Acceptable Use Policy
Last Updated 7/3/2002
Contact Communication's
(Contact) Acceptable Use Policy (the "Policy") for Contact's
Internet Products and Services is designed to help Contact's customers,
the Internet community and Contact from irresponsible or, in some
cases, illegal activities. The Policy is a non-exclusive list
of the actions prohibited by Contact. Contact reserves the right
to modify the Policy at any time.
Prohibited
Uses of Contact's Systems, Products and Services
1. Transmission,
distribution or storage of any material in violation of any applicable
law or regulation is prohibited. This includes, without limitation,
material protected by copyright, trademark, trade secret or other
intellectual property right used without proper authorization,
and material that is obscene, defamatory, constitutes an illegal
threat, or violates export control laws.
2. Sending
unsolicited mail messages, including the sending of "junk
mail" or other advertising material to individuals who did
not specifically request such material ("e-mail spam").
This includes, but is not limited to, bulk-mailing of commercial
advertising, informational announcements, and political tracts.
It also includes posting the same or similar message to one or
more newsgroups (excessive cross-posting or multiple-posting).
Contact accounts or services may not be used to solicit customers
from, or collect replies to, messages sent from another Internet
Service Provider where those messages violate this Policy or that
of the other provider.
3. Unauthorized
use, or forging, of mail header information (e.g. "spoofing").
4. Unauthorized
attempts by a user to gain access to any account or computer resource
not belonging to that user (e.g., "cracking").
5. Obtaining
or attempting to obtain service by any means or device with intent
to avoid payment.
6. Unauthorized
access, alteration, destruction, or any attempt thereof, of any
information of any Contact customers or end-users by any means
or device.
7. Copying,
distributing or sublicensing any software provided by Contact
except that Customer may make one copy of each software program
for back-up purposes only.
8. Servicing,
altering, modifying or tampering with the Contact equipment or
service or permit any other person to do the same that is not
authorized by Contact.
9. Restricting,
inhibiting or otherwise interfering with the ability of any other
person to use or enjoy Contact equipment or services, including,
without limitation, knowingly posting or transmitting any information
or software which contains a virus or other harmful feature, or
generating levels of traffic sufficient to impede others' ability
to send or retrieve information.
10. Knowingly
engage in any activities that will cause a denial-of-service (e.g.,
synchronized number sequence attacks) to any Contact customers
or end-users whether on the Contact network or on another provider's
network.
11. Advertising,
transmitting, or otherwise making available any software, program,
product, or service that is designed to violate this AUP or the
AUP of any other Internet Service Provider, which includes, but
is not limited to, the facilitation of the means to send e-mail
spam, initiation of pinging, flooding, mail-bombing, denial of
service attacks, and piracy of software.
12. Using
Contact's Services to interfere with the use of the Contact network
by other customers or authorized users.
Each Contact
ISP customer is responsible for the activities of its customer
base/representatives or end-users and, by accepting service from
Contact, is agreeing to ensure that its customers/representatives
or end-users abide by this Policy. Complaints about customers/representatives
or end-users of a Contact ISP customer will be forwarded to the
Contact ISP customer's postmaster for action. If violations of
the Contact Acceptable Use Policy occur, Contact ISP customer's
Services reserves the right to terminate services with or take
action to stop the offending customer from violating Contact's
AUP as Contact deems appropriate, without notice.