Internet Complete Business ServicesInternet Complete Residential ServicesInternet Complete Online Sign-up FormInternet Complete Home Page
Providing Internet, Website, & Networking Solutions for Business & Residential Customers.
Links for Internet Complete!, Inc. Account Holders
 ICNET Web Mail Login
 Keytech Web Mail Login
 Technical Support
 Frequently Asked Questions
 Customer Utilities
 Service Request Forms
 Usage Policies
 Anonymous Suggestion Box
 Customer Home Pages
 Business Website Index
 Website Map
 
Company Contact Information
EMAIL CONTACTS: 

     Questions & Comments

          questions@icnet.net

     Technical Support
          support@icnet.net

     Billing Questions
          billing@icnet.net

TELEPHONE NUMBERS:

     Phone:  (405) 858-8637
     Fax:  (405) 858-9529


MAILING ADDRESS:

     Internet Complete!, Inc.
     4509 N Classen Suite 100
     Oklahoma City, OK 73118
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|

Acceptable Use Policy

Internet Complete!, Inc. acceptable use policies (the “AUP”) set forth below define acceptable practices while using any of the Internet Complete!, Inc. services that provide access to the Internet Complete!, Inc. network (the “Service”). By using the Service, you acknowledge that you (“Customer”), representatives, agents, and users have gained access to the Service through Customer's account, have read, understood, and agree to abide by the AUP. Customer is responsible for violations of the AUP by any user. The AUP is not exhaustive, and Internet Complete!, Inc. reserves the right to modify the AUP at any time, effective upon either via e-mail or by posting a revised copy of the AUP on the Internet Complete!, Inc. web site. By registering for and using the Service, and thereby accepting the terms and conditions of the Master Service Agreement or its equivalent, Customer agrees to abide by the AUP as modified. Any violation of the AUP may result in the suspension or termination of Customer's account or such other action as Internet Complete!, Inc. deems appropriate. If Customer violates any AUP resulting in an interruption of the Service for Internet Complete!, Inc. or its customers, Customer may be held liable for damages in addition to the termination of services. An unlisted activity may also be a violation of the AUP if it is illegal, irresponsible, or disruptive use of the Internet. Internet Complete!, Inc. reserves the right at all times to prohibit activities that damage its commercial reputation and goodwill. No credits will be issued for any interruption in service resulting from any violation of the AUP.

VIOLATION OF ANY AUP IS STRICTLY PROHIBITED AND MAY RESULT IN THE IMMEDIATE SUSPENSION OR TERMINATION OF THE SERVICES CUSTOMER RECEIVES FROM INTERNET COMPLETE!, INC. CUSTOMER SHALL REMAIN SOLELY LIABLE AND RESPONSIBLE FOR CUSTOMER'S USE OF THE SERVICES AND ANY AND ALL CONTENT THAT CUSTOMER DISPLAYS, UPLOADS, DOWNLOADS, OR TRANSMITS THROUGH THE USE OF THE SERVICES. "CONTENT" INCLUDES, WITHOUT LIMITATION, CUSTOMER'S E-MAIL, WEB PAGES, PERSONAL HOME PAGES, POSTING, CHATTING, BROWSING, AND DOMAIN NAMES. IT IS THE POLICY OF INTERNET COMPLETE!, INC. TO TERMINATE REPEAT INFRINGERS. INTERNET COMPLETE!, INC. RESERVES THE RIGHT TO REFUSE SERVICE TO ANYONE AT ANYTIME.
  1. Customer Service Responsibilities.
    Customer is solely responsible for any breaches of security affecting servers under Customer's control. If Customer's server is involved in an attack on another server or system, it will be shut down and an immediate investigation will be launched to determine the cause or source of the attack. In such event, Customer is responsible for the cost to rectify any damage done to Customer's server and any other requirement affected by the security breach.

  2. System And Network Security. Violations of system or network security are prohibited and may result in criminal and civil liability. Internet Complete!, Inc. may investigate incidents involving such violations and may involve and will cooperate with law enforcement if a criminal violation is suspected. Examples of system or network security violations include, without limitation, the following:

    1. Unauthorized access to or use of data, systems, or networks, including any attempt to probe, scan, or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network.
    2. Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network.
    3. Interference with service to any user, host, or network including, without limitation, mailbombing, flooding, deliberate attempts to overload a system, and broadcast attacks.
    4. Forging of any TCP-IP packet header or any part of the header information in an e-mail or a newsgroup posting.

    Violators of the policy are responsible, without limitation, for the cost of labor to cleanup and correct any damage done to the operation of the network and business operations supported by the network, and to respond to complaints incurred by Internet Complete!, Inc..

    Because the Internet is an inherently open and insecure means of communication, any data or information that Customer transmits over the Internet may be susceptible to interception and alteration. As a matter of prudence, Internet Complete!, Inc. urges its customers to assume that all of their on-line communications are insecure. Internet Complete!, Inc. cannot take responsibility for the security of information transmitted over Internet Complete!, Inc. facilities.

  3. Password Protection.
    Customer is responsible for protecting Customer's password and for any authorized or unauthorized use made of Customer's password. Customer will not use or permit anyone to use Internet Complete!, Inc. service to guess passwords or to access other systems or networks without authorization. Internet Complete!, Inc. will fully cooperate with law enforcement authorities in the detection and prosecution of illegal activity.

  4. Internet Etiquette.
    Customer is expected to be familiar with and to practice good Internet etiquette (Netiquette). Customer will comply with the rules appropriate to any network to which Internet Complete!, Inc. may provide access. Types of prohibited posts include chain letters, pyramid schemes, encoded binary files, job offers or listings, and personal ads. Customer should not post, transmit, or permit Internet access to information Customer desires to keep confidential. Customer is not permitted to post any material that is illegal, libelous, tortuous, indecently depicts children, or likely to result in retaliation against Internet Complete!, Inc. by offended users.

  5. Copyright Infringement – Software Piracy Policy.
    The Internet Complete!, Inc. network may only be used for lawful purposes. Customer shall use the Service only for lawful purposes, in compliance with all applicable laws. Customer agrees to not facilitate, aid, or encourage any unlawful activity. Transmission, distribution, retrieval, or storage of any information, data, or material in violation of United States or state regulation or law, or by the common law, is prohibited. This includes, but is not limited to, material protected by copyright, trademark, trade secret, or other intellectual property rights.

    Making unauthorized copies of software is a violation of the law. If Customer copies, distributes, or installs the software in ways that the license does not allow, Customer is violating federal copyright law.

    In compliance with the Digital Millennium Copyright Act (“DMCA”), please send DMCA notifications of claimed copyright infringements to: abuse@icnet.net. Internet Complete!, Inc. will cooperate fully with any civil and/or criminal litigation arising from the violation of this policy.

  6. Network Responsibility.
    Customer has the responsibility to use the Internet Complete!, Inc. network responsibly. This includes respecting the other customers of Internet Complete!, Inc.. Internet Complete!, Inc. reserves the right to suspend and/or cancel service with any Customer who uses the Internet Complete!, Inc. network in such a way that adversely affects other Internet Complete!, Inc. customers. This includes but is not limited to:

    1. Attacking or attempting to gain unauthorized access to servers and services that belong to Internet Complete!, Inc. or its customers (i.e. computer hacking).
    2. Participating in behavior which result in reprisals that adversely effect the Internet Complete!, Inc. network or other customers' access to the Internet Complete!, Inc. network.

    Internet Complete!, Inc. will react strongly to any use or attempted use of an Internet account or computer without the owner's authorization. Such attempts include, but are not limited to, “Internet Scanning” (tricking other people into releasing their passwords), password robbery, security hole scanning, port scanning, etc. Any unauthorized use of accounts or computers by any Internet Complete!, Inc. Customer, whether or not the attacked account or computer belongs to Internet Complete!, Inc., will result in severe action taken against the attacker. Possible actions include warnings, account suspension or cancellation, and civil or criminal legal action, depending on the seriousness of the attack. Any attempt to undermine or cause harm to a server or customer of Internet Complete!, Inc. is strictly prohibited.

  7. Lawful Purpose.
    All services may be used for lawful purposes only. Transmission, storage, or presentation of any information, data, or material in violation of any applicable law, regulation, or AUP is prohibited. This includes, but is not limited to, copyrighted material or material protected by trade secret and other statute or dissemination of harmful or fraudulent content.

    Using any Internet Complete!, Inc. service or product for the purpose of participating in any activity dealing with subject matters that are illegal under applicable law is prohibited. Any conduct that constitutes harassment, fraud, stalking, abuse, or a violation of federal export restriction in connection with use of Internet Complete!, Inc. services or products is prohibited. Using the Internet Complete!, Inc. network to solicit the performance of any illegal activity is also prohibited, even if the activity itself is not performed. In addition, knowingly receiving or downloading a file that cannot be legally distributed, even without the act of distribution, is prohibited.

    Servers hosted within Internet Complete!, Inc. network are open to the public. Customer is solely responsible for the usage of the Internet Complete!, Inc. network and servers and any statement Customer makes on servers hosted within the Internet Complete!, Inc. network may be deemed “publication” of the information entered. Acknowledging the foregoing, Customer specifically agrees not to use the Service in any manner that is illegal.

  8. Scheduled Maintenance.
    Internet Complete!, Inc. will conduct routine scheduled maintenance of its Internet Data Centers and Internet Data Center Services according to the maintenance schedule posted on Internet Complete!, Inc. web site. Internet Complete!, Inc. may be required to perform emergency maintenance whenever a mission critical maintenance situation arises. During these scheduled and emergency maintenance periods, Customer's Internet services and/or Customer's Co-located Equipment may be unable to transmit and receive data, and Customer may be unable to access Customer Co-located Equipment. Customer agrees to cooperate with Internet Complete!, Inc. during the scheduled and emergency maintenance periods.

  9. Child Pornography on the Internet.
    Internet Complete!, Inc. will cooperate fully with any criminal investigation into Customer's violation of the Child Protection Act of 1984 concerning child pornography. Customers are ultimately responsible for the actions of their clients over the Internet Complete!, Inc. network and will be liable for illegal material posted by their clients. Internet Complete!, Inc. refers Customer to 18 U.S.C., Sections 2252(a) for activities prohibited by the Child Protection Act of 1984.

    Internet Complete!, Inc. prohibits the publishing or transmission of pornography of any kind through the Internet Complete!, Inc. network or on any of its equipment and/or servers.  Violations of this policy will result in the immediate termination of Customer service.

  10. Commercial Advertisements With E-mail.
    Internet Complete!, Inc. takes a zero tolerance approach to the sending of Unsolicited Bulk E-mail (UBE) or SPAM over our network. Any unsolicited commercial e-mail messages or a series of unsolicited commercial e-mail messages or large attachments sent to one recipient, constitutes UBE and is prohibited. Therefore, Customers of Internet Complete!, Inc. may not use or permit others to use our network to transact in UBE. Customers of Internet Complete!, Inc. may not host, or permit hosting of, sites or information that is advertised by UBE from other networks.  Violations of this policy carry severe penalties, including termination of service.

    Violation of Internet Complete!, Inc. SPAM policy will result in severe penalties. Upon notification of an alleged violation of our SPAM policy, Internet Complete!, Inc. will initiate an investigation. During the investigation, Internet Complete!, Inc. may restrict Customer access to the network to prevent further violations. If Customer is found to be in violation of our SPAM policy, Internet Complete!, Inc. may, at its sole discretion, restrict, suspend, or terminate Customer's account. Further, Internet Complete!, Inc. reserves the right to pursue civil remedies for any costs associated with the investigation of a substantiated policy violation. Internet Complete!, Inc. will notify law enforcement officials if the violation is believed to be a criminal offense.

    Violation of Internet Complete!, Inc. SPAM policy may be reported to abuse@icnet.net.

  11. Spoofing/Fraud.
    Customer may not attempt to send e-mail messages or transmit any electronic communications using a name or address of someone other than Customer for purposes of deception. Any attempt to impersonate someone else by altering a source IP address information or by using forged headers or other identifying information is prohibited. Any attempt to fraudulently conceal, forge, or otherwise falsify Customer's identity in connection with use of the Service is prohibited. Internet Complete!, Inc. reserves the right to deny “spoofed” traffic from leaving its network.

  12. E-mail Relay.
    Any use of another party's electronic mail server to relay e-mail without express written permission from the other party is prohibited.

  13. Security.
    Customer shall not store or distribute programs or files containing viruses, Trojan horses, or corrupted data, and tools to compromise the security of other sites, tools used to collect e-mail addresses for use in sending bulk e-mail, or tools used to send bulk mail. Use or distribution of tools designed for compromising security is prohibited. Examples of these tools include, but are not limited to, password guessing programs, cracking tools or network probing tools.

  14. IP Address Overlap.
    Internet Complete!, Inc. administers the network on which Customer Co-located servers reside. Customer cannot use IP addresses which were not assigned to them by Internet Complete!, Inc. staff. Any Customer device found using IPs which was not officially assigned will be suspended from network access until such time as the IP addresses overlap can be corrected. If the overlap results in interruption of service to Internet Complete!, Inc. or its customers, Customer is responsible for damages.

  15. Billing.
    Customer understands that Customer is responsible for paying for any network resources that are used to connect Customer's server to the Internet. Customer may request that Customer's server be disconnected from the Internet, but Customer will still be responsible for paying for any network resources used up to the point of suspension or cancellation within the current billing period.

  16. Suspension.
    Internet Complete!, Inc. reserves the right to suspend network access to any Customer if in the judgment of the Internet Complete!, Inc. network administrators Customer's server is the source or target of the violation of any of the other terms of the AUP or for any other reason which Internet Complete!, Inc. chooses. If inappropriate activity is detected, all accounts of Customer in question will be deactivated until an investigation is complete. Prior notification to Customer is not assured. In extreme cases, law enforcement will be contacting regarding the activity.

    Accounts unpaid 15 days after date of invoice may have their service disrupted. Such stoppage in service does not relieve Customer from the obligation to pay the monthly service charge. Only a written request (either by letter or email) to terminate your service relieves Customer of the obligation to pay the monthly (or other applicable billing period) service charge.

  17. Cancellation.
    Internet Complete!, Inc. reserves the right to cancel service at any time. If inappropriate activity is detected, all accounts of Customer in question will be deactivated until an investigation is complete. Prior notification to Customer is not assured. In extreme cases, law enforcement will be contacting regarding the activity.

    Only a written request (either by letter or email) to terminate your service relieves you of your obligation to pay the monthly (or other applicable billing period) service charge. Internet Complete! must receive this letter before the 15th of the month in order for the customer to avoid charges for the next consecutive billing cycle.

  18. Indemnification.
    Internet Complete!, Inc. emphasizes that by logging onto and/or using any of Internet Complete!, Inc. services, Customer indemnifies Internet Complete!, Inc. for any violation of law or AUP that results in loss to Internet Complete!, Inc. or the bringing of any claim against Internet Complete!, Inc. by any third party.

    Customer shall be liable for any and all expenses incurred by Internet Complete!, inc. for the purposes of enforcing its rights under the AUP, including reasonable attorney's fees as permitted by law, and any damages caused to Internet Complete!, inc. because of Customer actions.

  19. Disclaimer of Responsibility.
    Internet Complete!, Inc. is under no duty to monitor Customer's or user's activities to determine if a violation of the AUP has occurred, nor does Internet Complete!, Inc. assume any responsibility through the AUP to monitor or police Internet-related activities. Internet Complete!, Inc. disclaims any responsibility for any such inappropriate use and any liability to any person or party for any other person's or party's violation of this policy.

    Customer acknowledges that Internet Complete!, Inc. exercises no control whatsoever of the information passing through Customer's site(s) and that it is the sole responsibility of Customer to ensure that the information it and its users transmit and receive complies with all applicable regulations and the AUP.

    All Sub-networks, resellers, and managed servers of Internet Complete!, Inc. must adhere to the above policies. Failure to follow any term or condition will be grounds for immediate cancellation.

    INDIRECT OR ATTEMPTED VIOLATIONS OF THE AUP AND ACTUAL OR ATTEMPTED VIOLATIONS BY A THIRD PARTY ON CUSTOMER'S BEHALF, SHALL BE CONSIDERED VIOLATIONS OF THE AUP BY CUSTOMER.


Copyright 2000 Internet Complete!, Inc. All Rights Reserved
Best viewed in 800 X 600 resolution or higher