top of page

Digital Millennium Copyright Act ("DMCA")

Prime Services respects the intellectual property rights of others. Per the DMCA, Prime Services will respond expeditiously to claims of copyright infringement on the Site if submitted to Prime Service's Copyright Agent as described below. Upon receipt of a notice alleging copyright infringement, Prime Services will take whatever action it deems appropriate within its sole discretion, including removal of the allegedly infringing materials and termination of access for repeat infringers of copyright protected content.

If you believe that your intellectual property rights have been violated by Prime Services or by a third party who has uploaded materials to our website or hosting services, please provide the following information to the designated Copyright Agent listed below:

  1. A description of the copyrighted work or other intellectual property that you claim has been infringed;

  2. A description of where the material that you claim is infringing is located on the Site;

  3. An address, telephone number, and email address where we can contact you and, if different, an email address where the alleged infringing party, if not Prime Services, can contact you;

  4. A statement that you have a good-faith belief that the use is not authorized by the copyright owner or other intellectual property rights owner, by its agent, or by law;

  5. A statement by you under penalty of perjury that the information in your notice is accurate and that you are the copyright or intellectual property owner or are authorized to act on the owner's behalf;

  6. Your electronic or physical signature.

Prime Services may request additional information before removing any allegedly infringing material. In the event Prime Services removes the allegedly infringing materials, Prime Services will immediately notify the person responsible for posting such materials that Prime Services removed or disabled access to the materials. Prime Services may also provide the responsible person with your email address so that the person may respond to your allegations. Contact: support@primeserviceskc.com

ACCEPTABLE USE POLICY:

 

Introduction

This document sets forth the principles, guidelines and requirements of the Acceptable Use Policy of Prime Services and its subsidiaries. (“Company”) governing the use by the Customer (“Customer”) of the Company’s grid container services and products (“Services and Products”). The Purpose of the Prime Service’s Acceptable Use Policy, hereinafter referred to as the AUP, is to comply with all federal, state, and local laws coupled with protecting the network security, network availability, physical security, Customer privacy, and other factors affecting the services provided by Prime Services. Prime Services reserves the right to impose reasonable rules and regulations regarding the use of its services provided to all Customers and such rules and regulations are subject to change. The AUP is not an all-inclusive or exhaustive list and Prime Services reserves the right to modify the AUPs at any time as needed, effective upon either the posting of the modified AUPs or notification to the Customer via email. Any violation of the AUPs may result in the suspension or termination of your account or such other action as Prime Services deems appropriate. No credits will be issued for any interruption in service resulting from policy violations.

VIOLATION OF ANY SECTION OF THE AUP IS STRICTLY PROHIBITED AND MAY RESULT IN THE IMMEDIATE TERMINATION OR SUSPENSION OF THE SERVICES YOU RECEIVE FROM PRIME SERVICES.

Any questions or comments regarding the AUP should be directed to support@primeserviceskc.com.

Compliance with Law

Customer shall not post, transmit, re-transmit or store material on or through any of Company’s Services or Products which, in the sole judgment of the Company (i) is in violation of any local, state, federal or non-United States law or regulation, (ii) threatening, obscene, indecent, defamatory or that otherwise could adversely affect any individual, group or entity (collectively, “Persons”) or (iii) violates the rights of any person, including rights protected by copyright, trade secret, patent or other intellectual property or similar laws or regulations including, but not limited to, the installation or distribution of “pirated” or other software products that are not appropriately licensed for use by Customer. Customer shall be responsible for determining what laws or regulations are applicable to its use of the Services and Products.

 

Customer Security Obligation

Each Customer must use reasonable care in keeping software they run on the Prime Services’ servers up-to-date and patched with the latest security updates. Failure to use reasonable care to protect your account may result in a security compromise by outside sources. A compromised server creating network interference will result in immediate Customer notification and will be disconnected from the network immediately so as to not directly affect other Customers. No service credits will be issued for outages resulting from disconnection due to breached server security. The Customer is solely responsible for any breaches of security under Customer control affecting servers. If a Customer intentionally creates a security breach, the cost to resolve any damage to Customer’s server or other servers will be charged directly to the Customer. The labor used to resolve such damage is categorized as Emergency Security Breach Recovery and is currently charged at $300 USD per hour. System and Network Security

Violations of system or network security are strictly prohibited, and may result in criminal and civil liability. Prime Services investigates all incidents involving such violations and will cooperate with law enforcement if criminal violation is suspected.

Examples of system or network security violations include, without limitation, the following:

  1. Introduction of malicious programs into the network or server (example: viruses, worms, Trojan Horses and other executable intended to inflict harm).

  2. Effecting security breaches or disruptions of Internet communication and/or connectivity. Security breaches include, but are not limited to, accessing data of which the Customer is not an intended recipient or logging into a server or account that the Customer is not expressly authorized to access. For purposes of this section, “disruption” includes, but is not limited to port scans, flood pings, email-bombing, packet spoofing, IP spoofing and forged routing information.

  3. Executing any form of network activity that will intercept data not intended for the Customer’s server.

  4. Circumventing user authentication or security of any host, network or account.

  5. Interfering with or denying service to any user other than the Customer’s host (example: denial of service attack or distributed denial of service attack).

  6. Using any program script/command, or sending messages of any kind, designed to interfere with or to disable, a user’s terminal session, via any means, locally or via the Internet.

  7. Failing to comply with the Company’s procedure relating to the activities of Customers on the Company’s premises. Violators of the policy are responsible, without limitations, for the cost of labor to correct all damage done to the operation of the network and business operations supported by the network. Such labor is categorized as Emergency Security Breach Recovery and is currently charged at $300 USD per hour required. Network interference by any Customers that may cause or is currently causing network interference with another Customer will be disconnected immediately. No service credits will be issued to Customers disconnected for network violations.

  8. Transmission, distribution or storage of any material in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property right used without proper authorization, and material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws.

  9. Sending Unsolicited Bulk Email (“UBE”, “spam”). The sending of any form of Unsolicited Bulk Email through Prime Services’ servers is prohibited. Likewise, the sending of UBE from another service provider advertising a web site, email address or utilizing any resource hosted on Prime Services’ servers is prohibited. Prime Services’ accounts or services may not be used to solicit customers from, or collect replies to, messages sent from another Internet Service Provider where those messages violate either this Policy or that of the other provider.

  10. Running Unconfirmed Mailing Lists. Subscribing email addresses to any mailing list without the express and verifiable permission of the email address owner is prohibited.

  11. Advertising, transmitting, or otherwise making available any software, program, product, or service that is designed to violate this AUP or the AUP of any other Internet Service Provider, which includes, but is not limited to, the facilitation of the means to send Unsolicited Bulk Email, initiation of pinging, flooding, mail-bombing, denial of service attacks.

  12. Operating an account on behalf of, or in connection with, or reselling any service to, persons or firms listed in the Spamhaus Register of Known Spam Operations (ROKSO) database at www.spamhaus.org.

  13. Unauthorized attempts by a user to gain access to any account or computer resource not belonging to that user (e.g., “cracking”).

  14. Obtaining or attempting to obtain service by any means or device with intent to avoid payment.

  15. Accessing or attempting to access your account or other Prime Services’ services after you (or Company) has cancelled Customer’s account.

  16. Unauthorized access, alteration, destruction, or any attempt thereof, of any information of any Prime Services’ customers or end-users by any means or device, including the use of ‘sudo’ or other privileged operating system commands.

  17. Knowingly engage in any activities designed to harass, or that will cause a denial-of-service (e.g., synchronized number sequence attacks) to any other user whether on the Prime Services’ network or on another provider’s network.

  18. Using Prime Services’ Services to interfere with the use of the Prime Services’ network by other customers or authorized users. Examples may include crypto mining, denial of service, or other activities that may impact the Prime Services’ network. These are prohibited and accounts may be terminated without warning.

bottom of page