Hotline The Hotline Connect software suite enables Server communities on personal computers worldwide that combined, comprise the Hotline Network. Hotline Communications cannot, and does not, monitor, track or control the activity or content on Hotline Servers outside the Hotline Network, and as such, does not guarantee the accuracy, integrity or quality of such activity or content. Hotline Communications does, however, extend the following Usage Policy to all users, including those users on Servers outside the Hotline Network, as a guide to personal conduct while on Hotline. We advise all Hotline users NOT to use Hotline software to do the following: a. upload, post or otherwise transmit Content that is unlawful, harmful, threatening, abusive, harassing, tortuous, defamatory, vulgar, obscene, libelous, invasive of another’s privacy, hateful, or racially, ethnically or otherwise objectionable; b. harm minors in any way (Server administrators who wish to share private material with Server visitors are asked to use the Server’s security features to limit Server access to minors); c. impersonate any person or entity, including, but not limited to, a Hotline Communications representative, employee, guide or host, or falsely state or otherwise misrepresent any affiliation with a person or entity; d. upload, post or otherwise transmit any content without the express right to transmit under any law or under contractual or fiduciary relationships, such as inside information, proprietary and confidential information that is learned or disclosed as part of employment relationships or under nondisclosure agreements; e.
upload, post or otherwise transmit any content that infringes any patent, trademark, trade secret copyright or other proprietary rights of any party; f. upload, post or otherwise transmit any unsolicited or unauthorized advertising, promotional materials, junk mail, spam, chain letters, pyramid schemes, or any other form of solicitation, except in those areas (such as shopping areas) that have been designated for such purposes; g. upload, post or otherwise transmit any material that contains software viruses or any other computer code, files or programs designed to interrupt, destroy or limit the functionality of any computer software or hardware or telecommunications equipment; h. disrupt the normal flow of dialogue, or otherwise act in a manner that negatively affects other users’ ability to engage in real time exchanges; i. interfere with or disrupt the Hotline Service or Server Network connected to the Service, or disobey any requirements, procedures, policies or regulations of networks connected to the Service; j. intentionally or unintentionally violate any applicable local, state, national or international law, including, but not limited to, any rules of any national or other securities exchange, and any regulations having the force of law; k.
stalk or otherwise harass other users; l. collect or store personal data about other users. Hotline Communications has also implemented a number of measures to help protect the rights, property, and personal safety of Hotline Communications, its users and the public on the Hotline Network, including: Terms of Service: All administrators of Servers listed on the Hotline Network are required to agree to our Terms of Service before listing on our Network. Client License Agreement: All users of the Hotline Client are required to agree to the terms outlined in their Client License Agreement before downloading the Client software. Server License Agreement: All users of the Hotline Server are required to agree to the terms outlined in their Server License Agreement before downloading the Server software.
Room 222: Updated information and online discussions on political and legal developments concerning the Internet are held regularly in Room 222 (IP 18.104.22.168.222), a Server on HLtracker.com. Please report any violations of the Hotline Usage Policy and/or Terms of Service to . If possible, please include the IP address of the offending Server and the approximate time, date and details of the violation. Bibliography www.bigredh.com.