Acceptable Use Policy
Last Modified: May 2021
Life Image and its affiliates (“Life Image”) provide a variety of information, Internet, network-, and technology-related services (“Services”). Life Image has formulated this Acceptable Use Policy (“AUP”) in order to ensure the appropriate use of the Services and the Life Image network, systems, and facilities (“Infrastructure”) by our customers, our customers’ customers, members or end-users, and any other parties who use or access the Services or the Infrastructure (collectively, “Users”). All Users must comply with this AUP. Life Image reserves the right to change this AUP from time to time and will notify Users by posting a revised copy of the AUP on the Life Image Web site. By using or accessing the Life Image Services or Infrastructure, Users agree to be bound by the terms of this AUP. Any indirect or attempted violation of this policy by or on behalf of a User, and any actual or attempted violation by a third party on behalf of a User, shall be considered a violation of the policy by the User and the User shall be held directly accountable therefore.
B. Acceptable Use of Life Image Services and Infrastructure
Users shall not use the Life Image Services or Infrastructure to transmit, distribute, or store material: (a) in violation of any applicable law, regulation, or judicial order; (b) that violates the terms of this AUP, the terms of any applicable agreement with Life Image, or any other Life Image policy applicable through the Agreement; (c) that interferes with or adversely affects the Services or Infrastructure or use of the Services or Infrastructure by other Life Image customers; or (d) that may expose Life Image to criminal or civil liability. Users shall cooperate with Life Image in investigating and correcting any apparent breach of this AUP. Users shall be solely responsible for any material that they maintain, transmit, download, view, post, distribute, or otherwise access or make available using the Services or Infrastructure.
In particular, but without limiting the more general prohibitions in this AUP, Users shall not use the Services or Infrastructure, or assist anyone else to:
- Transmit, distribute or store information or material that, as reasonably determined by Life Image, (a) is inappropriate, obscene (including child pornography), defamatory, threatening, abusive, advocating violence, or which violates a law, regulation, or public policy; (b) is harmful to or interferes with Life Image’ provision of Services, the Infrastructure, or any third party’s networks, equipment, applications, services, or Web sites (e.g., viruses, worms, Trojan horses, etc.); (c) would violate patient privacy rights as prescribed by HIPAA or other applicable laws or regulations; (d) would infringe, dilute, misappropriate, or otherwise violate any privacy, intellectual property, publicity or other personal rights including, without limitation, copyrights, patents, trademarks, trade secrets, or other proprietary information (including unauthorized use of domain names); (e) is fraudulent or contains false, deceptive, or misleading statements, claims, or representations (such as “phishing”); or (f) violates generally accepted standards of Internet usage
- Attempt to disrupt, degrade, impair, or violate the integrity or security of the Services or Infrastructure or the computers, services, accounts, or networks of any other party (e.g., “hacking,” “denial of service” attacks, etc.), including any activity that typically precedes attempts to breach security such as scanning, probing, or other testing or vulnerability assessment activity, or engaging in or permitting any network or hosting activity that results in the blacklisting or other blockage of Life Image IP space
- Avoid incurring charges or otherwise being required to pay for Services
- Transmit unsolicited bulk e-mail messages (“Spam”); having third parties send out Spam on any user’s behalf; receiving replies from unsolicited e-mails (commonly referred to as “drop-box” accounts) or configuring any e-mail server in such a way that it will accept third party e-mails for forwarding (e.g., “open mail relay”). Bulk e-mail may only be sent to recipients who have expressly requested receipt of such e-mail messages via a “verified opt-in” process, which must be adhered to in its entirety for any bulk e-mail to be considered “solicited” by Life Image. Users that send bulk e-mail must maintain complete and accurate records of all e-mail subscription requests (verified opt-ins), specifically including the e-mail and associated headers sent by every subscriber, and to immediately provide Life Image with such records upon request of Life Image. If a site has roaming users who wish to use a common mail server, the mail server must be configured to require user identification and authorization. Users are also prohibited from using the service of another provider to send Spam in order to promote a site hosted on or connected to the Services or Infrastructure, and Users shall not use the Services or Infrastructure in order to (a) send e-mail messages that are excessive and/or intended to harass or annoy others, (b) continue to send e-mail messages to a recipient that has indicated that he/she does not wish to receive them, (c) send e-mail with forged TCP/IP packet header information, or (d) send malicious e-mail, including, without limitation, “mailbombing”;
- Violate any charters, policies, rules or agreements promulgated by any search engines, subscription Web services, chat areas, bulletin boards, Web pages, USENET, or other services accessed via the Services or Infrastructure (“Usenet Rules”), including, without limitation, any cross postings to unrelated news groups, continued posting of off-topic messages, and disrupting newsgroups with materials, postings, or activities that are inappropriate (as determined by Life Image in its sole discretion), unless such materials or activities are expressly allowed or encouraged under the Usenet Rules;
- Violate the applicable acceptable use policies of other ISPs when data, content, or other communications are carried across the networks of such ISPs.
C. Acceptable Use of Life Image Services in the FedRAMP-Certified Infrastructure
In addition to the requirements listed above, Users of Life Image Services that transmit data through Life Image’s FedRAMP-certified Infrastructure must also:
- conduct only authorized business on the system;
- acknowledge that your level of access to FedRAMP-certified Infrastructure owned by Life Image Inc. is limited to ensure your access is no more than necessary to perform your legitimate tasks or assigned duties; if you believe you are being granted access that you should not have, you must immediately notify the Life Image Inc. Operations Center 877-959-5615;
- maintain the confidentiality of your authentication credentials such as your password; do not reveal your authentication credentials to anyone; a Life Image Inc. employee should never ask you to reveal them;
- follow proper logon/logoff procedures and manually logon to your session; do not store you password locally on your system or utilize any automated logon capabilities; you must promptly logoff when session access is no longer needed; if a logoff function is unavailable, you must close your browser; never leave your computer unattended while logged into the system;
- report all security incidents or suspected incidents (e.g., lost passwords, improper or suspicious acts) related to Life Image Inc. systems and networks to the Life Image Inc. Operations Center 877-959-5615;
- not establish any unauthorized interfaces to FedRAMP-certified Infrastructure owned by Life Image Inc.;
- acknowledge that your access to FedRAMP-certified Infrastructure owned by Life Image Inc. is governed by, and subject to, all federal laws, including, but not limited to, the Privacy Act, 5 U.S.C. 552a, if the applicable Life Image Inc. system maintains individual Privacy Act information; your access to Life Image Inc. FedRAMP-certified Infrastructure constitutes your consent to the retrieval and disclosure of the information within the scope of your authorized access, subject to the Privacy Act, and applicable state and federal laws;
- safeguard system resources against waste, loss, abuse, unauthorized use or disclosure, and misappropriation;
- not process U.S. classified national security information in the FedRAMP-certified Infrastructure;
- not browse, search or reveal information hosted by Life Image Inc. except in accordance with that which is required to perform your legitimate tasks or assigned duties;
- not retrieve information, or in any other way disclose information, for someone who does not have authority to access that information;
- ensure that web browsers use Secure Socket Layer (SSL) version 3.0 (or higher) and Transport Layer Security (TLS) 1.0 (or higher); SSL and TLS must use a minimum of 128-bit, encryption;
- ensure that your web browser is configured to warn about invalid site certificates;
- ensure that web browsers warn if the user is changing between secure and non-secure mode;
- ensure that your web browser window used to access FedRAMP-certified Infrastructure owned by Life Image Inc. is closed before navigating to other sites/domains;
- ensure that your web browser checks for a publisher’s certificate revocation;
- ensure that your web browser checks for server certificate revocation;
- ensure that web browser checks for signatures on downloaded files;
- ensure that web browser empties/deletes temporary Internet files when the browser is closed;
- understand that any person who obtains information from a computer connected to the Internet in violation of her employer’s computer-use restrictions is in violation of the Computer Fraud and Abuse Act; and
- agree to contact the Life Image Inc. Chief Information Security Officer or the Life Image Inc. Operations Center 877-959-5615 if you do not understand any of these rules.
D. Life Image Rights and Remedies
Life Image has no responsibility for any material or information created, stored, maintained, transmitted, or accessible on or through the Services or Infrastructure and is not obligated to monitor or exercise any editorial control over such material. In the event that Life Image becomes aware that any such material may violate this AUP and/or expose Life Image to civil or criminal liability, Life Image reserves the right to investigate such material, block access to such material, and suspend or terminate any Services without liability. Life Image further reserves the right to cooperate with legal authorities and third parties in investigating any alleged violations of this AUP, including disclosing the identity of any User that Life Image believes is responsible for such violation. Life Image also reserves the right to implement technical mechanisms to prevent AUP violations. Nothing in this AUP shall limit in any way Life Image’ rights and remedies at law or in equity that may otherwise be available.