Acceptable Use Policy and Internet Service Disclosure Statement

 

INTRODUCTION

This Acceptable Use Policy ("AUP") is intended to help enhance the use of the Internet by preventing unacceptable use. It is not a "terms of service" or a billing guideline. Please refer to your Terms of Service for terms and conditions applicable to your Internet Service. PLEASE READ THIS POLICY CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE, YOU AGREE TO BE BOUND BY THIS POLICY. IF YOU DO NOT WISH TO BE BOUND BY THIS AUP, YOU MAY NOT ACCESS OR USE THE SERVICE.

 

This WTC Internet AUP applies to Residential Consumer and Business customer use of Internet Service ("Services") provided by WTC ("Service Provider"). Your use of the Services indicates your acceptance of and agreement to abide by this Acceptable Use Policy. It is designed to help protect the Service, Service Provider customers and the Internet community from irresponsible or illegal activities. Service Provider may modify this AUP from time to time. In the event of any inconsistency between Service Provider Acceptable Use Policy and the terms of any service agreement, this Acceptable Use Policy shall govern and control.

 

GENERAL POLICY

Service Provider reserves the right in its sole discretion to deny or restrict your use of the Services, or immediately to suspend or terminate your Services, if the use of your Services by you or anyone using it, in our sole discretion violates your Terms of Service or other Service Provider policies, is objectionable or unlawful, interferes with the functioning or use of the internet or Service Provider network by Service Provider or other users or violates the terms of this AUP.

 

ILLEGAL AND PROHIBITED USE

This section is used to address actions, content and or practices that are prohibited by law and by rules set forth by the Service Provider. Please review the sections below before using Service Provider's services or networks. The restrictions are not negotiable. Not all services provided by Service Provider are listed or mentioned but are bound by this document. Users found to engage in activities that Service Provider determines, in its sole discretion, are in violation of this AUP will have their accounts terminated. Violators may also be subject to any appropriate legal action and/or consequences. Service Provider reserves the right to cooperate with legal authorities and/or injured third parties in the investigation of any suspected illegal activity or civil wrong. Activities or use of Services considered by Service Provider to be a violation of this AUP are as follows, but are not limited to:

  • to post or transmit information or communications that, whether explicitly stated, implied, or suggested through use of symbols, are obscene, indecent, pornographic, sadistic, cruel, or racist in content, or of a sexually explicit or graphic nature; or which espouses, promotes or incites bigotry, hatred, terrorism or racism; or which might be legally actionable for any reason;
  • to post, transmit, download or view any material whatsoever pornographic in nature involving actual images of children or minors or digitally or otherwise artificially created or manipulated images of children or minors, or any material whatsoever that may be deemed obscene under applicable law;
  • to access or attempt to access the accounts of others, to spoof or attempt to spoof the URL or DNS or IP addresses of Service Provider or any other entity, or to attempt to penetrate or penetrate security measures of Service Provider or other entities' systems ("hacking") whether or not the intrusion results in corruption or loss of data;
  • to introduce viruses, worms, harmful code and/or Trojan horses on the Internet;
  • to violate Service Provider or any third party's copyright, trademark, proprietary or other intellectual property rights, including trade secret rights;
  • to use any name or mark of Service Provider, its parent, affiliates or subsidiaries, as a hypertext link to any Web site or in any advertising publicity or other commercial manner;
  • to use the Service or the Internet in a manner intended to threaten, harass, intimidate or terrorize;
  • to make false or unverified complaints against any Service Provider subscriber, or otherwise abusing any of Service Provider complaint response procedures
  • Indirect or attempted violations of this AUP.
  • Reselling of service provided by Service Provider.
  • Services used to transmit, retransmit, distribute, post, or store any material that in the judgment of Service Provider is threatening, libelous, defamatory, or otherwise objectionable including but not limited to child pornography and advocating unlawful activity against any persons, animals, governments or businesses. Harassment of users, employees, or of others will not be tolerated.
  • Actions and/or services prohibited by federal, state and local law.
  • Distribution, posting, copying or dissemination of copyrighted material including but not limited to movies and/or music.
  • Inhibiting any other person's use of the service provided by Service Provider is prohibited.
  • Participation in illegal gambling, lottery or other similar activities.
  • Transmission of scams such as "Make Money Fast" schemes.
  • Making fraudulent offers.
  • The attempt to access the accounts of other or other computers and/or networks to penetrate security measures, whether or not the intrusion results in damage.

 

Service Provider reserves the right to limit, restrict and/or prohibit services it provides to customers, as Service Provider determines necessary. The restrictions mentioned apply to all users unless specifically documented.

 

EMAIL

Service Provider reserves the right to limit the file size of individual email mailboxes at its sole discretion. Individual email mailboxes found over the limit will be subject to deletion without notice. Deleted email will not be restored or saved. Service Provider reserves the right to limit the maximum transfer limit of any one message in its sole discretion. Service Provider reserves the right to reject or filter email based on source address and content. Examples are, but are not limited to, virus filtering and blocking open relay mail servers.

 

Service Provider will not make back-ups of a customer's email.

 

The services may not be used to transmit, retransmit, or distribute by e-mail or any other method any material that violates any condition of this AUP in the sole judgment of WTC. Activities considered by Service Provider to be a violation of this AUP are as follows, but are not limited to:

  • Any unsolicited e-mail, whether commercial or otherwise, including, but not limited to, bulk mailing of commercial advertising, informational announcements, and political tracts.
  • Solicited e-mail that contains material that otherwise violates this AUP or any e-mail that falsifies the address or other information; harassing e-mail, whether through language, frequency, or size of messages.
  • Any e-mail "chain letters" or other "pyramid schemes."
  • E-mail relayed without the express permission of that site, service, system or network.
  • E-mailing the same or similar messages to one or more newsgroups (also known as "cross-posting" or "multiple posting").
  • E-mail containing false or misleading statements, claims, or representations.
  • Forging header information including, but not limited to, any attempt to circumvent the approval process for posting to a moderated newsgroup.

 

SPAM

Service Provider has a "zero tolerance" policy for SPAM. Any User of Service Provider services found to be actively distributing or engaged in the mass distribution of unsolicited emails without consent of the intended receiver may have their account(s) terminated and all future access to Service Provider's services and network revoked.

 

You may not use the Service or any Equipment or Software provided by Service Provider:

(a) to send e-mail of a personal, bulk or commercial nature, including, without limitation, bulk mailings of commercial advertising, informational announcements, charity requests, political or religious messages, and petitions for signatures, except to those who have requested such e-mails via a confirmed opt-in subscription process maintained by You;

(b) to send e-mail or other messages to someone who has indicated that he or she does not want to receive messages from You;

(c) to collect or receive responses from unsolicited e-mail messages (even if such e-mail was sent from accounts on other Internet service providers or e-mail services) that violate the Agreement or this Acceptable Use Policy or the terms of use under the other Internet service provider or e-mail service from which it was sent;

(d) to conduct "mail bombings" (e.g., to send more than ten copies of the same or substantially similar message, or to send very large messages or files, with the intent of disrupting a server or account);

(e) to send or forward make-money-fast schemes or chain/pyramid letters (whether or not the recipient requests it);

(f) to harvest e-mail addresses or personal information of other Service Provider subscribers or the subscribers of any other network; or

(g) to use another Internet site's mail server to relay mail without the express permission of the owner of that Internet site.

(h) to use e-mail or the internet in violation of federal law or the rules of the Federal Communications Commission.

 

ETHERNET

Service Provider restrictions to Ethernet services are:

  • Multiple logons are restricted.
  • Users are only allowed to logon once with the same account.
  • Accounts establishing concurrent connections will be disconnected.
  • Abuses of this service may be subject to account termination.
  • Modifications of the Ethernet equipment in ways other than advised by the manufacturer are restricted.

 

SERVING

Serving of any kind is NOT allowed without express written consent from Service Provider. Consent should be given in a separate service contract and should be producible by the customer upon request from Service Provider.

 

Serving constitutes:

  • Email servers
  • Web
  • HTTP servers
  • FTP servers
  • IRC servers
  • Other Listening IP services

 

UNAUTHORIZED SHARING

You agree not to allow others to use any of the services provided including, but not limited to, sharing your account user name and password, dial-up access, or broadband access via any type of networking device (router, gateway, wireless access point, etc.). You may at your own risk and responsibility permit other members of your household to access the services and utilize some networking devices approved by the provider for use within your household only. You as the account holder shall ensure that other such users are aware of and comply with these terms of use, and you agree to be held responsible for any activity or use of the services on that account, whether or not authorized by you.

 

COMMERCIAL USE

Re-selling Service Provider's services or offering use of Service Provider's services for adding value to a commercial entity without Service Provider's authorization is prohibited. Service Provider's services are designed for the account holder's use of the Internet and may not be used for commercial purposes without the Service Provider's explicit consent. You also agree not to use Service Provider's services for operation as an Internet Service Provider (WTC), or for any other business enterprise including, without limitation, IP address translation or similar facilities intended to provide access, operating or allowing others to operate servers of any type, or any other device, equipment and/or software providing server-like functionality in connection with Service Provider's services, unless expressly authorized.

 

OTHER

Other services not specifically listed in this AUP but that are provided by Service Provider are bound by this AUP.

 

COMPLIANCE WITH THE AUP OF UPSTREAM PROVIDERS

The AUP of Service Provider's upstream providers also bind Service Provider users. An "upstream provider" is any provider that provides Service Provider bandwidth and/or other services.

 

SYSTEM & NETWORK SECURITY

Violations of system or network security are prohibited and may result in criminal and civil liability. Service Provider will investigate incidents involving such violations and may involve and will cooperate with law enforcement if a criminal violation is suspected. Examples of system or network security violations include, without limitation, the following:

  • port scanning, probes, data capture, denial of service, access of restricted systems.
  • attempted access of systems not previously given access to.
  • anything deemed "hacking" or "cracking" to the systems, network or users.
  • unauthorized access to or use of data, including any attempt to circumvent user authentication or security of any host, network, or account (hacking, cracking, port scans, or flood pings).
  • unauthorized monitoring of data or traffic. - interfering with service to any user, host, system or network.
  • conducting denial of service attacks.
  • any attempt to disrupt service including, but not limited to, distributing or introducing viruses, worms, or other harmful software.
  • access by using artificial means, involving software, programming, or any other method.

 

COPYRIGHT INFRINGEMENT/REPEAT INFRINGER POLICY

Service Provider respects the intellectual property rights of third parties, including those granted under the US copyright laws, and the interests of its subscribers and content providers on the Internet. You may not store material of any type or in any format on, or disseminate such material over, Service Provider ' systems or servers in any manner that constitutes an infringement of third party intellectual property rights, including rights granted under the US copyright laws. In accordance with the Digital Millennium Copyright Act (DMCA) and other applicable law, it is the policy of Service Provider to terminate, in appropriate circumstances, the Service provided to any subscriber or account holder who is deemed to infringe third party intellectual property rights, including repeat infringers. Appropriate circumstances may exist where:
(i) a Subscriber or account holder has been found by a court of competent jurisdiction to have infringed the copyrights of a third party on two or more occasions, i.e., a repeat infringer,
(ii) where a valid, effective and uncontested notice has been provided to Service Provider alleging facts which are a violation by the Subscriber or account holder of Service Provider Copyright Policy prohibiting infringing activity involving Service Provider systems or servers, or
(iii) in other cases of repeated flagrant abuse of access to the Internet (e.g., willful commercial piracy or malicious attempts to destroy the value of copyrighted works). In addition, Service Provider expressly reserves the right to terminate or suspend the Service of any Subscriber or account holder if Service Provider, in its sole judgment, believes that circumstances relating to the infringement of third party intellectual property rights warrant such action. These policies are in addition to and do not affect or modify any other rights Service Provider may have under law or contract.

 

You shall comply with all applicable local, state, national and international laws and regulations, including those related to data privacy, international communications, and exportation or technical or personal data. You represent that you are not a specifically designated individual or entity under any US embargo or otherwise the subject, either directly or indirectly (by affiliation, or any other connection with another party) to any order issued by any agency of the US Government limiting, barring, revoking or denying, in whole or in part your US export privileges. You agree to notify Service Provider if you become subject to any such order.

 

You shall not delete any proprietary designations, legal notices or other identifiers belonging to third parties from any information obtained or sent using the Service and shall not impersonate any person or use a false name while using the Service. You agree to obtain all required permissions if you use the Service to receive, upload, download, delay, distribute, or execute Software or perform other works protected by intellectual property laws including copyright, trademark, trade secret and patent laws. You agree to cooperate with Service Provider and provide requested information in connection with all security and use matters. You agree to notify Service Provider promptly if you suspect unauthorized use of the Service or of your UserID. Service Provider reserves the right to cooperate with legal authorities and/or injured third parties in the investigation of any suspected crime or civil wrong. Such cooperation may include, but not be limited to, provision of account or user information or email as well as monitoring of the Service Provider network.

 

USER RESPONSIBILITY

Users need to be aware that they do not operate in a vacuum. Safe practices need to be taken by the users to protect themselves and others.
Users are responsible for account passwords and should keep them safe.
Do NOT share account information.
Do NOT leave username and passwords in the open.
If a user feels that the account was compromised, the username and or password should be changed at once.
Do NOT "save" user names or passwords. Each should be entered at each login.
Users are responsible for protecting their own equipment. Anti-virus software and personal firewalls are not required but strongly encouraged.
Users are responsible for any misuse of Service Provider services that occurs through user's account. Users are responsible for protecting their accounts and must take steps to insure that others do not gain unauthorized access to user's account or misuse Service Provider's services.

 

ADMINISTRATIVE DISCRECTION

Service Provider administrators, staff, and executives have sole and final discretion over all aspects of service, the network, and this AUP. Service Provider reserves the right to terminate any account or service without cause or prior notice.

 

VIOLATIONS AND MONITORING

Service Provider does not intend to actively monitor the content of web sites, e-mail, news groups, or material created or accessible over its services. Service Provider reserves the right to monitor such services or any services on or within our network.
Reporting Violations and complaints:

  • Violations, attempted violations, and/or concerns should be brought to WTC’s attention.
  • When reporting anything to Service Provider please include:
    • The internet protocol address used to commit the alleged violation.
    • The date, time and time zone of such violation.
    • Evidence of the violation, including, if applicable, full headers from emails, firewall logs, traffic dumps (example, the *.enc files generated by Network Ice's Black Ice program or "hex" dump from any other firewall or IDS system) or information pertaining to the events in question.
    • Do not send excerpted parts of a message; sending the entire message with full headers helps prevent misunderstandings based on incomplete information or information taken out of context. Service Provider has sole judgment and discretion on how we enforce this AUP. Guidelines as to punishment and legal action will be within the Service Provider's legal department and administrative department discretion.

 

REVISIONS

Changes to this AUP are considered effective immediately and it is the end user's responsibility to stay current. Service Provider can make changes to the AUP at any time without notice. Changes to this document will be available on Service Provider's web page. Service Provider may, but is not required to, monitor your compliance, or the compliance of other subscribers, with this Acceptable Use Policy.

 

NETWORK MANAGEMENT PRACTICES

WTC utilizes reasonable practices to ensure the security, integrity and performance of its Internet network. These practices include but are not limited to:

  1. Congestion Management – [WTC measures and monitors network performance in order to ensure a consistent and high quality Internet access service is being provided to its customers. In the event WTC identifies congestion in any part of its network, WTC will take the steps necessary to resolve such an issue. These steps include, but are not necessarily limited to, identifying unreasonably high individual customer usage and temporarily limiting available bandwidth to those customers, identifying specific types of high usage traffic and limiting available bandwidth available to those specific types of activity, and other such practices as to ensure sufficient bandwidth is available to all of WTC’s customers.
  2. WTC at this time does not limit access or bandwidth to any specific Internet applications in relation to WTC’s network. However, WTC reserves the right to reasonably manage its network and may, in the future, consider such a practice. The implementation of any such application-specific limitation policy will be clearly noted in an update to this Disclosure Statement.
  3. Device Attachment - Many modems, such as dial-up and cable modems, will not work with WTC’s DSL. If you already have a DSL modem from another ISP, you can bring it into WTC’s Wamego office and where it can be tested to determine capability. If the modem is not compatible you will either need to purchase a modem yourself or buy one from WTC.
  4. WTC operates secure data networks protected by industry standard firewall and password protection systems. Our security and privacy policies are periodically reviewed and enhanced as necessary and only authorized individuals have access to the information provided by our customers. In addition, WTC may identify spam and prevent its delivery to customer email accounts, detect malicious Internet traffic and prevent the distribution of viruses or other harmful code or content and use other tools and techniques that WTC may be required to implement in order to meet its goal of delivering the best possible broadband Internet experience to all of its customers.
  5. Specialized Services – WTC provides video services using the same facilities used for providing broadband Internet access. WTC’s video services may impact the capacity of its broadband Internet access services, and these video services may also impact the provision of non-WTC Internet or Internet-based services

 

This Disclosure statement applies only to the network owned by or otherwise under the control of WTC, and/or any affiliates. WTC is not making any disclosure of any network management practice that may be employed by other network or service providers who may be involved in the customer’s broadband Internet access service.

 

Please contact Customer Service at 785-456-1000 if you have any questions or concerns about this Disclosure Statement.

 
Call Us Email Us