The Acceptable Use Policy below defines the actions which NetEase
considers to be abusive, and thus, strictly prohibited. The examples
named in this list are non-exclusive, and are provided solely for
guidance to NetEase customers. If you are unsure whether any
contemplated use or action is permitted, please send us a request online and we will assist you.
Please note that the actions listed below are also not permitted from
other Internet Service Providers on behalf of, or to
advertise, any service hosted by NetEase, or connected via the NetEase
network. Furthermore, such services may not be advertised via deceptive
marketing policies, as defined by the
Federal Trade Commission.
Customers are prohibited from transmitting on or through any of NetEase's
services, any material that is, in NetEase's sole discretion, unlawful,
obscene, threatening, abusive, libelous, or hateful, or encourages
conduct that would constitute a criminal offense, give rise to civil
liability, or otherwise violate any local, state, national or
NetEase services may only be used for lawful purposes. Transmission,
distribution, or storage of any information, data or material in
violation of United States or state regulation or law, or by the
common law, is prohibited. This includes, but is not limited to,
material protected by copyright, trademark, trade secret, or any other
statute. NetEase reserves the right to remove such illegal material from
The customer is responsible for keeping his billing data with NetEase
up-to-date and accurate. Furnishing false data on the service application, including fraudulent use of credit
card numbers, is grounds for immediate termination, and may subject
the offender to civil or criminal liability.
The resale of NetEase products and services is not permitted,
unless specifically permitted and documented in a written agreement.
System and Network Security
Customers may not attempt to circumvent user authentication or
security of any host, network, or account ("cracking"). This includes,
but is not limited to, accessing data not intended for the Customer,
logging into a server or account the Customer is not expressly
authorized to access, or probing the security of other networks
(such as running a SATAN scan or similar tool).
Customers may not attempt to interfere with service to any user, host,
or network ("denial of service attacks"). This includes, but is not
limited to, "flooding" of networks, deliberate attempts to overload
a service, and attempts to "crash" a host.
Customers may not run un-authorized servers accessible via users connection. This includes
mail servers, web servers, ftp, etc..
Customers may not use any kind of program/script/command, or send
messages of any kind, designed to interfere with a user's terminal
session, via any means, locally or by the Internet.
Users who violate systems or network security may incur criminal or
civil liability. NetEase will cooperate fully with investigations of
violations of systems or network security at other sites, including
cooperating with law enforcement authorities in the investigation of
suspected criminal violations.
Harassment, whether through language, frequency, or size of messages,
Customers may not send email to any person who does not wish to receive
it. If a recipient asks to stop receiving email, the customer must not
send that person any further email.
Customers are explicitly prohibited from sending unsolicited bulk mail
messages ("junk mail" or "spam"). This includes, but is not limited
to, bulk-mailing of commercial advertising, informational
announcements, and political tracts. Such material may only be sent to
those who have explicitly requested it.
Customers may not forward or otherwise propagate chain letters,
whether or not the recipient wishes to receive such mailings.
Malicious email, including but not limited to "mailbombing" (flooding a
user or site with very large or numerous pieces of email), is prohibited.
Forging of header information is not permitted.
NetEase accounts or services may not be used to collect replies to
messages sent from another Internet Service Provider, where those
messages violate this Acceptable Use Policy or the Acceptable Use
Policy of that other provider.
These rules apply to other types of Internet-based distribution
mediums as well, such as RLG's Ariel system (a system for sending
FAX-like documents over the Internet).