This Acceptable Use Policy applies to all persons and entities (collectively, "customers") using the products and services of Supernet Communications Company, ("Supernet") including Internet service. The policy is designed to protect the security, integrity, reliability, and privacy of both the Supernet network and the products and services Supernet offers to its customers. Supernet reserves the right to modify this policy at any time, effective immediately upon posting of the modification. Your use of Supernet's products and services constitutes your acceptance of the Acceptable Use Policy in effect at the time of your use. You are solely responsible for any and all acts and omissions that occur during or relating to your use of the service, and you agree not to engage in any unacceptable use of the service.
**** We believe what you do on the Internet is your business, but please adhere to these rules, as violating them can cause interruptions and sometimes more severe penalties. We are required to forward all DMCA violation notices to our customers. We recommend you do not ignore these as the repercussions can become quite severe for illegal copying of licensed works. We have received several questions about "Kodi"... our stance is that these devices and software programs are most often used for illegal purposes, so we will not offer support of any kind related to it's use, and if we receive a notice of copyright infringement related to it's use we reserve the right to discontinue service for your account.
What Uses are Prohibited? (Most common are highlighted red and underlined)
Unacceptable use includes, but is not limited to, any of the following:
1. Posting, transmission, re-transmission, or storing material on or through any of Supernet's products or services, if in the sole judgment of Supernet such posting, transmission, re-transmission or storage is: (a) in violation of any local, state, federal, or non-United States law or regulation (including rights protected by copyright, trade secret, patent or other intellectual property or similar laws or regulations); (b) threatening or abusive; (c) obscene; (d) indecent; or (e) defamatory. Each customer shall be responsible for determining what laws or regulations are applicable to his or her use of the products and services.
2. Installation or distribution of "pirated" or other software products that are not appropriately licensed for use by customer. Use of BitTorrent client software is prohibited unless used for legal purposes. Supernet reserves the right to limit or stop excessive BitTorrent traffic.
3. Resale or sharing of Supernet products and services without the express prior written consent of Supernet (unless you are an authorized wholesaler).
4. Deceptive marketing practices.
5. Actions that restrict or inhibit anyone - whether a customer of Supernet or otherwise - in his or her use or enjoyment of Supernet's products and services, or that generate excessive network traffic through the use of automated or manual routines that are not related to ordinary personal or business use of Internet services.
6. Introduction of malicious programs into the Supernet network or servers or other products and services of Supernet (e.g., viruses, Trojan horses and worms).
7. Causing or attempting to cause security breaches or disruptions of Internet communications. Examples of security breaches include but are not limited to accessing data of which the customer is not an intended recipient, or logging into a server or account that the customer is not expressly authorized to access. Examples of disruptions include but are not limited to port scans, flood pings, packet spoofing and forged routing information.
8. Executing any form of network monitoring that will intercept data not intended for the customer.
9. Circumventing user authentication or security of any host, network or account.
10. Interfering with or denying service to any user other than the customer's host (e.g., denial of service attack).
11. Using any program/script/command, or sending messages of any kind, designed to interfere with, or to disable a user's session.
12. Failing to comply with Supernet's procedures relating to the activities of customers on Supernet owned facilities.
13. Furnishing false or incorrect data on the order form contract (electronic or paper) including fraudulent use of credit card numbers or attempting to circumvent or alter the processes or procedures to measure time, bandwidth utilization or other methods to document "use" of Supernet's products or services.
14. Sending unsolicited mail messages, including the sending of "junk mail" or other advertising material to individuals who did not specifically request such material, who were not previous customers of the customer or with whom the customer does not have an existing business relationship (e.g., E-mail "spam"); or distributing, advertising or promoting software or services that have the primary purpose of encouraging or facilitating unsolicited commercial E-mail or spam.
15. Harassment, whether through language, frequency, or size of messages.
16. Unauthorized use or forging of mail header information.
17. Solicitations of mail or any other E-mail address other than that of the poster's account or service, with the intent to harass or collect replies.
18. Creating or forwarding "chain letters" or other "pyramid schemes" of any type.
19. Use of unsolicited E-mail originating from within the Supernet network or networks of other Internet Service Providers on behalf of or to advertise any service hosted by Supernet or connected via the Supernet network.
20. Exporting, re-exporting, or permitting downloads of any content in violation of the export or import laws of the United States or without all required approvals, licenses and exemptions.
21. Users must have routers secured with WPA/WPA2 encryption. You May Not Share Your WPA/WPA2 Key With Anyone outside of your immediate household.
22. Long Connections. Using a personal account for high volume or commercial use is prohibited. The Services are intended for periodic, active use of email, newsgroups, file transfers, Internet chat, games, and browsing the World Wide Web. Members may stay connected so long as they are actively using that connection for the above purposes.
23, Services are offered on a Month to Month basis unless there is a specific signed agreement to offer services on a non month to month basis. Refunds or credits will not be issued for cancellations during a current billed cycle, or pre-paid time period.
No failure or delay in exercising or enforcing this policy shall constitute a waiver of the policy or of any other right or remedy. If any provision of this policy is deemed unenforceable due to law or change in law, such a provision shall be disregarded and the balance of the policy shall remain in effect.
Abusable Resources
Upon notification of the existence of an abused resource (e.g., open news server, unsecured mail relay, or smurf amplifier, Torrents of copyrighted works not owned by the subscriber), the customer shall immediately take all necessary steps to avoid any further abuse of such resource. Any abuse of an open resource that occurs after the customer has received such notification shall be considered a violation of this policy and enforced as such.
Enforcement
Supernet may immediately suspend and/or terminate the customer's service for violation of any provision of this policy upon verbal or written notice, which notice may be provided by voicemail or E-mail. Prior to suspension or termination, Supernet attempts to work with our customers to cure violations of this policy and ensure that there is no re-occurrence; however, Supernet reserves the right to suspend or terminate based on a first offense
Equipment Repairs Policy
It is the end users responsibility to report any damage to equipment used to obtain service from Supernet. Equipment that has been damaged by acts of God must be repaired at the end users expense. Equipment which is not owned by Supernet will not be covered, including but not limited to routers, VoIP boxes, wireless cards, computers, laptops, cellular phones, tablets, set-top boxes. Most equipment failures can be diagnosed from our office. Should it be necessary for a technician to come out to the users residence for additional repairs up to a $90.00 service charge will be billed for the visit. If Supernet decides to change radios in a given area to upgrade their service the end user will not incur any equipment expense due to an upgrade unless said user opts to an upgrade that may increase speed or features.
Electronic Communications Privacy Act Notice
Supernet makes no guarantee of confidentiality or privacy of any information transmitted through or stored upon Supernet technology, and makes no guarantee that any other entity or group of users will be included or excluded from Supernet's network. In addition, Supernet may periodically monitor transmissions over its network for maintenance, service quality assurance or any other purpose permitted by the Electronic Communications Privacy Act, P.L. No. 99-508, as amended.
Questions?
If you are unsure of whether any contemplated use or action is permitted, please contact Supernet at [email protected] or call (269) 591-8798.
**** We believe what you do on the Internet is your business, but please adhere to these rules, as violating them can cause interruptions and sometimes more severe penalties. We are required to forward all DMCA violation notices to our customers. We recommend you do not ignore these as the repercussions can become quite severe for illegal copying of licensed works. We have received several questions about "Kodi"... our stance is that these devices and software programs are most often used for illegal purposes, so we will not offer support of any kind related to it's use, and if we receive a notice of copyright infringement related to it's use we reserve the right to discontinue service for your account.
What Uses are Prohibited? (Most common are highlighted red and underlined)
Unacceptable use includes, but is not limited to, any of the following:
1. Posting, transmission, re-transmission, or storing material on or through any of Supernet's products or services, if in the sole judgment of Supernet such posting, transmission, re-transmission or storage is: (a) in violation of any local, state, federal, or non-United States law or regulation (including rights protected by copyright, trade secret, patent or other intellectual property or similar laws or regulations); (b) threatening or abusive; (c) obscene; (d) indecent; or (e) defamatory. Each customer shall be responsible for determining what laws or regulations are applicable to his or her use of the products and services.
2. Installation or distribution of "pirated" or other software products that are not appropriately licensed for use by customer. Use of BitTorrent client software is prohibited unless used for legal purposes. Supernet reserves the right to limit or stop excessive BitTorrent traffic.
3. Resale or sharing of Supernet products and services without the express prior written consent of Supernet (unless you are an authorized wholesaler).
4. Deceptive marketing practices.
5. Actions that restrict or inhibit anyone - whether a customer of Supernet or otherwise - in his or her use or enjoyment of Supernet's products and services, or that generate excessive network traffic through the use of automated or manual routines that are not related to ordinary personal or business use of Internet services.
6. Introduction of malicious programs into the Supernet network or servers or other products and services of Supernet (e.g., viruses, Trojan horses and worms).
7. Causing or attempting to cause security breaches or disruptions of Internet communications. Examples of security breaches include but are not limited to accessing data of which the customer is not an intended recipient, or logging into a server or account that the customer is not expressly authorized to access. Examples of disruptions include but are not limited to port scans, flood pings, packet spoofing and forged routing information.
8. Executing any form of network monitoring that will intercept data not intended for the customer.
9. Circumventing user authentication or security of any host, network or account.
10. Interfering with or denying service to any user other than the customer's host (e.g., denial of service attack).
11. Using any program/script/command, or sending messages of any kind, designed to interfere with, or to disable a user's session.
12. Failing to comply with Supernet's procedures relating to the activities of customers on Supernet owned facilities.
13. Furnishing false or incorrect data on the order form contract (electronic or paper) including fraudulent use of credit card numbers or attempting to circumvent or alter the processes or procedures to measure time, bandwidth utilization or other methods to document "use" of Supernet's products or services.
14. Sending unsolicited mail messages, including the sending of "junk mail" or other advertising material to individuals who did not specifically request such material, who were not previous customers of the customer or with whom the customer does not have an existing business relationship (e.g., E-mail "spam"); or distributing, advertising or promoting software or services that have the primary purpose of encouraging or facilitating unsolicited commercial E-mail or spam.
15. Harassment, whether through language, frequency, or size of messages.
16. Unauthorized use or forging of mail header information.
17. Solicitations of mail or any other E-mail address other than that of the poster's account or service, with the intent to harass or collect replies.
18. Creating or forwarding "chain letters" or other "pyramid schemes" of any type.
19. Use of unsolicited E-mail originating from within the Supernet network or networks of other Internet Service Providers on behalf of or to advertise any service hosted by Supernet or connected via the Supernet network.
20. Exporting, re-exporting, or permitting downloads of any content in violation of the export or import laws of the United States or without all required approvals, licenses and exemptions.
21. Users must have routers secured with WPA/WPA2 encryption. You May Not Share Your WPA/WPA2 Key With Anyone outside of your immediate household.
22. Long Connections. Using a personal account for high volume or commercial use is prohibited. The Services are intended for periodic, active use of email, newsgroups, file transfers, Internet chat, games, and browsing the World Wide Web. Members may stay connected so long as they are actively using that connection for the above purposes.
23, Services are offered on a Month to Month basis unless there is a specific signed agreement to offer services on a non month to month basis. Refunds or credits will not be issued for cancellations during a current billed cycle, or pre-paid time period.
No failure or delay in exercising or enforcing this policy shall constitute a waiver of the policy or of any other right or remedy. If any provision of this policy is deemed unenforceable due to law or change in law, such a provision shall be disregarded and the balance of the policy shall remain in effect.
Abusable Resources
Upon notification of the existence of an abused resource (e.g., open news server, unsecured mail relay, or smurf amplifier, Torrents of copyrighted works not owned by the subscriber), the customer shall immediately take all necessary steps to avoid any further abuse of such resource. Any abuse of an open resource that occurs after the customer has received such notification shall be considered a violation of this policy and enforced as such.
Enforcement
Supernet may immediately suspend and/or terminate the customer's service for violation of any provision of this policy upon verbal or written notice, which notice may be provided by voicemail or E-mail. Prior to suspension or termination, Supernet attempts to work with our customers to cure violations of this policy and ensure that there is no re-occurrence; however, Supernet reserves the right to suspend or terminate based on a first offense
Equipment Repairs Policy
It is the end users responsibility to report any damage to equipment used to obtain service from Supernet. Equipment that has been damaged by acts of God must be repaired at the end users expense. Equipment which is not owned by Supernet will not be covered, including but not limited to routers, VoIP boxes, wireless cards, computers, laptops, cellular phones, tablets, set-top boxes. Most equipment failures can be diagnosed from our office. Should it be necessary for a technician to come out to the users residence for additional repairs up to a $90.00 service charge will be billed for the visit. If Supernet decides to change radios in a given area to upgrade their service the end user will not incur any equipment expense due to an upgrade unless said user opts to an upgrade that may increase speed or features.
Electronic Communications Privacy Act Notice
Supernet makes no guarantee of confidentiality or privacy of any information transmitted through or stored upon Supernet technology, and makes no guarantee that any other entity or group of users will be included or excluded from Supernet's network. In addition, Supernet may periodically monitor transmissions over its network for maintenance, service quality assurance or any other purpose permitted by the Electronic Communications Privacy Act, P.L. No. 99-508, as amended.
Questions?
If you are unsure of whether any contemplated use or action is permitted, please contact Supernet at [email protected] or call (269) 591-8798.