top of page

Acceptable Usage Policy

Unlawful Activity

Generally, Inc. prohibits any activities that are illegal, fraudulent, infringes on the rights of any person or entity, or interferes with the use and enjoyment of the Service by others. This includes but is not limited to the examples listed below:


Use of the service to:


  • transmit, receive, store, post, or otherwise disseminate any defamatory, obscene, libelous, unlawful, or threating data, information, or material.

  • in any way disseminate any material, data, or information that any reasonable person could deem as unlawful, or could constitute a criminal offense, or in any way violates any local, state, or federal law.

  • infringe in any manner the copyright or proprietary rights of any rights holders.

  • download or in any way distribute any copyrighted material without the express permission of the copyright holder.

  • engage in unsolicited bulk or commercial email messages ("spam").

  • perform any activity that disrupts the servers, services, or network of Inc. or any other entity, commonly referred to as a denial of service attacks.

  • restrict, inhibit, or otherwise diminish with the ability of any person or entity, regardless of intent, purpose or knowledge, to use or enjoy the Service (with the exception of tools designed for safety, such as firewall or parental control software).

  • falsify, alter, or remove message headers or packet headers or in any way alter normal network operations.

  • impersonate any person or entity by name or other identifier in messages, engage in sender address falsification, forge anyone else's digital or manual signature, or perform any other similar fraudulent activity, commonly referred to as "phising".

  • violate the terms of service, acceptable use, rules, regulations, or policies of any service, network, system, server, or application you access or use.

  • access any entities computer, network, data, or software without the consent of the owner; bypass or attempt to breach any security measures of any computer, network, service, or account. This includes but is not limited to using other entities credentials to which you are not authorized, accessing data not intended for you, and any unauthorized port scanning.

  • obtain, distribute, or use any tools or devices designed or commonly used for compromising the security of computers, networks, or software. This includes but is not limited to password generators, decoders, packet sniffers, keystroke loggers, cracking tools, and Trojan Horse programs.

  • perform any service, alterations, or modifications with the Inc. equipment or Service or permit any other person to do such who is not authorized by Inc.

  • redistribute or resell the service or otherwise make the service available to anyone outside the premises. This includes wired and wireless networking technologies.

  • use the service as an Internet service provider, whether or not for profit.


Hosting and Servers on Residential accounts:

Residential accounts are provided for the use of internet services on computers and networked devices at the premises where the internet service is installed.

The Residential service cannot be used to:


  • use dedicated, stand-alone equipment or servers from the Premises that provide content or services to anyone outside of the Premises.

  • use programs from the Premises that provide content or services to anyone outside of your premises.

  • use of encryption technologies to mask the presence of servers or server software.

  • use of the service for any business enterprise or purpose, whether or not for profit.


Responsibility for equipment:

The customer's premise equipment, hereafter referred to as CPE (sometimes referred to as a modem) is provided by Inc. for use by the customer for the purposes of enjoying the Service. A fee is paid each month that the account is active for the rental of the CPE. The CPE remains the property of Inc. Internet. Inc. will replace the CPE in the event that it is defective in the normal use of the Internet service. Improper use or handling of the CPE, or in the event that the CPE is lost or stolen additional charges for replacement including but not limited to equipment costs and labor costs will be the responsibility of the customer.


Access to the configuration interfaces, including web based and command-line configuration is prohibited except when performed by a Inc. agent or employee. Any other entity that accesses the configuration of the CPE may require that the CPE be reprovisioned by a Inc. employee at the customer's expense.

bottom of page