Acceptable Use Policy

Introduction
Beacon has published this Acceptable Use Policy as part of our overall effort to provide high quality, reliable service to our customers; protect the privacy and security of our customers, systems and networks; encourage responsible use of Beacon’s and other provider’s resources; and comply with applicable law. This Policy describes the types of uses of the Beacon Services which are contrary to our objectives and which are, therefore prohibited. Beacon may in its sole discretion determine whether a use of the Beacon Services is a violation of this Policy. While it is not Beacon’s intent to monitor, control or censor use of the Beacon Services, when we become aware of a violation of this Policy, we may take such action as we deem appropriate to address the violation, as discussed below.

This Policy applies to all customers of Beacon Services, and to all other users of the Beacon Services. This Policy supplements, but does not supersede, the contracts that customers have with Beacon. If a contract restricts a use of the Beacon Services that is not addressed in this Policy, the contract will govern with respect to such use.

Prohibited Uses
Because Beacon has no control over reference sites and information located on the world wide web, we make no guarantee as to such sites and information, including the accuracy, currency, content or quality of any such sites and information and we assume no responsibility for Customer access to unintended or objectionable content. Furthermore, because some content on the Internet consists of material that is adult-oriented or otherwise objectionable to some people, the results of your Internet queries may automatically and unintentionally generate links or references to objectionable material. We make no claim that such surprises might not occur. Because Beacon does not monitor or censor the Internet, Beacon does not accept any responsibility for injury to its Customers that results from inaccurate, unsuitable or offensive Internet communications.

In addition Beacon does not review, edit, censor or take responsibility for any information that its Customers or their users may create. Due to the fact that information Customers create or disseminate is carried over Beacon’s or Beacon’s third party provider’s facilities and may reach a large number of people, including both Customers and non-Customers, Customers’ postings to the Internet may affect other Customers and may harm Beacon’s goodwill, business reputation and operations. For these reasons, Customers violate Beacon’s Policy and their contract with Beacon when they, their affiliates or subsidiaries or their respective users engage in the following activities:

Spamming – Unsolicited, commercial mass emailing. Examples of prohibited Spamming activities include:
Posting a single message, or messages similar in content, to more than five online forums or newsgroups. Posting messages to online forums or newsgroups that violate the rules of the forum or newsgroups.
Collecting the responses from unsolicited email. Sending any unsolicited email that could be expected, in Beacon’s discretion, to provoke complaints. Sending email with charity requests, petitions for signatures, or any chain mail related materials. Sending unsolicited email without identifying in the email a clear and easy means to be excluded from receiving additional email from the originator of the email. Sending email that does not accurately identify the sender, the sender’s return address and the email address of origin. Illegal/Criminal Activity & Criminal or civil violations of state, federal or international laws, regulations or other government requirements. Such violations could include theft or infringement of copyrights, trademarks, trade secrets or other types of intellectual property; fraud; forgery; theft or misappropriation of funds, credit cards or personal information; and threats of physical harm or harassment.

Distribution and/or Transmission of Obscene or Indecent Speech or Materials & Distribution of offensive materials, including obscene, pornographic, indecent and hateful materials.

Defamation & Distribution of defamatory or libelous materials.

Illegal/Unauthorized Access to Other Computers or Networks & Illegal or unauthorized attempts & whether or not successful & to violate the security of a network, service or other system. Examples of prohibited activities include hacking, cracking into, monitoring, or using systems without authorization; scanning ports; conducting denial of service attacks; forging of any TCP-IP packet header or any part of the header information in an email or news grouping posting; and distributing Internet viruses, worms, Trojan horses and other harmful software.

Other Activities
Any other activities that Beacon determines to be harmful to its Customers, operations or reputation, including any activities that restrict or inhibit any other user from using or enjoying the Beacon Services or the Internet.

The above descriptions are guidelines and are not intended to be exhaustive.

Consequences
Responsibility for complying with the Acceptable Use Policy rests with the Customer. Beacon will not, as an ordinary practice, monitor the communications of its Customers to ensure that they comply with Beacon’s policy or with applicable law. When Beacon becomes aware of harmful communications, however, it may take any of a variety actions. Beacon, without notice, may remove information that violates it policies, implement screening software designed to block offending transmissions, suspend service, or take any other action it deems appropriate, including termination of a Customer’s contract with Beacon.

Privacy
Beacon cannot take any responsibility for the security of communications transmitted over Beacon’s facilities. Beacon will comply fully, however, with all applicable laws concerning the privacy of its Customers’ on-line communications. Beacon will not intentionally monitor or disclose any private electronic mail messages sent or received by its Customers unless required to do so by law. Beacon may, however, monitor its service electronically to determine that its facilities are operating satisfactorily. Also, Beacon may be required to disclose information transmitted through its facilities in order to comply with court orders, statutes, regulations or governmental requests. Finally, Beacon may disclose information transmitted over its facilities where necessary to protect Beacon and its Customers from harm, or where such disclosure is necessary to the proper operation of the system.

Reporting Network Abuse
Any party seeking to report any violations of Beacon’s policy may contact via email: abuse@beaconnet.com

Revisions to the Policy
Beacon may modify this policy at any time. Such modification will be effective when posted to the Beacon web site.