4. REQUIREMENTS TO THE USE OF SERVICES AND INFORMATION SECURITY4.1. The Client shall prevent unauthorized access to the software in use and not allow the resources owned by the Client or provided by the Contractor to be used for attempted unauthorized access to other Internet resources. In particular, the Client shall prevent situations when:
- email messages are sent from addresses that do not belong to the Client’s network (domain);
- software uses default passwords;
- there are outgoing packets with a wrong source address (IP source address);
- there are outgoing domain name system (DNS) packets with intentionally corrupted data;
- there is malicious software;
- software specifically designed for unauthorized access to information is present and/or operating.
4.2. The Contractor may provide for automatic traffic filtering with the aim to block sending of traffic with faked IP and MAC addresses.
4.3. The Client shall not use the Services and the Contractor’s equipment for causing damage to the Contractor, its customers, or third parties, breaching the applicable laws, or assisting such breach. Such actions (omission) of the Client may include, but are not limited to:
4.3.1. actions of the Customer that violate the provisions of the current legislation, contrary to the prescriptions of the executive authorities and local acts applicable to the Parties;
4.3.2. actions of the Client aimed at disrupting smooth operation of the local network or Internet elements (computers, other hardware or software), which do not belong to the Client;
4.3.3. failure by the Client to comply with orders/regulations of competent authorities;
4.3.4. actions (omission) of the Client that entail losses for the Contractor or third parties;
4.3.5. disruption of smooth operation of the Internet elements (computers, other hardware or software), which do not belong to the Client;
4.3.6. storage, publication, transfer, reproduction, distribution in any manner, use in any form of software or other protected intellectual property and means of individualization, without obtaining the owner’s permission;
4.3.7. failure by the Client to provide a response to the Contractor to a complaint received from third parties about violation of their intellectual rights by the Client within fourteen (14) calendar days from the date of receipt of such a complaint by the Client. The Client’s response shall contain explanations to the third party’s demands stated in the complaint, otherwise, the Client’s response to the received complaint shall be deemed as not provided to the Contractor;
4.3.8. storage, publication, transfer, reproduction, distribution in any manner, use in any form of software or other content containing viruses and other malicious components;
4.3.9. actions that directly or indirectly imply bulk mailing or facilitation of bulk mailing and other messaging (if such actions are detected, the Services to the Client shall be automatically limited);
4.3.10. dissemination, publication, or other processing of information that contravenes the requirements of the applicable laws of the Russian Federation, violates third-party rights;
4.3.11. advertising of services, goods, other items, whose distribution is restricted or prohibited by the applicable laws;
4.3.12. falsification of the technical details, provided by the Contractor, when transmitting data over the Internet;
4.3.13. use of non-existent return addresses when sending emails and other messages;
4.3.14. actions aimed at obtaining unauthorized access to hardware or an information resource that does not belong to the Client, subsequent use of such access, as well as destruction or modification of software or data that do not belong to the Client, without securing consent of the owners of such software or data or the administrator of such information resource. Unauthorized access shall imply access in any manner other than that intended by the resource owner;
4.3.15. actions relating to sending to third party computers or equipment meaningless or useless information that creates excessive (unwanted) traffic on such computers or equipment, including intermediate network sections, which exceeds the minimum volumes necessary for checking network connectivity and availability of individual network elements;
4.3.16. scanning of network nodes for the purpose of detecting the internal network structure, security vulnerabilities, lists of open ports, etc., without securing express consent of the owner of the resource scanned;
4.3.17. violation of data security requirements, which jeopardizes operation of other (not belonging to the Client) resources of a local or global computer network;
4.3.18. use of default passwords in software;
4.3.19. use of outdated and/or vulnerable mail server software;