|
(xiv) participate in the collection of e-mail addresses, screen names, or other identifiers of
<br /> others (without their prior consent), a practice sometimes known as spidering or
<br /> harvesting, or participate in the use of software (including "spyware") designed to
<br /> facilitate this activity;
<br /> (xv) collect responses from unsolicited messages;
<br /> (xvi) impersonate any person or entity, engage in sender address falsification, forge anyone
<br /> else's digital or manual signature, or perform any other similar fraudulent activity;
<br /> (xvii) service, alter, modify, or tamper with the Ziply Equipment or Service or permit any other
<br /> person to do the same who is not authorized by us;
<br /> (xviii) connect any Ziply Equipment to any computer outside of your premises;
<br /> (xix) collect, or attempt to collect, personal information about third parties without their
<br /> consent;
<br /> (xx) interfere with computer networking or telecommunications service to any user, host or
<br /> network, including, without limitation, denial of service attacks, flooding of a network,
<br /> overloading a service, improper seizing and abuse of operator privileges and attempts to
<br /> "crash" a host; and/or
<br /> (xxi) violate the rules, regulations, or policies applicable to any network, server, computer
<br /> database, or Web site that you access.
<br /> 3. Security: As a Service customer, it is your responsibility to secure your computer and network
<br /> equipment so that it is not subject to external threats such as viruses, spam, and other methods of
<br /> intrusion. In all cases, you are solely responsible for the security of any device you choose to connect
<br /> to the Service, including any data stored or shared on that device. You are responsible for any misuse
<br /> of the Service, even if the misuse was committed without your authorization. Therefore, you must take
<br /> steps to ensure that others do not use your computer or network to gain unauthorized access to the
<br /> Service or to use the Service in an unauthorized manner.
<br /> 4. Inappropriate Content and Transmissions: We reserve the right (but assume no obligation),
<br /> to refuse to transmit or post and to remove or block any data, information or materials, in whole or in
<br /> part, that we, in our sole discretion, deem to be offensive, indecent, or otherwise inappropriate, and
<br /> regardless of whether this material or its dissemination is unlawful. Neither we nor any of our affiliates,
<br /> suppliers, or agents have any obligation to monitor transmissions or postings (including, but not limited
<br /> to, file transfers, web searches, e-mail sent or received, visits or postings to social media sites, instant
<br /> message transmissions, etc.) made using the Service. However, we and our affiliates, suppliers, and
<br /> agents have the right to monitor these transmissions and postings from time to time for violations of this
<br /> Policy and to disclose, block, or remove them in accordance with this Policy and any other applicable
<br /> subscriber agreements or service orders.
<br /> 5. Online Communication: Forging, altering, or removing electronic mail headers is prohibited.
<br /> You may not reference Ziply Fiber or the Ziply Fiber network in the header or by listing an IP address
<br /> that belongs to us or our network in any unsolicited communication even if that communication is not
<br /> sent through the Service. In the event that we believe in its sole discretion that any subscriber name,
<br /> account name, or e-mail address (collectively, an "identifier") using the Service may or is being used
<br /> for, any misleading, fraudulent, or other improper or illegal purpose, we (i) reserve the right to block
<br /> access to and prevent the use of any such identifier, and (ii) may at any time require any customer to
<br /> Ziply Fiber-Internet Service pg. 3
<br /> Acceptable Use Policy 04/01/2020
<br /> Doc ID:4c7fa30090d0b8eec147356e4ccf97f69e7db4d9
<br />
|