Acceptable Use Policy (AUP) for Westcom Broadband High-Speed Internet Access
What is this document?
This is the Westcom Broadband (“Westcom”) Acceptable Use Policy (AUP), which is part of your Customer Service, Terms of Service Agreement. It incorporates by reference the Terms of Service agreement. By ordering an account from Westcom or by connecting to the Internet over the Westcom network, you accept this policy and agree to follow the rules explained in it. This document is just as binding as the Terms of Service Agreement.
We may revise this policy from time to time. Changes are in force as soon as the revised document is published. "Published" means uploaded to aup.html
You are responsible for keeping up with the provisions of the AUP. However, there is nothing peculiar or tricky in this document, nor will there be in future. Courteous, law-abiding behavior almost always falls within the limits of the AUP.
What is an AUP?
Every reputable Internet provider has an Acceptable Use Policy, or AUP. Its purpose is to describe what kinds of behavior are acceptable while you are using the ISP's services--or rather, to describe what kinds of behavior are not acceptable, why this is so, and what will happen if you engage in them in violation of the AUP.
Some of the rules are based on the law, and some on the Internet conventions that have developed in the last two or three decades. These conventions are not arbitrary. Internet users created them by discovering, by trial and error, what works and what doesn't.
The Internet only works if the people using it cooperate to use the Internet sensibly.
What happens if you violate the AUP?
If you do something illegal or otherwise in violation of the guidelines given here, we will take action.
- If you do something blatantly illegal or directly harmful to life or property, we may immediately suspend or close your account and shut down your access to the Internet. Especially: If you use your Westcom account or Westcom access to send unsolicited bulk messages, we will close your account.
- We are required by law to report some kinds of behavior to law enforcement, including (but not limited to) child abuse and child pornography of any kind, terrorism, and certain kinds of threats.
- If you do something less directly harmful, we will send you a warning.
- If you continue to violate the AUP, we will close your account. You have the right to disagree with us, but the decision is Westcom's alone.
- If someone else uses your account to do something which violates the AUP, you are still responsible and may have your account suspended or closed. If this is done without your knowledge, you are still responsible. If you can convince us that you will control access to your account more closely in future, we may reinstate your account without prejudice.
In any event, whether your account is suspended or closed, Westcom does not owe you credit and you are still responsible for the balance of your Agreement. If you lose access because of your own or your users' behavior, you will not get a refund. Outstanding charges still apply.
Westcom offers you access to the Internet. However, the Internet is not owned, operated, managed by, or in any way affiliated with Westcom. The Internet is a separate network of computers independent of Westcom. Your use of the Internet is solely at your own risk and is subject to all applicable local, state, federal, and international laws and regulations. Your access to the Internet is dependent on numerous factors, technologies, and systems, most of which are beyond Westcom's authority and control.
Unless otherwise noted in your Terms of Service Agreement, your Westcom account does not have a specific throughput limit (e.g. MBs of data transfer per month). Regardless, you are strictly prohibited from certain activities, especially those that may overload the Westcom network, unless pre-approved by Westcom in writing. These activities include, but are not limited to:
- Hosting a website
- Opening up or sharing your PC on the Internet as a server so that others on the Internet may access it
- Continuously downloading large files (movies, songs, etc.) or streaming data, such as video
- Using your account for commercial purposes or home-based businesses
- Numerous or continuous bulk transfers of files and other high capacity traffic using (i) file transfer protocol (“FTP”), (ii) peer-to-peer applications, and (iii) newsgroups
- Any other activities that consume large amounts of bandwidth on the Westcom network
If Westcom determines you breaking the terms of this AUP, you will be subject to additional fees for usage and your account may be suspended or terminated.
Security I: Your Responsibilities
You are responsible for maintaining security and limiting access to your Westcom account.
- Do not allow non-household members or non-business employees to access the Internet through your Westcom account.
- If you use a wireless router, Westcom requires you turn on wireless security to prevent others from accessing your Westcom account. Read your router User Guide for details or visit faq-technical.html for help on how to do this.
- Do not share your email account or password.
- Do not post them in public or private forums.
- Do not send them by email. Email is not secure.
- Westcom requires you protect your PC and network from viruses, spyware, malware, hackers and other harm. Therefore, Westcom requires you install and run (real-time) an internet security suite to protect yourself and the Westcom network. Visit protect.html for help on securing your PC and network.
Other members of your household or employees of your business may access the Internet using your Westcom account per your Terms of Service Agreement. Usage must be limited to family members or permanent residents of your home or business employees at the physical address for which the Westcom Agreement exists and is current.
Giving someone outside your household or business access to the Internet (either wired or wireless via a router) through your Westcom account is called "account sharing" and is strictly prohibited.
You must not allow anyone outside your premises to connect to your home network via wires or wireless technology in order to use your Westcom service. If you do this, we will close your account and charge you usage fees for all unauthorized users. Therefore, if you use a wireless router inside your home or business, it is incumbent upon you to secure the router so others outside your building may not access the Internet through your Westcom account.
You may not share or resell any part of your Westcom service or account or access to the internet.
Security II: Your Rights
Westcom will keep your account information confidential. This includes: Your contact information, your credit card number and expiration date, your login name and password, and your mother's maiden name or other "secret" secondary identification phrase.
Westcom will maintain normal security for your data, such as email. No electronic storage or transmission is 100% secure. You transmit or store data on Westcom equipment at your own risk. Although we maintain our systems with updated security features, we cannot guarantee perfect immunity from "hacking".
If presented with a court order or lawful process including a subpoena by a legitimate law-enforcement organization such as the police, the FBI, or the Secret Service, Westcom will release your private data. If we receive a subpoena in a civil matter, we will comply with the subpoena, but will notify you of its service upon us. In no other circumstance will we reveal your private information.
Westcom will not release your payment or login history unless required by court order.
Your Personal Files
Although we back up our systems regularly, we are not liable for loss of material that you have uploaded to your space on our servers. You must maintain your own backups.
When an account closes, all its data on the servers disappears, including email and uploaded files. If we close your account for violations of the AUP, your data will be deleted and cannot be retrieved even if we reopen your account.
Obeying the Law
All applicable laws (federal, state, and local) apply to your behavior on the Internet as well as in person.
For instance, just as it is illegal to make threats against someone in person, it is illegal to make threats via email, chat, or posted messages. An illegal act in electronic form is still an illegal act.
Westcom has no responsibility to control your online behavior. If you (or someone using your account or email) break a law using the Westcom service, Westcom is not responsible or legally liable in any way. You and all other parties hold Westcom harmless in the event you (or someone using your account or email) break a law.
If you are the recipient of illegal or annoying behavior via your Westcom connection (for instance, if someone threatens you by email), Westcom is not responsible. In a case like this, the best thing to do is notify the offending person's Internet service provider. If the situation is grave, notify law enforcement.
You are strictly prohibited from certain activities in connection with your Westcom service, including:
- committing any crime
- breaking any laws
- harassing anyone
- violating anyone's privacy
- attempting to use Westcom as a starting point for an activity that will intentionally hurt or annoy someone
- participating in chain letters
- harassing, threatening, or abusing Westcom staff
- excessive posting or otherwise abusing Usenet
- sending bulk unsolicited emails (spam)
- using Westcom for any spam-related purpose
- making available any software, script, product, or service that will violate this AUP (this includes, but is not limited to, programs for the distribution of spam)
- forging or falsifying any information, including (but not limited to) TCP/IP packet headers or any part of the header information in an email message or Usenet posting
- email "bombing" or flooding
- any attempt to overload Westcom's, or any other, system
- network-unfriendly activity or "hacking" that interferes with normal network operations
- attempts to gain unauthorized access to ("hack into") Westcom's servers, or to access Westcom data, accounts, systems or networks, or to find security holes in a Westcom system, whether these attempts are electronic or otherwise
- any activity which could damage, disable, overload or impair Westcom's services
- sending scripts or data to chat programs to cause rapid scrolling and prevent people from reading the dialog members using bots on IRC
Note: Westcom reserves the right to send announcements and other email to its customers. That is not spam. You agree to receive such email when you order a Westcom account.
"Data" means text, pictures, software, recordings, or any other form of information. In the event of complaints against your data, Westcom alone will determine whether the file or information in question is unacceptable.
Westcom supports the uncensored flow of information and ideas over the Internet. We do not monitor what you are receiving or transmitting in the form of email, web pages, or other data. We do not exercise editorial control over the content of any web site, email message, Usenet posting, or other data created through or accessible via our service. However, we may remove any materials that we believe to be illegal or in some other way violate Westcom's policies, or may subject us to liability.
If you opt to have Westcom host your web site, you are completely responsible for those servers and their content. Make sure you are aware of any laws regarding the material you are providing, including copyright laws.
Do not upload, email, post or otherwise distribute data which is:
- unlawful or illegal under the laws of your area
- invasive of another's privacy
- tortious (a tort is an offense prohibited by civil, not criminal, law)
- intended to victimize, harass, degrade, or intimidate a person or group on the basis of religion, gender, sexual orientation, race, ethnicity, age, disability, or any other reason
- intended for use in distributing unsolicited bulk mail, "hacking," or other proscribed activities.
More Unacceptable Activities
If you shouldn't do it in "real life," you shouldn't do it on the Internet. Do not do any of these things using the Westcom service:
- false advertising
- unsolicited advertising
- copyright violations
- use of trademark or service mark to which you have no rights
- trade secret violations
- any intentional disruption of communication.
You may not use Westcom to work around some other ISP's rules or to abuse another service.
You may not use any part of the Westcom service to support an activity done elsewhere which violates this AUP. For instance, you can't link to a web site hosted at Westcom in unsolicited bulk email even if you send it from another service.
Appropriate Use of Usenet (Newsgroups, "Groups")
Every newsgroup, and in some cases a whole hierarchy of newsgroups, has its own rules. Look at the last week or so of postings to a group to find out how it works before you post something yourself. You will often find a weekly FAQ (Frequently Asked Questions) posted in a group. Please read it. It is well worth checking news search engines to see if the question you have has been asked before.
Most groups prohibit bulk posting of ads, either individually or cross-posted to multiple groups.
Please note that "get rich quick" schemes are usually illegal. Advertising them through any Westcom service is a violation of the AUP.
Valid Email Return Addresses
You must use a valid email address in the "From" or "Sender" field of email messages. This must be your own email address, either through Westcom or through some other organization. Do not invent a domain name in an email address.
The reason for this, apart from courtesy, is that use of made-up names puts an unnecessary load on the Internet's root name servers. There are only a dozen or so root name servers in the whole world. Normally, for real domains, millions of computers cache (remember) information retrieved from the root name servers, which is why the Internet can manage with so few. When a made-up name is used, the local server must send a query to one of the root name servers. These important machines already have enough to do. All Internet users rely on the root name servers for anything on the Internet that uses names--web pages, email, everything--so it is not sensible to put an unnecessary load on them.
There are many strategies to reduce spam. Some of them work. For more information, visit sites such as http://spam.abuse.net
If you have questions about these policies or your Terms of Service, Customer Service Agreement, call us at 1-866-943-8638 or email us: email@example.com.