Acceptable Use Policy
Any use of Spot On Networks, LLC ("SON") broadband services to include wireless Internet access and voice over IP, (“Services”) by you (sometimes herein referred to as “Subscriber”) is subject to this Acceptable Use Policy (“AUP”). In addition to, and not in lieu of, this AUP, you are subject to the terms, conditions and provisions of the applicable Service Level Agreement between SON and Subscriber (as amended and renewed from time to time, the “Service Level Agreement”), the Wireless Internet Policy (as amended and renewed from time to time, the “Wireless Internet Policy”), and the Terms and Conditions of the Services (as amended and in effect from time to time, the “Terms and Conditions”) located at http://www.spotonnetworks.com. SON may cooperate with legal authorities and/or third parties in the investigation of any suspected or alleged crime or civil wrongdoing by you in connection with the Services. SON reserves the right to suspend or terminate an account for any actual or threatened violation of this AUP, the Terms and Conditions, the Wireless Internet Policy and/or the Service Level Agreement, or take other action as deemed appropriate by SON in its sole discretion. SON assumes and expects you to have a basic knowledge of how the Internet functions, the types of uses that are generally acceptable, and the types of uses that must be avoided.
The following constitute violations of this AUP:
- Illegal use. Using the Services to transmit any material by any manner that violates any applicable law, or any rules or regulations promulgated thereunder, or any treaty or tariff (including transmitting obscene materials, intentionally spreading computer viruses, gaining unauthorized access to private networks, engaging in the transmission of pirated software, conducting or participating in illegal gambling, and soliciting for illegal pyramid schemes through email or USENET postings.
- Tortious conduct. Using the Services: (a) to violate rules, regulations and policies applicable to any networks, server, computer database, website or ISP to which you gain access through the Services; (b) in any manner that is defamatory, fraudulent, indecent, offensive or deceptive; (c) to damage the name or reputation of SON, its affiliates or its subsidiaries; or (d) to create or attempt to utilize a domain name that is defamatory, fraudulent, indecent, offensive, deceptive, threatening, abusive, harassing, or which damages the name or reputation of SON, its affiliates or its subsidiaries.
- Network disruptions; Harmful activities. Using the Services for any activity (whether illegal or not) which adversely affects the ability of other people or systems to use SON Services or the Internet as determined by SON in its sole discretion, or using the Services for any activity (whether illegal or not) which SON determines in its sole discretion to be harmful to its subscribers, operations, reputation, goodwill or customer relations. This includes "denial of service" (DoS) attacks against another network host or individual user, running programs designed to defeat network inactivity timeouts, maintaining an open SMTP relay. You may not operate a file-sharing system (such as BitTorrent, GNUtella, Limewire or similar applications) on the Spot On wireless system. You also may not operate any kind of a server (web, file, chat, etc.) on our wireless network system. Any such software on your computer must be disabled before joining the network. Users found to be in violation of this policy will be suspended and possibly terminated from the Spot On wireless Network. Interference with or disruption of other network users, network services or network equipment is prohibited. It is the Subscriber's responsibility to ensure that their computer is configured in a secure manner. A Subscriber may not, through action or inaction, allow others to use their computer for illegal or inappropriate actions.
- Facilitating violation. Advertising, transmitting, or otherwise making available any software, program, product or service that is designed to violate or facilitate a violation of this AUP, the Service Level Agreement, the Wireless Internet Policy or the Terms and Conditions (including spamming, initiation of pinging, flooding, mail bombing, denial of service attacks and piracy of software).
- Unsolicited bulk or commercial email. Using the Services to: (a) transmit or facilitate the transmission of any unsolicited commercial or bulk email; (b) “mail bomb” (sending mass unsolicited mail or deliberately sending very large attachments to one recipient); (c) “spamming” or sending large numbers of unsolicited commercial email messages or unsolicited bulk email to advertise, offer, sell or buy any goods or services, for any business or individual; or (d) sending the same or substantially similar unsolicited email messages, whether commercial or not, to fifty (50) or more recipients. SON has the discretion to determine, whether the intended recipients were from an “opt-in” email listing of the sender. If these provisions are violated, you may be required, as determined by SON in SON’s sole discretion, to pay SON $50 per day of unintended violations and $500 per day for deliberate violations.
- Email Attachments. Using the Services to send unreasonably large email attachments.
- Harm to minors. Using the Services to harm, or attempt to harm, minors in any way.
- Threats. Using the Services to transmit any material by any manner that threatens or encourages bodily harm or destruction of property.
- Harassment. Using the Services to transmit any material (by email, uploading, posting, or otherwise) that harasses another.
- Forgery or impersonation. Adding, removing or modifying identifying network header information in an effort to deceive or mislead is prohibited. Attempting to impersonate any person by using forged headers or other identifying information is prohibited. The use of anonymous emailers or nicknames does not constitute impersonation.
- Unauthorized access. Using the Services to access, or to attempt to access, the accounts of others, or to penetrate, or attempt to penetrate, security measures of SON’s or another entity's computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in the corruption or loss of data.
- Intellectual property right infringement. Using the Services to transmit, publish, submit, copy, reproduce, steal, infringe on or distribute any information, software or other material (by email, uploading, posting, or otherwise) that is protected by copyright, trademark, patent, trade secret, or other proprietary or intellectual property rights of any third party, including, but not limited to, the unauthorized copying of copyrighted material, the digitization and distribution of photographs from magazines, books, or other copyrighted sources, and the unauthorized transmittal of copyrighted software, unless you own or control the rights thereto or have received all necessary consents to do the same.
- Collection of personal data. Using the Services to collect, or attempt to collect, personal information about third parties without their knowledge or consent.
- Reselling the services. Reselling the Services without SON's written authorization.
- Export control. Using the Services to export encryption software over the Internet or otherwise to points outside the United States.
SON reserves the right to revise, amend, or modify this AUP at any time.
SON will not, as an ordinary practice, proactively monitor the activities of those who use the Services to ensure compliance with this AUP and/or the law. However, SON may from time to time perform routine surveillance of its network in connection with the maintenance of the Services during which SON may discover violations of this AUP, and SON may act upon information obtained during such surveillance.
If SON is alerted to violations or potential violations of this AUP, SON will take whatever measures that it deems necessary to stop or prevent those violations, including the actions described in this AUP, the Terms and Conditions, the Wireless Internet Policy and the Service Level Agreement. You must make information publicly available about how to contact you, and you must respond in a timely manner to complaints concerning misuse of the Services.
FAILURE TO OBSERVE THE GUIDELINES SET FORTH IN THIS AUP, THE SERVICE LEVEL AGREEMENT, THE WIRELESS INTERNET POLICY AND/OR THE TERMS AND CONDITIONS CAN RESULT IN ANYTHING FROM A WARNING TO A SUSPENSION OF PRIVILEGES OR TERMINATION OF YOUR SERVICES. Decisions of SON are final in connection with any such violations. SON may refer potential violations of laws to proper authorities. SON assumes no obligation to inform a user of its Services that such user’s information has been provided and, in some cases, may be prohibited by law from giving such notice.
Any party seeking to report a violation of this AUP may contact SON at email@example.com.
Any party seeking to send SON a Notification of Claimed Infringement pursuant to the Digital Millennium Copyright Act of 1998 must send such notification to SON's designated Copyright Agent at firstname.lastname@example.org.