technology's networks.

Conformance With Policies of Other ISPs

In situations where data communications are carried across networks of other Internet Service Providers (ISPs), users of the Consensus Technology Network must also conform to the applicable acceptable use policies of such other ISPs.

Questions, Comments, or Complaints

If you are unsure whether any contemplated use or action is permitted, please send questions or comments to Consensus Technology at:

Any complaints regarding prohibited use or other abuse of the Consensus Technology Network, including violations of this Acceptable Use Policy, should be sent to Consensus Technology at:


Consensus Technology reserves the right to modify this Acceptable Use Policy at any time without notice.

Back to top



All users of the Consensus Technology Network are required to comply with this Acceptable Use Policy, as well as all applicable laws and regulations.


Consensus Technology seeks to promote a high level of responsible behavior in connection with the use of the Internet, and has formulated this Acceptable Use Policy to accomplish the following goals:

  • To protect the reputation and resources of Consensus Technology, its customers, and the Internet community at large, from irresponsible or illegal activities.
  • To ensure the privacy, security, and reliability of the Consensus Technology Network, the network and systems of Consensus Technology's customers, and (as much as Consensus Technology is reasonably able to do so) the Internet at large.
  • To establish guidelines for the acceptable use of the Consensus Technology Network.
  • To define generally those actions which Consensus Technology considers abusive and prohibited.
  • To outline procedures for handling and reporting abuse to Consensus Technology.


Consensus Technology provides an unfiltered connection to the Internet. No data, documents, materials, or information that enters the Consensus Technology Network is reviewed before being transmitted to users. Accordingly, Consensus Technology neither controls nor accepts responsibility for the content of any communications that are transmitted or made available to users, regardless of whether they originated from users of the Consensus Technology Network. In addition, Consensus Technology expressly disclaims any responsibility for the accuracy or quality of information provided by third parties that may be obtained through the use of the Consensus Technology Network.

Each user is responsible for complying with this Acceptable Use Policy, and for providing reasonable assistance to Consensus Technology in investigating and resolving issues, problems, and/or complaints arising out of the services provided to such user.


Filters against particular networks or traffic types are generally available from a variety of sources.


All users of the Consensus Technology Network are responsible for configuring their own systems to provide the maximum possible accountability. For example, users should ensure there are clear "path" lines in news headers so that the originator of a post may be identified. Users should also configure their Mail Transport Agents (MTA) to authenticate (by look-up on the name or similar procedures) any system that connects to perform a mail exchange, and should generally present header data as clearly possible. As another example, users should maintain logs of dynamically assigned IP addresses.

Reporting Violations

Customers of Consensus Technology are responsible for immediately reporting to Consensus Technology (via e-mail or phone) any network issue which could compromise the stability, service or security of any use by Consensus Technology or its customers of the Consensus Technology Network.


Some users may be customers of Web Content Providers that host their web sites through Consensus Technology. Such Web Content Providers (also known as resellers) are responsible for informing their customers of this Acceptable Use Policy and for enforcing its restrictions with regard to their customers' actions.

Complaints about customers of any such reseller shall be forwarded to such reseller for resolution. If at any time Consensus Technology determines that such reseller is not taking appropriate action in accordance with this Acceptable Use Policy, Consensus Technology shall work with such reseller to review their policies and enforcement procedures. If the reseller continues to fail to take appropriate action, Consensus Technology will take such further action as it deems appropriate, up to and including termination proceedings.

Violations of this Acceptable Use Policy by a customer or end-user of a reseller shall be considered violations of this Acceptable Use Policy by such reseller.

Back to top


Violation of this Acceptable Use Policy is strictly prohibited. In the event of any actual or potential violation, Consensus Technology reserves the right to suspend or terminate, either temporarily or permanently, any or all services provided by Consensus Technology, to block any abusive activity, or to take any other actions as deemed appropriate by Consensus Technology in its sole discretion.

Users who violate this Acceptance Use Policy may incur criminal or civil liability. Consensus Technology may refer violators to civil or criminal authorities for prosecution, and will cooperate fully with applicable government authorities in connection with the civil or criminal investigations of violations.

Back to top


The examples of prohibited use set forth below and throughout this Acceptable Use Policy are non-exclusive, and are provided as guidelines to customers and other users of the Consensus Technology Network.

A. Illegal Use

The Consensus Technology Network may be used only for lawful purposes. The transmission, distribution, or storage of any information, data, or material in violation of any applicable law or regulation is prohibited. Without limitation of the foregoing, it is strictly prohibited to create, transmit, distribute, or store any information, data, or material which:

  • Infringes any copyright, trademark, trade secret, or other intellectual property right.
  • Is obscene or constitutes child pornography.
  • Is libelous, defamatory, hateful, or constitutes an illegal threat or abuse.
  • Violates export control laws or regulations.
  • Encourages conduct that would constitute a criminal offense or give rise to civil liability.

In the event of suspected, alleged, or actual illegal activity, Consensus Technology will notify or cooperate with applicable law enforcement authorities for potential civil or criminal investigation or prosecution.

B. Abuse

The following general actions are considered "abuse" and are strictly prohibited:

  • Any conduct which violates the accepted norms and expectations of the Internet community at large (whether or not detailed in this Acceptable Use Policy). Consensus Technology reserves the right, in its sole discretion, to make a determination whether any particular conduct violates such norms and expectations.
  • Resale of Consensus Technology's services or products, unless expressly authorized in a separate written agreement with Consensus Technology.
  • Any conduct that restricts or inhibits any other user, whether a customer of Consensus Technology or a user of any other system or network, from using or enjoying any of Consensus Technology's services or products, as determined by Consensus Technology in its sole discretion.
  • Harassment, whether through language, frequency, or size of messages, creating, forwarding, posting, or distribution of chain messages of any type (also known as "pyramid" or "Ponzi" schemes).
  • Forging of message headers or a sender's identity, or taking any similar action with the intent of bypassing restrictions or limits on access to a specific service or site (such as a moderated newsgroup or a site utilizing filters). This prohibition does not restrict the legitimate use of aliases or anonymous re-mailers.
  • Falsifying identity or contact information (whether given to Consensus Technology, to the InterNIC, or put in a message header) to circumvent this Acceptable Use Policy. This prohibition does not restrict the legitimate use of aliases or anonymous re-mailers.
  • Furnishing false or incorrect data to Consensus Technology on written or online applications, contracts, or other materials or information provided to Consensus Technology, including fraudulent use of credit card numbers or "bill to" telephone numbers.
  • Attempting to circumvent or alter the processes or procedures to measure time, bandwidth utilization, or other methods to document use of Consensus Technology's products and services.

C. Security

Violations of system or network security are prohibited, and may result in criminal and civil liability. Consensus Technology will investigate potential security violations, and may notify applicable law enforcement agencies if violations are suspected.

It is strictly prohibited to attempt to circumvent the authentication procedures or security of any host, network, network component, or account (i.e. "cracking") to access data, accounts, or servers which the user is not expressly permitted or authorized to access. This prohibition applies whether or not the attempted intrusion is successful, and includes unauthorized probes or scans performed with the intent to gather information on possible security weaknesses or exploitable configurations.

Users of the Consensus Technology Network are responsible for educating themselves and configuring their systems with at least basic security. Should systems at a user's site be violated, the user is responsible for reporting the violation and then fixing the exploited system. For instance, should a site be abused to distribute unlicensed software due to a poorly configured FTP (File Transfer Protocol) Server, the user is responsible for re-configuring the system to stop the abuse.

Users are prohibited from interfering or attempting to interfere with service to any other user, host, or network on the Internet ("denial of service attacks"). Examples of such prohibited activity include without limitation (a) sending massive quantities of data (i.e. "flooding" with ICMP, SMTP, or any other type of traffic that exceeds accepted norms of size and/or frequency) with the intent of filling circuits, overloading systems, and/or crashing hosts, (b) attempting to attack or disable any user, host, or site, or (c) using,distributing, or propagating any type of program, script, or command designed to interfere with the use, functionality, or connectivity of any Internet user, host, system, or site (for example, by propagating messages, via e-mail, Usenet posting, or otherwise, that contain computer worms, viruses, control characters or Trojan horses).

Users are prohibited from intentionally or negligently injecting false data into the Internet, for instance in the form of bad routing information (including but not limited to the announcing of networks owned by someone else or reserved by the Internet Assigned Numbers Authority) or incorrect DNS information.

D. E-Mail

Users are prohibited from engaging in improper use or distribution of electronic mail ("e-mail") over the Internet. Without limitation of the foregoing, it is strictly prohibited to engage in any of the following activities:

  • Sending unsolicited bulk e-mail ("UBE", or "spamming"). This includes, but is not limited to, the distribution of UBE for commercial, informational, advertising, political, or religious purposes.
  • Setting up "mailback" or "drop box" addresses in order to receive responses from UBE, either directly by the user or by a third party on behalf of the user.
  • Using a mail transport agent (MTA) outside of a user's own site to relay mail (unless a user has received express permission to do so). Even if permission has been received, users are prohibited from forging their identities to make it appear as though the e-mail sourced from the relay.
  • Sending UBE, or posting news, to advertise or promote resources whose connectivity depends in any way on the Consensus Technology Network, regardless of whether such UBE or news posting is made using the Consensus Technology Network. For example, using another ISP's services to send UBE which advertises a web page hosted by or via the Consensus Technology Network is prohibited.
  • Hiring or using any third party service for the purpose of distributing UBE or excessively "multi-posting" or "cross-posting" any Usenet posting in the name of a user. Users will be held responsible for the actions of any third party agent that acts on behalf of or for the benefit of the user, and such users shall be held directly accountable for any violations of this Acceptable Use Policy by such third party agent.

Bulk e-mail may be sent only to recipients who have expressly requested receipt of such e-mail. Users that send solicited bulk e-mail are required to maintain records of all bulk e-mail subscription requests, and to provide Consensus Technology with such records upon request of Consensus Technology, to enable Consensus Technology to investigate complaints from third parties. The sender of any solicited bulk e-mail shall, upon the request of a recipient, immediately remove such recipient from all applicable mailing lists and refrain from further transmissions of e-mail to such recipient.

Use of any auto-responder messages, mailing lists, or any other programs or scripts run by a user to handle or re-distribute e-mail is the sole responsibility of the user, and shall be operated in a reasonable manner. This responsibility includes, but is not limited to, maintaining up-to-date mailing lists to minimize mail bouncing and to facilitate the processing of removal requests, configuring auto-responders so that they do not create mail loops, and the prompt handling of any complaints regarding UBE re-distributed through a mailing list onsite.

Back to top


Consensus Technology recommends that users not post to any newsgroup until they have familiarized themselves with the subjects, established guidelines, and restrictions of such newsgroup. All Usenet guidelines and restrictions are incorporated herein by reference, and users of the Consensus Technology Network agree to adhere to such guidelines unconditionally.

Without limitation of the foregoing, it is strictly prohibited to engage in any of the following activities:

  • Making any posting for commercial purposes (including without limitation the pointing to specific URLs for commercial purposes), except where such postings are expressly permitted under the charter and/or Frequently Asked Questions (FAQ) of an applicable newsgroup.
  • Posting via Consensus Technology's newsfeed any solicitation for mailback to an e-mail address (including addresses of non-Consensus Technology users) networks with the intention of bypassing this Acceptable Use Policy.
  • Cancelling newsgroup postings other than their own, or using auto-responders or cancel-bots (or similar automated or manual routines) which generate excessive network traffic or disrupt Usenet newsgroup/e-mail use by others (except in cases of official newsgroup moderators performing their duties).
  • Engaging in "Excessive Cross-Posting" (ECP) or "Excessive Multi-Posting" (EMP) or "Usenet spam" (no matter what the content might be) as defined by the Internet community and expressed in the* newsgroups and FAQs.
  • Disrupting newsgroups with materials, postings, or activities that are (as determined by Consensus Technology in its sole discretion) frivolous, unlawful, obscene, threatening, abusive, libelous, hateful, excessive, or repetitious, unless such materials or activities are expressly allowed or encouraged under the newsgroup's name, FAQ, or charter.
  • Using filtering messages (e.g. NoCeM) in an intrusive manner, or at other than the user's server level. Generally, filtering messages are considered normal Usenet traffic and are treated as such by Consensus Technology. Complaints regarding filter use or abuse should be directed either to the source generating them or the sites utilizing them.
  • Performing any unauthorized creation, cancellation, or removal of newsgroups.

The legitimacy of a given post or cancellation is determined by the official newsgroup or mailing-list moderator. Therefore, Consensus Technology defers to their judgment on these issues. If no such official entity exists, it is at Consensus Technology's discretion to determine whether any post or cancellation is compliant with this Acceptable Use Policy and Internet community standards for that newsgroup.

F. World Wide Web

Consensus Technology strictly prohibits users from engaging in any of the following web-related activities:

  • The exploitation or attempted exploitation of any scripts presented on web pages (e.g. forms for answering questions or for entering data).
  • Excessive use of bandwidth by utilizing programs, scripts, or commands to abuse a web site (for example, by connecting for an excessive amount of time, repeatedly engaging site-local scripts, or related behavior).
  • "Walking" a database for the purpose of collecting data contained therein (whether or not this behavior requires that the reader of the page must knowingly ignore files such as "robot.txt" which is designed to guide cataloguing robots/programs).
  • Operating a robot on a site's page after the site has asked that the behavior cease.
  • Configuring a web page to act maliciously against users that visit that web page.

Back to top


Additional Terms and Conditions

The use of the Consensus Technology Network by a customer of Consensus Technology is subject to the terms and conditions of any agreements entered into by such customer with Consensus Technology. This Acceptable Use Policy is incorporated into such agreements by reference.

Limitation of Liability



Back to top


Any complaints regarding prohibited use or other abuse of the Consensus Technology Network, including violations of this Acceptable Use Policy, should be sent via e-mail to Consensus Technology at: Please include all applicable information that will assist Consensus Technology in investigating the complaint, including all applicable headerlines of forwarded messages.

Sites experiencing live attacks from Consensus Technology customers should call into our Customer Care Center (telephone 888-309-6521) to submit a complaint as quickly as possible. Describe the urgency of the situation should you need immediate attention.

If you are unsure whether any contemplated use or action is permitted, please send questions or comments to Consensus Technology at:

For further information about this Acceptable Use Policy, please contact Consensus Technology at:
Consensus Technology, Inc.
20 Grove Street, 3rd floor
Peterborough, NH 03458
Telephone: (603) 924-4084

How to Report Net Abuse.

To report Net Abuse,
Email - Reports of Network Abuse or Complaints about Unsolicited Commercial E-mail/Mass E-mail
Email - Operational Issues and Requests
Email - Consulting Request

Email - Comments/Suggestions to Webmaster (603) 924-4084

Follow us on Twitter. Follow Us
Find us on Facebook and click the Like button at the top of the page. Find Us
Find us on LinkedIn. Follow Us
HACKER SAFE certified sites prevent over 99.9% of hacker crime.
Copyright ©2001-2012 Consensus Technology, 20 Grove Street, Peterborough, NH 03458, +1 603.924.4084. All rights reserved.
web development firm Home
internet strategy Internet Strategy
custom web design Custom Web Design
custom web design Clients
search engine optimization Search Engine Optimization
social media marketing and search engine optimization Social Media
 internet consultants Internet Consultants
internet consulting services Company