Cudo Ventures Limited
Acceptable Use Guidelines (AUG)
Version dated: 28 June 2023
Cudo scales on the world's computing capacity to power Web 2.0 and Web 3.0. Cudo and its community believes in an open and free society, where freedom and freedom of speech is a right of all individuals. Cudo makes this a reality and to also make a greener and more sustainable world. Cudo is a general purpose network that does not rely on single individual providers to host content. This proposes unique situations in a world where laws and regulations have requirements on service providers or suppliers.
Cudo aims to bring the balance of all of these together, to enable a global open censorship resistant network which is also able to support a stable environment and one that service providers and suppliers around the world can support and meet their own requirements.
To this effect this AUG is designed to support the interests of all parties and provide a guideline to the users of the network on what provides a safe and suitable environment for everyone. Suppliers to the Cudo network are free to add or remove resources to the network and all may have their own rules that they need to abide to. .
- As a provider of open internet access, hosting and other internet-related Services, Cudo offers the users of its Services, and their users, the means to acquire and disseminate a wealth of public, private, commercial, and non-commercial information.
- Cudo respects that the internet provides a forum for free and open discussion and dissemination of information, however, there can be competing interests at issue.
- In order to protect these competing interests, this AUG supplements and is intended as a guide to the User’s rights and obligations when utilising Cudo Services or the Cudo Network.
- This AUG may be revised from time to time by the community.
- One important aspect of the internet is that no one person owns or controls it. This fact accounts for much of the internet's openness and value, but it also places a high premium on the judgement and responsibility of those who use the internet, both in the information they acquire and in the information they disseminate to others.
- When Users obtain information through the internet, they must keep in mind that Cudo cannot monitor, verify, warrant, or vouch for the accuracy and quality of the information that Users may acquire, to this respect Cudo acts as a mere conduit. For this reason, the Users must exercise their best judgement in relying on information obtained from the Internet, and also should be aware that some material posted to the Internet is sexually explicit or otherwise offensive. As Cudo cannot monitor or censor the Internet, and will not attempt to do so, Cudo cannot accept any responsibility for injury to its Users that results from inaccurate, unsuitable, offensive, or illegal Internet communications.
- When Users disseminate information through the Internet, they also must keep in mind that Cudo does not review, edit, censor, or take responsibility for any information its Users may create. When Users place information on the Internet, they have the same liability as other authors for copyright infringement, defamation, and other harmful speech. Also, because the information they create is carried over Cudo’s network and may reach a large number of people, including both Users and non-Users of Cudo, Users postings to the Internet may affect other users and may harm Cudo or the relevant suppliers on the Cudo Platform or networks goodwill, and business reputation. They may also have an impact on the operations of Cudo or the suppliers such as blacklisting IP addresses. For these reasons Cudo or its suppliers may need to take the relevant action due to impact or as may be required by law. Users may breach these guidelines and the associated Agreements when they, their Users or Users , affiliates, or subsidiaries engage in the following prohibited activities:
Sending unsolicited bulk and/or commercial messages over the Internet (known as "spamming"). It is not only harmful because of its negative impact on attitudes toward Cudo or its suppliers, but also because it can overload the Suppliers Network and disrupt Service to other Users. Also, maintaining an open SMTP relay is prohibited.
7.2. Intellectual Property Violations
Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including copyrights, trademarks, Service marks, trade secrets, software piracy, and patents held by individuals, corporations, or other entities. Also, engaging in activity that violates privacy, publicity, or other personal rights of others.
7.3. Obscene Materials
Using the Cudo Network or its suppliers to advertise, transmit, store, post, display, or otherwise make available child pornography or depictions nudity obtained or disseminated without the consent of those depicted (e.g., “revenge pornography”).or obscene speech or material.
7.4. Defamatory or Abusive Language
Using the Network as a means to transmit or post defamatory, harassing, abusive, or threatening language.
7.5. Forging of Headers
Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.
7.6. Illegal or Unauthorized Access to Other Computers or Networks
Accessing illegally or without authorisation computers, accounts, or networks belonging to another party, or attempting to penetrate security measures of another individual's system (often known as "hacking"). Also, any activity that might be used as a precursor to an attempted system penetration (i.e. port scan, stealth scan, or other information gathering activity).
7.7. Distribution of Internet Viruses, Worms, Trojan Horses, or Other Destructive Activities
Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail bombing, injection techniques, phishing, DNS hijacking, unauthorised brute force, sybil attacks, spoofing, smurfing, malware attacks, consensus-based attacks or denial of Service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the Cudo Network or any connected network, system, Service, or equipment.
7.8. Facilitating a Violation of this AUG
Advertising, transmitting, or otherwise making available any software, program, product, or Service that is designed to violate this AUG, which includes the facilitation of the means to spam, initiation of pinging, flooding, mail bombing, denial of Service attacks, and piracy of software.
7.9. Export Control Violations
Exporting encryption software over the Internet or otherwise, to points outside the Customer’s country which is contrary to that respective country’s rules and regulations.
7.10. Illegal Substances
Unlawfully selling or distributing controlled substances, including but not limited to any illegal or prescription drugs.
7.11. Other Illegal Activities
Engaging in activities that are determined to be illegal, including advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, and pirating software.
- As pointed out, the responsibility for avoiding the harmful activities just described rests primarily with the Users of the Network.
Let’s work together to make a more open, ubiquitous, beneficial and sustainable world where everyone can benefit.