1. Limitations on information noise (spam)
The development of the Web has led to the fact that one of the main problems of users has become an excess of information. Therefore, the network community has developed special rules aimed at protecting the user from unnecessary/unrequested information (spam). In particular, the following are inadmissible:
1.1 Mass distribution of messages via e-mail and other means of personal information exchange (including immediate message delivery services such as SMS, IRC, etc.), except at the explicit and unambiguous initiative of the recipients. Open publication of an e-mail address or other personal information exchange system may not serve as a basis for inclusion of the address in any mass mailing list. The inclusion of an address obtained by any means (web form, subscription robot, etc.) in any mailing list is only permitted if there is a proper technical subscription confirmation procedure in place to ensure that the address is not included in the list except by the will of the address owner. The subscription confirmation procedure must exclude the possibility of an address being added to the list of addressees of any mailing (single or regular) at the initiative of third parties (i.e. persons who are not the owners of the address). It is mandatory that any subscriber can immediately leave the mailing list without any difficulties if he/she wishes to do so. At the same time, the availability of the possibility to leave the list cannot in itself be a justification for adding addresses to the list not at the will of the address owners.
1.2 Sending e-mails and other messages that contain attached files and/or are large in size without the prior permission of the addressee.
1.3 Sending (otherwise than at the direct initiative of the recipient):
- e-mails and other messages (including single messages) of an advertising, commercial or propaganda nature;
- letters and messages containing rude and offensive expressions and sentences;
- sending messages containing a request to forward this message to other available users (chain letters);
- use of impersonal ("role") addresses other than for their direct purpose as set forth by the owner of the addresses and/or standards.
1.4 Posting messages in any electronic conference that do not correspond to the subject of this conference (off-topic). Hereinafter, a conference means Usenet teleconferences (newsgroups) and other conferences, forums and mailing lists.
1.5. Posting messages of advertising, commercial or propaganda nature in any conference unless such messages are expressly permitted by the rules of this conference or their posting has been approved by the owners or administrators of this conference in advance.
1.6 Posting an article containing attachments in any conference, unless such attachments are explicitly permitted by the rules of this conference or such posting has been approved by the owners or administrators of this conference in advance.
1.7 Sending information to recipients who have previously expressly opted out of receiving this information, this category of information, or information from this sender.
1.8. Using own or provided information resources (mailboxes, e-mail addresses, WWW pages, etc.) as contact coordinates when performing any of the above actions, regardless of from which point of the Network these actions were performed.
1.9 Carrying out activities on technical support of spam mailing (spam support service), such as:
- targeted scanning of the content of information resources in order to collect e-mail addresses and other message delivery services;
- distribution of spamming software;
- creation, verification, maintenance or distribution of databases of e-mail addresses or other message delivery services (unless the owners of all addresses included in such a database have expressly consented to the inclusion of the addresses in that particular database; the open publication of an address cannot be considered as such consent).
2. Prohibition of unauthorized access and network attacks
It is prohibited to attempt unauthorized access to Network resources, to conduct and participate in network attacks and network hacking, unless the attack on a network resource is conducted with the explicit permission of the owner or administrator of that resource. Prohibited activities include:
2.1 Actions aimed at disrupting the normal functioning of elements of the Network (computers, other hardware or software) that do not belong to the user.
2.2 Actions aimed at obtaining unauthorized access to a Network resource (computer, other equipment or information resource), subsequent use of such access, as well as destruction or modification of software or data not belonging to the user, without the consent of the owners of such software or data or the administrators of such information resource. Unauthorized access means any access in a manner different from that intended by the owner of the resource.
2.3 Transmission of meaningless or useless information to the computers or equipment of the Network, which creates a parasitic load on these computers or equipment, as well as intermediate sections of the Network, in amounts exceeding the minimum necessary to check the network connectivity and availability of its individual elements.
2.4 Targeted scanning of network nodes in order to reveal the internal structure of networks, lists of open ports, etc., other than to the extent minimally necessary for regular technical activities not aimed at violating clauses 2.1 and 2.2 of this document.
3. Compliance with the rules established by the owners of resources
The owner of any information or technical resource of the Network may establish its own rules of use for this resource. The rules of use of resources or a link to them are published by the owners or administrators of these resources at the point of connection to such resources and are binding on all users of these resources. The rules should be easily accessible, written taking into account the different levels of training of users. The rules of use of a resource established by the owner of the resource must not violate the rights of the owners of other resources or lead to abuse of other resources. The user is obliged to comply with the rules of use of the resource or immediately refuse to use it. In the event that the rules established by the owner of a resource contradict one or another of the clauses of this document, the rules established by the owner shall be applied to the resource in question, if this does not lead to abuse of other resources. If the owner of a group of resources explicitly sets rules for only part of the resources, the rules formulated in this document apply to the rest.
4. Inadmissibility of tampering
Much of the Web's resources do not require user identification and allow for anonymous use. However, in some cases, the user is required to provide information that identifies the user and the means of accessing the Web. The user must not:
4.1 Use identification data (names, addresses, telephone numbers, etc.) of third parties, unless these persons have authorized the user for such use.
4.2 Falsify his/her IP address, as well as addresses used in other network protocols, when transmitting data to the Network.
4.3 Use non-existent return addresses when sending e-mails and other communications.
4.4 Carelessly treat the confidentiality of your own identification details (in particular, passwords and other authorized access codes), which may lead to the use of certain resources by third parties on behalf of this user (thus concealing the true source of actions).
5. Customizing your own resources
When using the Internet, the user becomes a full member of the Internet, which creates the potential for the use of network resources belonging to the user by third parties. In this regard, the user should take appropriate measures to customize his/her resources in a way that would prevent unfair use of these resources by third parties, and if such use is detected, take prompt action to stop it.
Examples of potentially problematic configuration of network resources include:
- open e-mail relays (open SMTP-relays);
- news servers (conferences, groups) that are publicly available for unauthorized publication;
- means allowing third parties to unauthorizedly hide the source of connection (open proxy servers, etc.);
- publicly available broadcast addresses of local networks, allowing smurf attacks to be carried out with their help;
- electronic mailing lists with insufficiently reliable subscription confirmation mechanisms or without the ability to unsubscribe;
- www-sites and other similar resources that send correspondence to third parties upon anonymous or insufficiently authenticated request.