Acceptable Use Policy

ACCEPTABLE USE POLICY 

MSFN supports the free flow of information and ideas over the Internet and does not actively monitor use of the Services under normal circumstances. Similarly, MSFN does not exercise editorial control over the content of any website, electronic mail transmission, news group, or other material created or accessible over or through the Services, except for certain propriety websites. However, MSFN may, in its discretion, remove any materials that may be illegal or may subject MSFN to liability. MSFN may cooperate with legal authorities and/or third parties in the investigation of any suspected or alleged crime or civil wrong. Violations of this policy include the following: 

A. Illegal Use. Using the Services to transmit any material (by email, uploading, posting or otherwise) that, intentionally or unintentionally, violates any applicable local, state, national or international law, or any rules or regulations promulgated thereunder. 

B. Harm to Minors. Using the Services to harm, or attempt to harm, minors in any way. 

C. Threats. Using the Services to transmit any material (by email, uploading, posting or otherwise) that threatens or encourages bodily harm or destruction of property. 

D. Harassment. Using the Services to transmit any material (by email, uploading, posting or otherwise) that harasses another. 

E. Fraudulent Activity. Using the Services to make fraudulent offers to sell or buy products, items or services, or to advance any type of financial scam such as “pyramid schemes,” “Ponzi schemes” and “chain letters.” 

F. Forgery or Impersonation. Adding, removing or modifying identifying network header information in an effort to deceive or mislead is prohibited. Attempting to impersonate any person by using forged headers or other identifying information is prohibited. The use of anonymous remailers or nicknames does not constitute impersonation. Using deliberately misleading headers (“munging” headers) in news postings in order to avoid spam email address collectors is allowed. 

G. Unsolicited Commercial Email/Unsolicited Bulk Email. Activities that have the effect of facilitating unsolicited commercial email or unsolicited bulk email, whether or not that email is commercial in nature, are prohibited. 

H. Unauthorized Access. Using the Services to access or to attempt to access the accounts of others, or to penetrate, or attempt to penetrate, security measures of Mainstream Fiber Networks or another entity’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in corruption or loss of data. 

I. Copyright or Trademark Infringement. Using the Services to transmit any material (by email, uploading, posting or otherwise) that infringes any copyright, trademark, patent, trade secret or other proprietary rights of any third party, including, but not limited to, the unauthorized copying of copyrighted material, the digitization and distribution of photographs from magazines, books or other copyrighted sources, and the unauthorized transmittal of copyrighted software. 

J. Collection of Personal Data. Using the Services to collect, or attempt to collect, personal information about third parties without their knowledge or consent. 

K. Reselling the Services. Reselling the Services without MSFN’s authorization. 

L. Network Disruptions and Unfriendly Activity. Using the Services for any activity which adversely affects the ability of other people or systems to use MSFN services or the Internet. This includes “denial of service” (DoS) attacks against another network host or individual user. Interference with or disruption of other network users, network services or network equipment is prohibited. It is the Subscriber’s responsibility to ensure that their network is configured in a secure manner. A Subscriber may not, through action or inaction, allow others to use their network for illegal or inappropriate actions. A subscriber may not permit their network, through action or inaction, to be configured in such a way that gives a third party the capability to use their network in an illegal or inappropriate manner. 

M. MSFN may modify end-user connection, including but not limited to “limiting, throttling or shaping to provide fair usage to all of its Subscribers.