EMAIL CONTACTS:
Questions & Comments
questions@icnet.net
Technical Support
support@icnet.net
Billing Questions
billing@icnet.net
TELEPHONE NUMBERS:
Phone: (405) 858-8637
Fax: (405) 858-9529
MAILING ADDRESS:
Internet Complete!, Inc.
4509 N Classen Suite 100
Oklahoma City, OK 73118 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Acceptable Use Policy
Internet Complete!, Inc. acceptable use
policies (the “AUP”) set forth below define acceptable practices while
using any of the Internet Complete!, Inc. services that provide access to the
Internet Complete!, Inc. network (the “Service”). By using the Service,
you acknowledge that you (“Customer”), representatives, agents, and users
have gained access to the Service through Customer's account, have read,
understood, and agree to abide by the AUP. Customer is responsible for
violations of the AUP by any user. The AUP is not exhaustive, and Internet
Complete!, Inc. reserves the right to modify the AUP at any time, effective
upon either via e-mail or by posting a revised copy of the AUP on the Internet
Complete!, Inc. web site. By registering for and using the Service, and
thereby accepting the terms and conditions of the Master Service Agreement or
its equivalent, Customer agrees to abide by the AUP as modified. Any violation
of the AUP may result in the suspension or termination of Customer's account
or such other action as Internet Complete!, Inc. deems appropriate. If
Customer violates any AUP resulting in an interruption of the Service for
Internet Complete!, Inc. or its customers, Customer may be held liable for
damages in addition to the termination of services. An unlisted activity may
also be a violation of the AUP if it is illegal, irresponsible, or disruptive
use of the Internet. Internet Complete!, Inc. reserves the right at all times
to prohibit activities that damage its commercial reputation and goodwill. No
credits will be issued for any interruption in service resulting from any
violation of the AUP.
VIOLATION OF ANY AUP IS STRICTLY PROHIBITED AND MAY RESULT IN THE IMMEDIATE
SUSPENSION OR TERMINATION OF THE SERVICES CUSTOMER RECEIVES FROM INTERNET
COMPLETE!, INC. CUSTOMER SHALL REMAIN SOLELY LIABLE AND RESPONSIBLE FOR
CUSTOMER'S USE OF THE SERVICES AND ANY AND ALL CONTENT THAT CUSTOMER DISPLAYS,
UPLOADS, DOWNLOADS, OR TRANSMITS THROUGH THE USE OF THE SERVICES.
"CONTENT" INCLUDES, WITHOUT LIMITATION, CUSTOMER'S E-MAIL, WEB
PAGES, PERSONAL HOME PAGES, POSTING, CHATTING, BROWSING, AND DOMAIN NAMES. IT
IS THE POLICY OF INTERNET COMPLETE!, INC. TO TERMINATE REPEAT INFRINGERS.
INTERNET COMPLETE!, INC. RESERVES THE RIGHT TO REFUSE SERVICE TO ANYONE AT ANYTIME.
- Customer Service Responsibilities.
Customer is solely responsible for any breaches of security affecting
servers under Customer's control. If Customer's server is involved in an
attack on another server or system, it will be shut down and an immediate
investigation will be launched to determine the cause or source of the
attack. In such event, Customer is responsible for the cost to rectify any
damage done to Customer's server and any other requirement affected by the
security breach.
- System And Network Security. Violations of system
or network security are prohibited and may result in criminal and civil
liability. Internet Complete!, Inc. may investigate incidents involving
such violations and may involve and will cooperate with law enforcement if
a criminal violation is suspected. Examples of system or network security
violations include, without limitation, the following:
- Unauthorized access to or use of data, systems, or
networks, including any attempt to probe, scan, or test the
vulnerability of a system or network or to breach security or
authentication measures without express authorization of the owner of
the system or network.
- Unauthorized monitoring of data or traffic on any
network or system without express authorization of the owner of the
system or network.
- Interference with service to any user, host, or
network including, without limitation, mailbombing, flooding,
deliberate attempts to overload a system, and broadcast attacks.
- Forging of any TCP-IP packet header or any part of
the header information in an e-mail or a newsgroup posting.
Violators of the policy are responsible, without limitation, for the cost
of labor to cleanup and correct any damage done to the operation of the
network and business operations supported by the network, and to respond
to complaints incurred by Internet Complete!, Inc..
Because the Internet is an inherently open and insecure means of
communication, any data or information that Customer transmits over the
Internet may be susceptible to interception and alteration. As a matter of
prudence, Internet Complete!, Inc. urges its customers to assume that all
of their on-line communications are insecure. Internet Complete!, Inc.
cannot take responsibility for the security of information transmitted
over Internet Complete!, Inc. facilities.
- Password Protection.
Customer is responsible for protecting Customer's password and for any
authorized or unauthorized use made of Customer's password. Customer will
not use or permit anyone to use Internet Complete!, Inc. service to guess
passwords or to access other systems or networks without authorization.
Internet Complete!, Inc. will fully cooperate with law enforcement
authorities in the detection and prosecution of illegal activity.
- Internet Etiquette.
Customer is expected to be familiar with and to practice good Internet
etiquette (Netiquette). Customer will comply with the rules appropriate to
any network to which Internet Complete!, Inc. may provide access. Types of
prohibited posts include chain letters, pyramid schemes, encoded binary
files, job offers or listings, and personal ads. Customer should not post,
transmit, or permit Internet access to information Customer desires to
keep confidential. Customer is not permitted to post any material that is
illegal, libelous, tortuous, indecently depicts children, or likely to
result in retaliation against Internet Complete!, Inc. by offended users.
- Copyright Infringement – Software Piracy Policy.
The Internet Complete!, Inc. network may only be used for lawful purposes.
Customer shall use the Service only for lawful purposes, in compliance
with all applicable laws. Customer agrees to not facilitate, aid, or
encourage any unlawful activity. Transmission, distribution, retrieval, or
storage of any information, data, or material in violation of United
States or state regulation or law, or by the common law, is prohibited.
This includes, but is not limited to, material protected by copyright,
trademark, trade secret, or other intellectual property rights.
Making unauthorized copies of software is a violation of the law. If
Customer copies, distributes, or installs the software in ways that the
license does not allow, Customer is violating federal copyright law.
In compliance with the Digital Millennium Copyright Act (“DMCA”),
please send DMCA notifications of claimed copyright infringements to: abuse@icnet.net.
Internet Complete!, Inc. will cooperate fully with any civil and/or
criminal litigation arising from the violation of this policy.
- Network Responsibility.
Customer has the responsibility to use the Internet Complete!, Inc.
network responsibly. This includes respecting the other customers of
Internet Complete!, Inc.. Internet Complete!, Inc. reserves the right to
suspend and/or cancel service with any Customer who uses the Internet
Complete!, Inc. network in such a way that adversely affects other
Internet Complete!, Inc. customers. This includes but is not limited to:
- Attacking or attempting to gain unauthorized access
to servers and services that belong to Internet Complete!, Inc. or its
customers (i.e. computer hacking).
- Participating in behavior which result in reprisals
that adversely effect the Internet Complete!, Inc. network or other
customers' access to the Internet Complete!, Inc. network.
Internet Complete!, Inc. will react strongly to any use or attempted use
of an Internet account or computer without the owner's authorization. Such
attempts include, but are not limited to, “Internet Scanning”
(tricking other people into releasing their passwords), password robbery,
security hole scanning, port scanning, etc. Any unauthorized use of
accounts or computers by any Internet Complete!, Inc. Customer, whether or
not the attacked account or computer belongs to Internet Complete!, Inc.,
will result in severe action taken against the attacker. Possible actions
include warnings, account suspension or cancellation, and civil or
criminal legal action, depending on the seriousness of the attack. Any
attempt to undermine or cause harm to a server or customer of Internet
Complete!, Inc. is strictly prohibited.
- Lawful Purpose.
All services may be used for lawful purposes only. Transmission, storage,
or presentation of any information, data, or material in violation of any
applicable law, regulation, or AUP is prohibited. This includes, but is
not limited to, copyrighted material or material protected by trade secret
and other statute or dissemination of harmful or fraudulent content.
Using any Internet Complete!, Inc. service or product for the purpose of
participating in any activity dealing with subject matters that are
illegal under applicable law is prohibited. Any conduct that constitutes
harassment, fraud, stalking, abuse, or a violation of federal export
restriction in connection with use of Internet Complete!, Inc. services or
products is prohibited. Using the Internet Complete!, Inc. network to
solicit the performance of any illegal activity is also prohibited, even
if the activity itself is not performed. In addition, knowingly receiving
or downloading a file that cannot be legally distributed, even without the
act of distribution, is prohibited.
Servers hosted within Internet Complete!, Inc. network are open to the
public. Customer is solely responsible for the usage of the Internet
Complete!, Inc. network and servers and any statement Customer makes on
servers hosted within the Internet Complete!, Inc. network may be deemed
“publication” of the information entered. Acknowledging the foregoing,
Customer specifically agrees not to use the Service in any manner that is
illegal.
- Scheduled Maintenance.
Internet Complete!, Inc. will conduct routine scheduled maintenance of its
Internet Data Centers and Internet Data Center Services according to the
maintenance schedule posted on Internet Complete!, Inc. web site. Internet
Complete!, Inc. may be required to perform emergency maintenance whenever
a mission critical maintenance situation arises. During these scheduled
and emergency maintenance periods, Customer's Internet services and/or
Customer's Co-located Equipment may be unable to transmit and receive
data, and Customer may be unable to access Customer Co-located Equipment.
Customer agrees to cooperate with Internet Complete!, Inc. during the
scheduled and emergency maintenance periods.
- Child Pornography on the Internet.
Internet Complete!, Inc. will cooperate fully with any criminal
investigation into Customer's violation of the Child Protection Act of
1984 concerning child pornography. Customers are ultimately responsible
for the actions of their clients over the Internet Complete!, Inc. network
and will be liable for illegal material posted by their clients. Internet
Complete!, Inc. refers Customer to 18 U.S.C., Sections 2252(a) for
activities prohibited by the Child Protection Act of 1984.
Internet Complete!, Inc. prohibits the publishing or transmission of
pornography of any kind through the Internet Complete!, Inc. network or on
any of its equipment and/or servers. Violations of this policy will
result in the immediate termination of Customer service.
- Commercial Advertisements With E-mail.
Internet Complete!, Inc. takes a zero tolerance approach to the sending of
Unsolicited Bulk E-mail (UBE) or SPAM over our network. Any unsolicited
commercial e-mail messages or a series of unsolicited commercial e-mail
messages or large attachments sent to one recipient, constitutes UBE and
is prohibited. Therefore, Customers of Internet Complete!, Inc. may not
use or permit others to use our network to transact in UBE. Customers of
Internet Complete!, Inc. may not host, or permit hosting of, sites or
information that is advertised by UBE from other networks.
Violations of this policy carry severe penalties, including termination of
service.
Violation of Internet Complete!, Inc. SPAM policy will result in severe
penalties. Upon notification of an alleged violation of our SPAM policy,
Internet Complete!, Inc. will initiate an investigation. During the
investigation, Internet Complete!, Inc. may restrict Customer access to
the network to prevent further violations. If Customer is found to be in
violation of our SPAM policy, Internet Complete!, Inc. may, at its sole
discretion, restrict, suspend, or terminate Customer's account. Further,
Internet Complete!, Inc. reserves the right to pursue civil remedies for
any costs associated with the investigation of a substantiated policy
violation. Internet Complete!, Inc. will notify law enforcement officials
if the violation is believed to be a criminal offense.
Violation of Internet Complete!, Inc. SPAM policy may be reported to abuse@icnet.net.
- Spoofing/Fraud.
Customer may not attempt to send e-mail messages or transmit any
electronic communications using a name or address of someone other than
Customer for purposes of deception. Any attempt to impersonate someone
else by altering a source IP address information or by using forged
headers or other identifying information is prohibited. Any attempt to
fraudulently conceal, forge, or otherwise falsify Customer's identity in
connection with use of the Service is prohibited. Internet Complete!, Inc.
reserves the right to deny “spoofed” traffic from leaving its network.
- E-mail Relay.
Any use of another party's electronic mail server to relay e-mail without
express written permission from the other party is prohibited.
- Security.
Customer shall not store or distribute programs or files containing
viruses, Trojan horses, or corrupted data, and tools to compromise the
security of other sites, tools used to collect e-mail addresses for use in
sending bulk e-mail, or tools used to send bulk mail. Use or distribution
of tools designed for compromising security is prohibited. Examples of
these tools include, but are not limited to, password guessing programs,
cracking tools or network probing tools.
- IP Address Overlap.
Internet Complete!, Inc. administers the network on which Customer
Co-located servers reside. Customer cannot use IP addresses which were not
assigned to them by Internet Complete!, Inc. staff. Any Customer device
found using IPs which was not officially assigned will be suspended from
network access until such time as the IP addresses overlap can be
corrected. If the overlap results in interruption of service to Internet
Complete!, Inc. or its customers, Customer is responsible for damages.
- Billing.
Customer understands that Customer is responsible for paying for any
network resources that are used to connect Customer's server to the
Internet. Customer may request that Customer's server be disconnected from
the Internet, but Customer will still be responsible for paying for any
network resources used up to the point of suspension or cancellation
within the current billing period.
- Suspension.
Internet Complete!, Inc. reserves the right to suspend network access to
any Customer if in the judgment of the Internet Complete!, Inc. network
administrators Customer's server is the source or target of the violation
of any of the other terms of the AUP or for any other reason which
Internet Complete!, Inc. chooses. If inappropriate activity is detected,
all accounts of Customer in question will be deactivated until an
investigation is complete. Prior notification to Customer is not assured.
In extreme cases, law enforcement will be contacting regarding the
activity.
Accounts unpaid 15 days after date of invoice may have their service
disrupted. Such stoppage in service does not relieve Customer from the
obligation to pay the monthly service charge. Only a written request
(either by letter or email) to terminate your service relieves Customer of
the obligation to pay the monthly (or other applicable billing period)
service charge.
- Cancellation.
Internet Complete!, Inc. reserves the right to cancel service at any time.
If inappropriate activity is detected, all accounts of Customer in
question will be deactivated until an investigation is complete. Prior
notification to Customer is not assured. In extreme cases, law enforcement
will be contacting regarding the activity.
Only a written request (either by letter or email) to terminate your
service relieves you of your obligation to pay the monthly (or other
applicable billing period) service charge. Internet Complete! must receive
this letter before the 15th of the month in order for the customer to
avoid charges for the next consecutive billing cycle.
- Indemnification.
Internet Complete!, Inc. emphasizes that by logging onto and/or using any
of Internet Complete!, Inc. services, Customer indemnifies Internet
Complete!, Inc. for any violation of law or AUP that results in loss to
Internet Complete!, Inc. or the bringing of any claim against Internet
Complete!, Inc. by any third party.
Customer shall be liable for any and all expenses incurred by Internet
Complete!, inc. for the purposes of enforcing its rights under the AUP,
including reasonable attorney's fees as permitted by law, and any damages
caused to Internet Complete!, inc. because of Customer actions.
- Disclaimer of Responsibility.
Internet Complete!, Inc. is under no duty to monitor Customer's or user's
activities to determine if a violation of the AUP has occurred, nor does
Internet Complete!, Inc. assume any responsibility through the AUP to
monitor or police Internet-related activities. Internet Complete!, Inc.
disclaims any responsibility for any such inappropriate use and any
liability to any person or party for any other person's or party's
violation of this policy.
Customer acknowledges that Internet Complete!, Inc. exercises no control
whatsoever of the information passing through Customer's site(s) and that
it is the sole responsibility of Customer to ensure that the information
it and its users transmit and receive complies with all applicable
regulations and the AUP.
All Sub-networks, resellers, and managed servers of Internet Complete!,
Inc. must adhere to the above policies. Failure to follow any term or
condition will be grounds for immediate cancellation.
INDIRECT OR ATTEMPTED VIOLATIONS OF THE AUP AND ACTUAL OR ATTEMPTED
VIOLATIONS BY A THIRD PARTY ON CUSTOMER'S BEHALF, SHALL BE CONSIDERED
VIOLATIONS OF THE AUP BY CUSTOMER.
|