Beyond Wireless Acceptable Use Policy
Effective November 30, 2015
NOTE: This document outlines additional policies governing your use of any Device or Service provided by Beyond Wireless. The document will be updated from time to time and posted at www.BeyondWireless.org. You should review these provisions from time to time to stay abreast of acceptable use.
The following terms apply to your use of any Device or any Service and access to any Beyond Wireless website or internet-based portal or platform (“Website”) together with its subsidiaries, affiliates, agents, and licensors (collectively "Beyond Wireless "), as well as any electronic transmission sent, received, posted, accessed, or stored via any network ("Network").
Infringement: Infringement of intellectual property rights or other proprietary rights including, without limitation, material protected by copyright, trademark, patent, trade secret, or other intellectual property right. Infringement may result from the unauthorized copying, distribution, and/or posting of pictures, logos, software, articles, musical works, and videos.
Offensive Materials: Disseminating or posting material that is unlawful, libelous, defamatory, obscene, indecent, lewd, harassing, threatening, harmful, invasive of privacy or publicity rights, abusive, inflammatory, or otherwise objectionable. Without limiting the foregoing, you may not access or use our Website or Network in any manner for the transmission or dissemination of images containing child pornography.
Excessive Utilization of Network Resources: Consuming a disproportionate amount of available Network resources resulting in the potential to disrupt or degrade the Network or Network usage by others. The determination of what constitutes excessive use depends on the specific state of the Network at any given time. Excessive use is determined by resource consumption relative to that of a typical individual user of the Network and not by the use of any particular application. Without limiting the foregoing, you are not allowed to use the Network to continually or repeatedly dial telephone numbers associated with free conference calls, free chat lines, or similar or related services that are used to increase the inter-carrier compensation billed to Beyond Wireless.
The Service you are receiving may include the ability to send and receive electronic mail and/or text messages or other files (including photo or video files). Use of your Device or Service to send unsolicited commercial messages is prohibited. Mass electronic messages or "mail-bombing" (sending mass unsolicited mail or deliberately sending very large attachments to one recipient) are prohibited. Forging electronic mail headers (addresses) is also prohibited regardless of commercial content. Use of electronic mail to harass or intimidate other users is prohibited.
Spamming, sending large numbers of unsolicited commercial email messages or unsolicited bulk email to advertise, offer, sell, or buy any goods or services, for any business or individual, is strictly prohibited.
You are also prohibited from sending the same or substantially similar unsolicited email message or text, whether commercial or not, to fifty (50) or more recipients. If this provision is violated, you may be required, as determined by Beyond Wireless in its sole discretion, to pay $50 per day for unintended violations and $500 per day for deliberate violations.
In the interest of maintaining network performance, you should not send unreasonably large electronic mail attachments. You are prohibited from running programs designed to defeat network inactivity time-outs and maintaining an open SMTP relay is prohibited.
Export Violations: Violations of export laws, regulations, and rules, including, without limitation, violations of the Export Administration Act and the Export Administration Regulations administered by the Department of Commerce.
Fraudulent Conduct: (1) Conducting fraudulent business operations and practices; (2) offering or disseminating fraudulent goods, services, schemes, or promotions (e.g., make-money-fast schemes, chain letters, and pyramid schemes); and (3) individual or business representation as an authorized 3rd party affiliation or agent for a business entity (e.g., Beyond Wireless) without the business' prior consent.
Falsification/Impersonation: Using the Network to impersonate any person or entity; falsely state or otherwise misrepresent your affiliation with any person or entity; or create a false identity for the purpose of misleading others. Without limiting the foregoing, you may not use invalid or forged headers, invalid or non-existent domain names, or other means of deceptive addressing.
Failure to Abide by Third-Party Network or Website Policies: Violating the rules, regulations, or policies that apply to any third-party network, server, computer database, or website that you access.
Harmful Content: Disseminating or posting content that is harmful to the Network or other users of the Network including, without limitation, viruses, Trojan horses, worms, time bombs, zombies, cancelbots, or any other computer programming routines that may damage, interfere with, secretly intercept or seize any system, program, data, or personal information.
You may not distribute, publish, or send through our Network: (1) any spam, including any unsolicited advertisements, solicitations, commercial e-mail messages, informational announcements, or promotional messages of any kind; (2) chain mail; (3) numerous copies of the same or substantially similar messages; (4) empty messages; (5) messages that contain no substantive content; (6) very large messages or files that disrupt a server, account, newsgroup, or chat service; or (7) any message that is categorized as "phishing."
Likewise, you may not: (1) participate in spidering, harvesting, or any other unauthorized collection of e-mail addresses, screen names, or other identifiers of others or participate in using software (including "spyware") designed to facilitate such activity; (2) collect responses from unsolicited messages; or (3) use any of our mail servers or another site's mail server to relay mail without the express permission of the account holder or the site.
NETWORK SECURITY AND INTEGRITY
You may not violate the security of our Network in any way. Such violations may result in criminal or civil liability. Beyond Wireless may, but is not obligated to, investigate any violation of our Network. Beyond Wireless may cooperate with law enforcement where criminal or unauthorized activity is suspected. By using Beyond Wireless products and services or sending, receiving, posting, accessing, or storing any electronic transmission via our Network, you agree to cooperate in any such investigation. Examples of Network security violations include, without limitation:
Hacking: Unauthorized access to or use of data, systems, or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without the express prior authorization of the owner of the system or network.
Interception: Unauthorized monitoring of data or traffic on any network or system without the express prior authorization of the owner of the system or network.
Intentional Interference: Interference with service to any user, host, or network including, without limitation, denial-of-service attacks, mail bombing, news bombing, other flooding techniques, deliberate attempts to overload a system, and broadcast attacks.
Falsification of Origin or Routing Information: Using, selling, or distributing in conjunction with the Network, any computer program designed to conceal the source or routing information of electronic mail messages in a manner that falsifies an Internet domain, header information, date or time stamp, originating e-mail address, or other identifier.
Avoiding System Restrictions: Using manual or electronic means to avoid any limitations established by Beyond Wireless or attempting to gain unauthorized access to, alter, or destroy any information that relates to any Beyond Wireless customer or other end-user. Beyond Wireless may, but is not obligated to, take any action it deems necessary to (1) protect its Network, its rights, or the rights of its customers or third parties, or (2) optimize or improve its Network, services, systems, and equipment. You acknowledge that such action may include, without limitation, employing methods, technologies, or procedures to filter or block messages sent through the Network. Beyond Wireless may, in its sole discretion and at any time, filter "spam" or prevent "hacking," "viruses," or other potential harms without regard to any preference you may have communicated to us.
Newsgroups and Chat Rooms Abuse
The Service you have purchased may give you access to news groups, third-party chat rooms or other internet-based communication platforms, and in the future Beyond Wireless may itself offer such a program for your use.
As a user of our Service, you are solely responsible for the content that you publish. Upon notification that certain postings violate this policy, the law, or infringe on a Trademark or Copyrights of another, Beyond Wireless may, at its discretion, remove offending posts from its Website. In all events, posting commercial messages is a violation of this policy.
You are also prohibited from abusing chat rooms or other internet-based communication platforms, including our Website.
INVESTIGATION AND ENFORCEMENT OF THE POLICY
We have the right, but are not obligated, to strictly enforce this Policy through self-help, active investigation, litigation, and prosecution.
Beyond Wireless reserves the right to act immediately and without notice to restrict, suspend, or terminate your use of the Network if it reasonably determines that your conduct may: (1) expose Beyond Wireless to sanctions, prosecution, civil action, or other liability; (2) cause harm to or interfere with the integrity or normal operations of Beyond Wireless's Network or networks with which Beyond Wireless is interconnected; (3) interfere with another Beyond Wireless customer's use of the Network; (4) violate any applicable law, rule, or regulation; or (5) otherwise present an imminent risk of harm to Beyond Wireless or its customers.
Beyond Wireless has the right, but not the obligation, to monitor or restrict any uses of the Network that Beyond Wireless reasonably believes in its sole discretion violate this Policy. You are solely responsible for all content that you transmit or receive utilizing the Network, and you are responsible for abuse of your account by others.
We may also access and disclose any information (including transactional information) related to your access and use of our Network for any lawful reason, including but not limited to: (1) responding to emergencies; (2) complying with the law (e.g., a lawful subpoena); (3) protecting our rights or property and those of our customers; or (4) protecting users of those services and other carriers from fraudulent, abusive, or unlawful use of or subscription to such services. INDIRECT OR ATTEMPTED BREACHES OF THIS POLICY AND ACTUAL OR ATTEMPTED BREACHES BY A THIRD PARTY ON BEHALF OF A COMPANY, CUSTOMER, OR USER MAY BE CONSIDERED BREACHES OF THIS POLICY BY SUCH COMPANY, CUSTOMER, OR USER.
Any failure to insist upon or enforce performance of any provision in this Policy will not be construed as a waiver of any provision or right. Neither the course of conduct between the parties nor trade practice will act to modify any provision in this Policy. Beyond Wireless may assign its rights and duties under these terms to any party at any time without notice to you. If any provision of this Policy is deemed unlawful, void, or for any reason unenforceable, then that provision will be deemed severable from these terms and conditions so that it does not affect the validity and enforceability of any remaining provisions.