Acceptable Use Policy
It is Circle City Internet’s intent to provide our customers with the best Internet service possible. In order to accomplish this task, we have designed our network for optimal performance based on our customers using the service in a predictable way. We have adopted this Acceptable Use Policy (“Policy” or “AUP”) which outlines what we consider to be acceptable use of our Internet services (the “Service”), as well as permissible and prohibited conduct for using the Service to access the Internet.
Questions regarding this policy and complaints of violations of it by our customers and users can be directed to: [email protected]
- Customer Responsibility: It is the responsibility of all of our Service customers and all others who have access to our network (“customer,” “you,” or “your”), to comply with this Policy. Failure to comply with this Policy could result in the suspension or termination of your Service. If you do not agree to comply with this Policy, you must immediately stop use of the service and notify us so that we can close your account. We reserve the right to immediately terminate the Service and any applicable subscriber agreements or service orders if you engage in any of the prohibited activities listed in this Policy or if you use equipment or Service in a way which is contrary to any of our policies or any of our suppliers’ policies.
- Prohibited Uses and Activities: Prohibited uses include, but are not limited to, using the Service or any associated equipment to:
(i) undertake or accomplish any unlawful purpose. This includes, but is not limited to, posting, storing, transmitting or disseminating information, data or material which is libelous, obscene, unlawful, threatening, defamatory, or which infringes the intellectual property rights of any person or entity, or which in any way constitutes or encourages conduct that would constitute a criminal offense, give rise to civil liability, or otherwise violate any local, state, federal or international law, order or regulation;
(ii) post, store, send, transmit, or disseminate any information or material which a reasonable person could deem to be objectionable, offensive, indecent, pornographic, harassing, threatening, embarrassing, distressing, vulgar, hateful, racially or ethnically offensive, or otherwise inappropriate, regardless of whether this material or its dissemination is unlawful;
(iii) access any other person’s computer or computer system, software, or data without such person’s knowledge and consent; breach or circumvent, or attempt to breach or circumvent, the security system of any host, network, server, or user account. This includes, but is not limited to, accessing data not intended for you, logging into or making use of a network, server or account you are not expressly authorized to access, or probing the security of other hosts, networks, or accounts; use or distribute tools designed or used for compromising security, such as password guessing programs, decoders, password gatherers, analyzers, cracking tools, packet sniffers, port scanning, network probing, encryption circumvention devices, or Trojan Horse programs; provided, that any port scanning, network probing or other similar network or security tools are permitted when used by you for purposes of securing or optimizing your own network, or if explicitly authorized by the destination host network;
(iv) upload, post, publish, transmit, reproduce, create derivative works of, or distribute in any way, information, software or other material obtained through the Service or otherwise that is protected by copyright or other proprietary right, without obtaining permission of the owner;
(v) copy, distribute, or sublicense any software provided by us or any third-party in connection with the Service, except that you may make one copy of each such software program for back-up purposes only;
(vi) restrict, inhibit, or otherwise interfere with the ability of any other person, regardless of intent, purpose or knowledge, to use or enjoy the Service, including, without limitation, posting or transmitting any information or software which contains a worm, virus, or other harmful feature, or generating levels of network traffic that impede the ability of other authorized users of the Service to use the Service;
(vii) restrict, inhibit, interfere with, or otherwise disrupt or cause a performance degradation, regardless of intent, purpose or knowledge, to the Service or any host, server, backbone network, node or service, or otherwise cause a performance degradation to any of our or our suppliers’ facilities used to deliver the Service;
(viii) for our residential customers, resell the Service or otherwise make available to anyone outside of your residence the ability to use the Service (e.g., wi-fi, or other methods of networking), in whole or in part, directly or indirectly, or on a bundled or unbundled basis. For our residential customers, the Service is for personal and non-commercial use only and residential customers agree not to use the Service for operation as an Internet service provider or for any business enterprise or purpose, or as an end-point on a local area network or wide area network outside of our network;
(ix) for residential subscribers, connect multiple computers to set up a local area network that in any manner would result in a violation of the terms of this Policy or an applicable Service plan;
(x) transmit unsolicited bulk or commercial messages or “spam.” This includes, but is not limited to, unsolicited advertising, promotional materials or other solicitation material, bulk mailing of commercial advertising, chain mail, informational announcements, charity requests, and petitions for signatures;
(xi) send numerous copies of the same or substantially similar messages, empty messages, or messages which contain no substantive content, or send very large messages or files to a recipient that disrupts or clogs Circle City Internets network;
(xii) distribute programs that remove locks or time-outs built into software (cracks); for our residential customers, run programs, equipment, computers or servers from your residence that provide network content or any other services to anyone outside of your residence, such as public e-mail, web hosting, file sharing, gaming server, and proxy services and servers;
(xiii) initiate, perpetuate, or in any way participate in any pyramid or other illegal soliciting scheme;
(xiv) participate in the collection of e-mail addresses, screen names, or other identifiers of others (without their prior consent), a practice sometimes known as spidering or harvesting, or participate in the use of software (including “spyware”) designed to facilitate this activity;
(xv) collect responses from unsolicited messages;
(xvi) impersonate any person or entity, engage in sender address falsification, forge anyone else’s digital or manual signature, or perform any other similar fraudulent activity;
(xvii) service, alter, modify, or tamper with the Circle City Internet Equipment or Service or permit any other person to do the same who is not authorized by us;
(xviii) connect any Circle City Internet Equipment to any computer outside of your premises;
(xix) collect, or attempt to collect, personal information about third parties without their consent;
(xx) interfere with computer networking or telecommunications service to any user, host or network, including, without limitation, denial of service attacks, flooding of a network, overloading a service, improper seizing and abuse of operator privileges and attempts to “crash” a host; and/or
(xxi) violate the rules, regulations, or policies applicable to any network, server, computer database, or Web site that you access.
- Security: As a Service customer, it is your responsibility to secure your computer and network equipment so that it is not subject to external threats such as viruses, spam, and other methods of intrusion. In all cases, you are solely responsible for the security of any device you choose to connect to the Service, including any data stored or shared on that device. You are responsible for any misuse of the Service, even if the misuse was committed without your authorization. Therefore, you must take steps to ensure that others do not use your computer or network to gain unauthorized access to the Service or to use the Service in an unauthorized manner.
- Inappropriate Content and Transmissions: We reserve the right (but assume no obligation), to refuse to transmit or post and to remove or block any data, information or materials, in whole or in part, that we, in our sole discretion, deem to be offensive, indecent, or otherwise inappropriate, and regardless of whether this material or its dissemination is unlawful. Neither we nor any of our affiliates, suppliers, or agents have any obligation to monitor transmissions or postings (including, but not limited to, file transfers, web searches, e-mail sent or received, visits or postings to social media sites, instant message transmissions, etc.) made using the Service. However, we and our affiliates, suppliers, and agents have the right to monitor these transmissions and postings from time to time for violations of this Policy and to disclose, block, or remove them in accordance with this Policy and any other applicable subscriber agreements or service orders.
- Online Communication: Forging, altering, or removing electronic mail headers is prohibited. You may not reference Circle City Internet or the Circle City Internet network in the header or by listing an IP address that belongs to us or our network in any unsolicited communication even if that communication is not sent through the Service. In the event that we believe in its sole discretion that any subscriber name, account name, or e-mail address (collectively, an “identifier”) using the Service may or is being used for, any misleading, fraudulent, or other improper or illegal purpose, we (i) reserve the right to block access to and prevent the use of any such identifier, and (ii) may at any time require any customer to change his or her identifier. In addition, we may at any time reserve any identifiers on the Service for our own purposes.
- Network, Bandwidth, Data Storage and Other Limitations: You must comply with all current, applicable bandwidth, data storage, and other limitations on the Service established by us and our suppliers. In addition, unless otherwise provided by your subscriber agreement or service order, you may only access and use the Service with a dynamic Internet Protocol (“IP”) address that adheres to the dynamic host configuration protocol (“DHCP”). You may not access or use the Service with a static IP address or using any protocol other than DHCP unless you are subject to a Service plan or Service order that expressly permits otherwise. You must ensure that your activity does not improperly restrict, inhibit, or degrade any other user’s use of the Service, nor represent (in our sole judgment) an unusually large burden on our network. In addition, you must ensure that your activities do not improperly restrict, inhibit, disrupt, degrade or impede our ability to deliver the Service and monitor the Service, our network backbone, network nodes, and/or other network services.
- Copyright Infringement: We are committed to complying with U.S. copyright and related laws, and require all customers and users of the Service to comply with these laws. Accordingly, you may not store any material or content on, or disseminate any material or content over, the Service (or any part of the Service) in any manner that constitutes an infringement of third party intellectual property rights, including rights granted by U.S. copyright law. Owners of copyrighted works who believe that their rights under U.S. copyright law have been infringed may take advantage of certain provisions of the Digital Millennium Copyright Act of 1998 (the “DMCA”) to report alleged infringements. It is our policy in accordance with the DMCA and other applicable laws to reserve the right to terminate the Service provided to any customer or user who is either found to infringe third party copyright or other intellectual property rights, including repeat infringers, or who we believe in its sole discretion is infringing these rights. We may terminate the Service of any such customer or user at any time with or without notice. Copyright owners may report alleged infringements of their works that are committed using the Service by sending our authorized agent a notification of claimed infringement that satisfies the requirements of the DMCA. Upon our receipt of a satisfactory notice of claimed infringement for these works, we will take appropriate action. If the affected customer or user believes in good faith that the allegedly infringing works have been removed or blocked by mistake or misidentification, then that person may send a counter notification to us. Upon our receipt of a counter notification that satisfies the requirements of DMCA, we will provide a copy of the counter notification to the person who sent the original notification of claimed infringement and will follow the DMCA’s procedures with respect to a received counter notification. In all events, you expressly agree that we will not be a party to any disputes or lawsuits regarding alleged copyright infringement.
Copyright owners may send us a notification of claimed infringement to report alleged infringements of their works to:
Remarkable Wifi, LLC dba Circle City Internet
P.O. Box 40
Wittmann, Arizona 85361
Attn: Legal Department
Copyright owners may use any form of notification of claimed infringement form that satisfies the requirements of Section 512(c)(3) of the U.S. Copyright Act. Under the DMCA anyone who knowingly makes misrepresentations regarding alleged copyright infringement may be liable to us, the alleged infringer, and the affected copyright owner for any damages incurred in connection with the removal, blocking, or replacement of allegedly infringing material.
If a notification of claimed infringement has been filed against you, you can file a counter notification with our designated agent using the contact information shown above. All counter notifications must satisfy the requirements of Section 512(g)(3) of the U.S. Copyright Act.
For more information about the DMCA, visit copyright.gov.
- Violation of Acceptable Use Policy: We do not routinely monitor the activity of Service accounts for violation of this Policy. However, in our efforts to promote good citizenship within the Internet community, we will respond appropriately if we become aware of inappropriate use of our Service. Although we have no obligation to monitor use of the Service and/or the network, we and our suppliers reserve the right at any time to monitor bandwidth, usage, transmissions, and content from time to time to operate the Service; to identify violations of this Policy; and/or to protect our network, the Service and our customers and users.
We prefer to advise customers of inappropriate behavior and any necessary corrective action. However, if the Service is used in a way that we or our suppliers, in our sole discretion, believe violate this Policy, we or our suppliers may take any responsive actions they deem appropriate. These actions may include, but are not limited to, temporary or permanent removal of content, cancellation of online posts, filtering of Internet transmissions, and the immediate suspension or termination of all or any portion of the Service. Neither we nor our affiliates, suppliers, or agents will have any liability for any these responsive actions. These actions are not our exclusive remedies and we may take any other legal or technical action we deem appropriate. We reserve the right to investigate suspected violations of this Policy, including the gathering of information from the user or users involved and the complaining party, if any, and examination of material transmitted over our servers, routers and network. During an investigation, we may suspend the account or accounts involved and/or remove or block material that potentially violates this Policy. You expressly authorize us and our suppliers to cooperate with (i) law enforcement authorities in the investigation of suspected legal violations, and (ii) system administrators at other Internet service providers or other network or computing facilities in order to enforce this Policy. This cooperation may include our providing available personally identifiable information about you to law enforcement or system administrators, including, but not limited to, subscriber name, IP address, information regarding your use of the Service and other account information. Upon termination of your account, we are authorized to delete any files, programs, data and e-mail messages associated with your account.
Any failure to enforce this Policy, for whatever reason, shall not be construed as a waiver of any right to do so at any time. You agree that if any portion of this Policy is held invalid or unenforceable, that portion will be construed consistent with applicable law as nearly as possible, and the remaining portions will remain in full force and effect.
You agree to indemnify, defend and hold harmless us and our affiliates, suppliers, and agents against all claims and expenses (including reasonable attorneys’ fees) resulting from you engaging in any of the prohibited activities listed in this Policy or resulting from your violation of this Policy or of any other posted policy related to use of the Service. Your indemnification obligations will survive any termination of your Circle City Internet Service.