Websites we won't do
We will not design a website for you if your proposed website:
- contains offensive content
- proposes illegal activities
- contains material protected by copyright used without permission
- furthers illegal, abusive, or irresponsible behavior
Illegal Content
Illegal content includes, but is not limited to, content which:
- is intended to assist others in defeating technical copyright protections
- promotes illegal drugs, violates export control laws, relates to illegal gambling, or illegal arms trafficking
- is unfair or deceptive under the consumer protection laws of any jurisdiction, including chain letters and pyramid schemes
- is otherwise illegal as defined by local, state, or national law, or solicits conduct that is illegal under applicable laws
Offensive Content
Offensive content is, for example, material which:
- is excessively violent, incites or threatens violence, or contains harassing content or hate speech
- is defamatory or violates a person's privacy
- creates a risk to a person's safety or health, creates a risk to public safety or health, compromises national security, or interferes with an investigation by law enforcement
- exposes trade secrets or other confidential or proprietary information of another person
- clearly infringes on another person's trade or service mark, patent, or other property right
- is otherwise malicious, fraudulent, or may result in retaliation against our web designers by offended viewers
Material Protected by Copyright
We will not design a site to distribute any music, software, art, or other work protected by copyright law unless:
- you have been expressly authorized by the owner of the copyright for the work to copy the work in that manner
- you are otherwise permitted by established United States copyright law to copy the work in that manner
Abusive Content
A site is deemed to be abusive if it promotes or carries out illegal, abusive, or irresponsible behavior. Your site would be abusive if it were to:
- grant or promote unauthorized use of or access to data, computer systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures
- monitor data or traffic on any network or system without the authorization of the owner of the system or network
- interfere with service to any user, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks
- promote or carry out Internet scanning (tricking other people into releasing their passwords), password robbery, security hole scanning, or port scanning
- forge TCP/IP packet headers or any part of the header information in an e-mail or a newsgroup posting
- promote or carry out any conduct that is likely to result in legal retaliation