Terms of Use

These terms were last updated on June 30, 2010.

Accelerex, its parent, subsidiaries, divisions and related web sites (hereinafter collectively referred to as "Company") Terms of Service ("ToS") describes the proper kinds of conduct and prohibited uses of Company's services (the "Services"), as described and subscribed to pursuant to the Terms and Conditions Agreement ("Agreement") of which this policy is incorporated. The ToS is not exhaustive and Company reserves the right to modify the ToS at any time, effective upon posting of the modified ToS to the website. By registering for and using the Services, and thereby accepting the terms and conditions of the Agreement, you agree to abide by the ToS as modified from time to time. Any violation of the ToS may result in the suspension or termination of your account and such other action as Company deems appropriate.

VIOLATION OF ANY OF THESE GUIDELINES IS STRICTLY PROHIBITED AND MAY RESULT IN THE IMMEDIATE TERMINATION OR SUSPENSION OF THE SERVICES YOU RECEIVE FROM COMPANY. YOU WILL REMAIN SOLELY LIABLE AND RESPONSIBLE FOR YOUR USE OF THE SERVICES AND ANY AND ALL CONTENT THAT YOU DISPLAY, UPLOAD, DOWNLOAD OR TRANSMIT THROUGH THE USE OF THE SERVICES. "CONTENT" INCLUDES, WITHOUT LIMITATION, YOUR E-MAIL, WEB PAGES, PERSONAL HOME PAGES, AND DOMAIN NAMES.

Prohibited Conduct
You may use the Services only for lawful purposes. Transmission, distribution, sale, or storage of any material in violation of any applicable law, regulation, or the ToS is prohibited. The following non-exhaustive list details the kinds of illegal or harmful conduct that are prohibited. Company reserves the rights to restrict or prohibit any and all uses of the Services or content on your Web site(s) and to remove such materials from its servers, which Company determines in its sole discretion is harmful to its servers, systems, network, reputation, good will, other Company customers, or any third party.

E-Mail
The Services may be used to transmit Unsolicited Commercial E-mail that complies with all United States state and federal laws including, but not limited to the CAN-SPAM Act of 2003. However, you may not distribute, publish, or send any of the following types of e-mail:

Third Party Links
Links to third party web sites should not be inserted in emails without the direct or indirect permission of the third party, and your email should conspicuously notify the recipient that the link is to a third party over which you have no control or operation.
In addition, you may not use Company's mail server or another Web site's mail server to relay mail without the express permission of the account holder or the Web site. Posting the same or similar message to one or more newsgroups, message boards, blogs, online discussion groups, etc., (excessive cross-posting or multiple-posting) also is explicitly prohibited.

Payment For Traffic
Traffic is paid out on a CPC, CPL or CPM and shall be noted in the system based on campaign the publisher is running.  Payment terms are Net 30 unless otherwise notated.

Email Traffic
Email traffic must comply with all the regulatory standards of the CAN-SPAM act of 2003 (might want to put a link to it) and the data used must have originated from a site, property or method that has a privacy policy that explicitly states the ability to market 3rd party offers pursuant to all applicable laws in the use of an individual's personal information.

All acceptable email traffic on CPC and CPL campaigns must have a referrer from a legitimate ISP that clearly exhibits the source of traffic.  Email traffic originating from Proxy IPs will not be paid for unless previous arrangement and approval have been made by a Accelerex employee and a clear understanding of how the publisher utilizes this method for email delivery.

System and Network Security and Integrity
Violations of Company's or any third party's server, system or network security through the use of the Services are prohibited, and may result in criminal and civil liability. Company may investigate incidents involving such violations. Company may involve and cooperate with law enforcement if a criminal violation is suspected. Examples of server, system or network security violations include, without limitation, the following:

Modification of the Policy and Agreement
We reserve the right to modify this Policy and Agreement at any time, effective upon its posting, as modified. Each time you use the Website, you agree to then currently posted policies and Agreements by accessing or using our Website, products or services.