Signup Homepage My Account Support Contact Us
Web E-Mail Login
Email Address
Password

E-Mail Software Settings
Net Announcement
All Services are operational.

echeck and credit card paying customers please note that the name on your statement will now read "STARNOVA".

For our payment address click here!

Please keep an eye out for Phishing scams, Remember we will never ask you for your username and password via Email.
User Service Agreement
Acceptable Use Policy
Privacy Policy
cbtek.com News!
cbtek.com Links!
Channels
Business & Economy
Computers & Internet
News & Media
Entertainment
Recreation & Sports
Health
Movies & Culture
Education
Weather
Games
ACCEPTABLE USE POLICY
Rev: 11012023-Starnova LLC - cbtek.com
PREFACE:
This Acceptable Use Policy (the POLICY) is used to define those actions which are considered appropriate and inappropriate by an account user (the CLIENT) while utilizing the Internet Service (the SERVICE) of Starnova LLC - cbtek.com or an associated organization (the PROVIDER). If an account is found to be in violation of this POLICY, we reserve the right to terminate service to that CLIENT without notice. We prefer to warn CLIENTs of inappropriate behavior and suggest corrective action short of termination. However, flagrant violations of the POLICY can result in immediate termination of service, without notice or warning. Failure to enforce this POLICY, for whatever reason, shall not be construed as a waiver of the PROVIDER's right to do so at any time. As a part of our network community, CLIENTs must use their Internet service responsibly. Questions regarding this POLICY, or complaints, should be directed to abuse@starnova.com

1. GENERAL USE:
In general, you cannot use your Internet account in a manner: which violates any law, regulation, treaty or tariff; in a manner which violates the rules, regulations and policies of any network, server, web site, database or service provider you access through your Internet account; in a manner which is defamatory, fraudulent, indecent, offensive or deceptive; to threaten, harass, abuse or intimidate others; to damage the name or reputation of&cbtek.com or its subsidiaries; to break security on any computer network, or to access an account which does not belong to you; or in a manner which interferes with other CLIENT's use and enjoyment of the services provided. The PROVIDER reserves sole discretion whether any use of the service is a violation of this POLICY.

2. LIMITATIONS OF GUIDELINES:
The guidelines provided below are not intended to be all-inclusive. The PROVIDER reserves the right to term an action or behavior taken by a CLIENT to be a breach of the spirit of these guidelines as well as the letter, and take necessary steps as outlined in this POLICY.

3. MODIFICATION OF POLICY:
The PROVIDER reserves the right to modify this policy at a later date. If modifications to this POLICY are made, the PROVIDER will post a notification of such changes on the Internet, at http://cbtek.com. Changes will be in effect as of the date of notification.

4. ELECTRONIC MAIL:
Each CLIENT's account includes access to send and receive electronic mail ("email"). Misuse of a CLIENT's EMAIL account may result in termination of service. The following examples are non-exclusive, and are provided for your guidance. You may not use your account to send unsolicited bulk or commercial EMAIL messages ("spam"). This includes, but is not limited to, bulk mailing of commercial advertising, informational messages, charity requests, petitions for signatures, or political or religious tracts. Such messages may only be sent to those email addresses which explicitly request such messages. You may not use your account to collect responses from unsolicited bulk or commercial email sent from the accounts of other service providers. Forging, altering, or removing electronic mail headers is prohibited. You may not send numerous copies of the same or substantially the same message, nor may you send very large messages or files to a recipient, with the intent to disrupt a server or account ("mail bombing").

5. MAILBOX LIMITATIONS:
It is expected that the CLIENT will regularly monitor their email messages, and download messages off the server in a timely manner. If the files in your mail box exceed your quota capacity for a period longer than five (5) days, you will be alerted by the PROVIDER, and asked to download and archive your messages offline. Failure to comply within another five (5) business days may result in those files being purged from the system.

6. EMAIL HARRASSMENT:
You may not use your email account to harass or intimidate others. Harassment, whether through language, frequency of messages, or size of messages is prohibited. Sending a single unwelcome message may be considered harassment. If a recipient asks to stop receiving email, you must not send that person any further messages. You may not forward or otherwise propagate chain letters, whether such messages solicit money or other items of value or not, and regardless of whether the recipient wishes to receive such messages. SERVICE email accounts may not be used to collect replies to messages sent from another Internet service provider if those messages violate this POLICY.

7a. PERSONAL WEB SITE:
The personal web space made available to some CLIENTS as part of their SERVICE is for personal use only. It may not be used as a promotional web page for any commercial product or service, nor can such products or services be offered for sale on the page. The CLIENT may not link their personal web space to another web location to bypass any provision of this POLICY.

7b. BUSINESS WEB SITE:
The business web space made available to some CLIENTS as part of their SERVICE is for business use and may contain marketing related content for products or services.

8. WEB SITE CONTENT:
The PROVIDER does not routinely monitor the content of web sites. The CLIENT is solely responsible for the content of their web site. The PROVIDER reserves the right, but does not bear the responsibility, to remove any content or files from its server space which is illegal or otherwise does not comply with this POLICY. The CLIENT may not use their web space to publish content which the PROVIDER determines, at its sole discretion, to be unlawful, indecent, or objectionable. For the purposes of this POLICY, "content" refers to all forms of communications including narrative descriptions, graphics (including photographs, illustrations, images, drawings, logos), executable programs, video recordings and audio recordings. "Unlawful" content is that which violates any law, statute, treaty, regulation or lawful order. This includes, but is not limited to: obscene material, defamatory, fraudulent or deceptive statements, threatening, intimidating, or harassing statements, or material which violates the privacy or property rights of others (including copyrights and trademarks). "Indecent" content includes, but is not limited to, that which depicts images or descriptions of acts or activities of a sexually frank nature, explicit nudity, or that which is otherwise judged to be inappropriate for the public media. "Objectionable" content is that which is otherwise lawful, but which the PROVIDER, at its sole discretion, considers inappropriate for the public domain, or which the PROVIDER does not want its name or those of its employees associated with.

9. WEB SITE WARNING PAGE:
Any web page hosted on the PROVIDER's system which displays any content which is inappropriate for all persons or age groups must display a warning page which advises potential viewers as to the nature of the site. This warning page should contain no objectionable images or language, and should be clear in warning potential viewers about the consequences of continuing. The display of a warning page does not circumvent the restrictions on Personal Web Site Content noted above.

10. HACKING:
You may not attempt to circumvent user authentication or security of any host, network or account ("cracking"). This includes, but is not limited to, accessing data not intended for you, logging into or making use of a server or account you are not expressly authorized to access, or probing the security of other networks. Use or distribution of tools designed for compromising security is prohibited. Examples of these tools include, password guessing programs, cracking tools or network probing tools. You may not attempt to interfere with service to any user, host, or network ("denial of service attacks"). This includes, but is not limited to: "flooding" of networks, deliberate attempts to overload a service, and attempts to "crash" a host. Users who violate systems or network security may incur criminal or civil liability. The PROVIDER will cooperate fully with investigations of violations of systems or network security at other sites, including cooperation with law enforcement authorities in the investigation of suspected criminal activities.

11. ILLEGAL ACTIVITY:
Any activity on the PROVIDER's network that is a violation of any state or federal law is a violation of this POLICY and will result in immediate termination of SERVICE. Prohibited activities include, but are not limited to: transmitting obscene materials; intentionally spreading or threatening to spread computer viruses; gaining or attempting to gain unauthorized access to any network or system, including the PROVIDER's private network infrastructure; accessing or attempting to access information which is not intended for you; transmitting pirated software; conducting or participating in illegal gambling; or soliciting for pyramid or other illegal schemes.

12. REPORTING VIOLATIONS OF POLICY:
CLIENTs and others who wish to report a violation of this POLICY may do so to abuse@starnova.com. All complaints will be kept confidential. Complaints which are found to have merit will result in a warning to the CLIENT found in violation, or termination of SERVICE, should the violation warrant. Repeated warnings will result in termination of SERVICE.

Weather and Stocks
Zip Code:


Stock updates may be delayed upto 15minutes.
Amazon Channels
Appliances
Air Cleaners, Humidifiers, Small Appliances

Arts, Crafts and Sewing
Scrapbooking, Sewing, Needlework, Knitting/Crochet

Automotive
Car Care, Interior, Exterior

Books
General, Audio Books, Childrens Books

Cell Phones and Accessories
Phones, Accessories, No Contract Phones

Clothing
Shoes, Women, Men, Accessories

Collectibles
Sports, Entertainment

Electronics
TV and video, Software

Gift Cards
Restaurants, Amazon

Grocery
Groceries, Natural/Organic, Gourmet,

Health and Personal Care
Diet/Nutrition, Healthcare, Personal, Medical Supplies

Home and Kitchen
Home Decor, Kitchen/Dining, Wall Decor, Seasonal Decor

Jewelry
Rings, Necklaces, Bracelets

Magazines and subscriptions
Antiques, Arts, Home Improvement

Movies
Blu-ray, DVD, VHS

Music
Best Sellers, New Releases, Deals

Office products
Office Supplies, Office Electronics, Office Furniture

Patio, lawn and garden
Gardening, Outdoor Decor, Birds/Wildlife

Pet Supplies
Birds, Cats, Dogs, Fish

Tools
Power/Hand Tools, Storage

Toys and Games
Hobbies, Puzzles, Grown Up


Internet Channels
Automotive
Car Buying, Financing

Careers
Employment, Listings

Computers
Software, Desktops

Entertainment
Music, Movies

Family
Parenting, Teens

Finance
News, Stocks

Food and Drinks
Recipes, Cooking

Health
Children, Seniors

Insurance
Automotive, Life and Health

Kids
Education, Games

News
Online, Business

Real Estate
Listings, Financing

Sports
General, College

Travel
Tickets, Resorts

Women
Fashion, Family


Search the internet
Search:
To Suki Waterhouse, th ..
to suki waterhou se, there s no point in bein ...
Arsenal vs Manchester ..
arsenal vs manchest er united player ratings ...
OpenAI partners with w ..
openai partners with weapons start up anduril ...