Success Planned FZE provides dedicated Email Marketing services to its clients. The following rules and regulations must be followed at all times by the clients who sign-up for our services:
Complaints related to SPAM are seen in direct violation of these terms and conditions and may lead to the immediate suspension of your service and possible closure of your account. Violation of the terms and condition disqualifies your account from any refund. We understand that anyone who sends a large number of e-mails will possibly receive a small number of spam complaints (typically in error) – we consider a “normal” ratio for a genuine opt-in mailing to be around 1 complaint per 4000-5000+ e-mails sent. We also look at various factors including the number, ratio and type of complaints but certainly any ratio higher than that would be considered high and could risk your account being suspended. The “billing” e-mail address for your account is the primary means we will contact you about your account (error reports, spam complaints, renewal notices etc.). This must be kept up-to-date and changes should be notified to Success Planned at the earliest.
Our network and systems may be used only for lawful purposes. Transmission, distribution or storage of any material in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property right used without proper authorization, and material that is obscene, defamatory, constitutes an illegal threat or violates export control laws.
System Usage and Network Security:
Violation of system or network security are prohibited and may result in criminal and civil liability. We will investigate incidents involving such violations and may involve and will co-operate with law enforcement if a criminal violation is suspected. Examples of system or network security violations include (but are not limited to):
Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system and/or network or to breach security or authentication measures without express authorization of the owner of the system or that network. Interference with service to any user, host or network including, but not limited to:
2. Packet flooding
3. Deliberate attempts to overload a system
4. Broadcast attacks
5. Sending or distributing viruses / infected files
Forging or spoofing of any TCP-IP packet header or any part of the header information in an e-mail or a newsgroup posting. Unauthorized monitoring of data and/or traffic on any network or system without the express authorization of the owner of the system or network.
Email logs are stored for a period of 90 days. The content of the email itself may or may not be stored on our network beyond 30 days.
We may revise this Policy from time to time in response to changing legal and technical requirements. We will make every effort to keep you updated as and when the Policy changes.
Indirect or attempted violations of the policy, and actual and or attempted violations by a 3rd party on behalf of one of our customers or a customer’s end user, shall be considered violations of the policy by such customer or end user. To encourage responsible usage of the Internet, we will act against you if you abuse our system and the Internet in general. This action will usually take the form of a temporary suspension of your access until the matter can be resolved. If appropriate, we may terminate your account immediately and your account will not qualify for a refund.
If you have any questions about this policy, please write to us at email@example.com.