Home E-mail Login Computer Questions? Privacy Statement User Policies About Contact

Domain User Policies

 In order to protect our web domain name,, and our web host provider,, from any legal actions, the following user policies have been adapted from the member policies of our web host provider, 

This domain,, has been created primarily for the use of the entire Tabaco Family including it's relatives, friends, employees, agents, and contractors, and their minor children (17 years old and younger). No material considered unsuited for minor children will be tolerated anywhere in this domain on any of its services. Any user having an account on any service in the domain of must comply with these user policies or their account will be suspended or terminated, with or without warning depending on the nature of the violation, and they will be held liable for any damages incurred by their violation of any stated or implied user policy. Adult guardians who allow their minor children to use any of our web domain services will be held liable for any violations committed by their minor children. Any user older than 17 years of age is consider an adult user and will be held liable for their own actions.

I. General Rules Regarding Acceptable Internet Use.

The rules regarding Acceptable Internet Use (the "Rules") are designed to enhance the quality of our web domain services and to protect our users, and the Internet community as whole, from illegal, irresponsible, or disruptive Internet activities. These rules apply to all users of, and their employees, agents, contractors, and/or other users, who obtain services from directly or through access to or use of the Internet. We hope and expect that common sense and good judgment will guide all of our users' and users' Internet activities. Even with such Rules in effect, children should be supervised when using the Internet. Adults and children should be aware of what is on the Internet and to understand the concept of what is accepted and what should be avoided. Adult guardians who allow their minor children to use any of our web domain services must impart this awareness and understanding to their children.

 II. Description of Unacceptable Internet Uses.

  The following description of Unacceptable Internet Uses (the "Description") is not intended as a comprehensive list of all impermissible activities. The activities listed in this Description are violations of the Rules; however, an unlisted activity may also be a violation of the Rules if it is an illegal, irresponsible, or disruptive use of the Internet.

A. Abuses of system and network resources

Any activities which adversely affect the ability of other people or systems to use services or the Internet are prohibited. This includes, but is not limited to:

1. denial of services attacks against another network host or individual user;

2. employing posts or programs which consume excessive CPU time or storage space;

3. permitting use of mail services, mail forwarding capabilities, POP accounts, or auto-responders other than for the user's own account;

4. resale of access to CGI script installed on our servers;

5. subverting, attempting to subvert, or aiding others to subvert the security of the system, facilities, and/or equipment; or  

6. providing passwords or other similar security related information to others.

B. Improper Conduct

Impersonation and Forgery. The practice of "spoofing" is prohibited. Spoofing is any attempt to impersonate any person or otherwise deceive or mislead through adding, removing, or modifying network headers or other identifying information. Our Rules also prohibit the deletion of author attributions, legal notices, or proprietary designations in an effort to deceive or mislead. The use of anonymous remailers or nicknames does not constitute impersonation. Defamation and Private Information. Our Rules prohibit the posting of defamatory, scandalous, or private information about an individual without his or her consent. Attempts, whether successful or unsuccessful, to gain access to any computer system or user's data are also impermissible. Protected Information. The violation of trademarks, copyrights, or other intellectual property rights is an unacceptable use of the Internet and is prohibited. Other Improper Conduct. The intentional infliction of emotional distress by use of services or the Internet is a violation of the Rules. Threats of bodily harm or destruction of property are always prohibited, whether such threat constitutes a crime or not. In addition, reserves the right to remove any material that it, in its sole discretion, considers to be obscene, lewd, filthy, excessively violent, harassing, or otherwise objectionable.

C. Illegality

Prohibited Subject Matters. Using the Internet or any services or products for the purpose of trafficking in obscene material, dealing drugs, or participating in any other activities dealing with subject matters that are prohibited under federal or state law is prohibited. Prohibited Conduct. Any conduct that constitutes harassment, fraud, stalking, abuse, or a violation of federal export restrictions in connection with use of the Internet or services or products is prohibited. Using the system to solicit the performance of any illegal activity is also prohibited, even if the activity itself is not performed. In addition, knowingly receiving or downloading a file that cannot be legally distributed, even without the act of distribution, is prohibited. Protected Information. The unauthorized distribution or copying of copyrighted software is prohibited by these Rules. Any violation of trademarks, copyrights, or other intellectual property rights that constitutes a crime under federal or state law is strictly prohibited.  

 D. Abuse of the Internet

E-mail: prohibits activities by its users and users that disrupt, disable, or impede e-mail communication, such as using non-existent e-mail return addresses on commercial solicitations, subscribing someone else to a mailing list without that person's permission, and sending unsolicited e-mail. In addition, the following e-mail practices are prohibited:

1. spamming: sending unsolicited advertising to numerous e-mail addresses or newsgroups and/or generating a significantly higher volume of outgoing e-mail than a normal user

 2. trolling: posting outrageous messages to generate numerous responses  

 3. mailbombing: sending multiple messages without significant new content to the same user

 4. interfering: intercepting, redirecting, or otherwise interfering or attempting to interfere with e-mail or communications intended for other persons or parties

Newsgroups and Mailing Lists: When posting to a newsgroup or mailing list, it is imperative that good judgment is used. Many news groups and mailing lists have their own guidelines describing what is and is not considered appropriate. Before entering a newsgroup or mailing list, you should read these guidelines and familiarize yourself with that particular newsgroup's or mailing list's acceptable use policy. In general, the following practices are prohibited:

1. cross-post articles to an excessive number of newsgroups

2. continuous posting of off-topic articles

3. spamming, as defined above

4. flames: hostile attacks or invectives aimed at a group or an individual poster

5. threatening or harassing news articles

6. forging or removing header information

7. canceling messages other than your own, other than posts forged in your name

Other Abuses. Any attempt without authorization to enter into a secured computer system will violate the Rules. Additionally, knowingly or maliciously sending or uploading files or information that contain a virus, worm, "Trojan horse" or other contaminating or destructive data is prohibited. The use of Internet Relay Chat bots, or otherwise violating any accepted policies on Internet Relay Chat, is prohibited.

III. Reporting Violations of the Rules to

Disclaimer of Responsibility. is under no duty to look at each user's or user's activities to determine if a violation of the Rules has occurred, nor do we assume any responsibility through this policy to monitor or police Internet-related activities. disclaims any responsibility for any such inappropriate use and any liability to any person or party for any other person's or party's violation of this policy. Remedial Actions. If you are aware of a potential inappropriate use, please direct the information to Email Protection by Name Intelligence. Our administrators will carefully investigate potential violations before taking action. Depending upon the severity of the violation and the history of the account involved, may take any reasonable disciplinary action, including, but not limited to, one or more of the following actions:

1. issuance of a verbal or written warning

2. suspension of the offending account

3. termination of the offending account

4. removal of the offending content from the site

In the event that an account is temporarily inactivated as a result of any prohibited activities, the account may be subject to reactivation requirements determined by Reservation of Rights. will cooperate with the appropriate legal authorities in investigating claims of illegal activity, including but not limited to illegal transfer or use of copyrighted material, posting, or e-mail containing threats of violence, or other illegal activity. We reserve the right to pursue any other remedies to which we may be entitled with regard to violations of the Rules, or as a result of any action taken by or on behalf of any user and/or its employees, agents, contractors, and/or other users accessing our services.

Last updated 11/19/2004

Privacy Statement

Est. 1998

Email contact: