7. Acceptable Use Policy
You are only permitted to use enTouch Wireless’ Devices and Services for lawful, personal, and non-commercial uses. Subject to those limitations, voice and text service is solely for live dialogue between, and initiated by, individuals. Data services are provided only for lawful, personal and non-commercial uses initiated by you, including web surfing, sending and receiving email, using messaging services for live dialogue between and initiated by individuals, sharing photographs, and the non-continuous streaming of videos, downloading files, participation in online gaming, and use of applications.
Prohibited uses included those that are unlawful, harmful, or otherwise impact our ability or the ability of our Underlying Carrier to provide the Services to our or its subscribers. You are responsible for all activity through your Device and Services, including any conduct by others, and are liable to enTouch Wireless for any prohibited uses or damages resulting from prohibited activities or uses that occur using your Device or Services. Prohibited uses include, but are not limited to:
a. Infringement: Infringing or otherwise violating any intellectual property rights or other proprietary rights including, without limitation, material protected by copyright, trademark, patent, trade secret, or other intellectual property right, which may result from the unauthorized copying, distribution, posting, editing, or modifying of pictures, logos, software, articles, musical works, and videos.
b. Unlawful, Offensive, and Harmful Conduct or Content: Engaging in conduct or dissemination of content that is unlawful, libelous, slanderous, defamatory, obscene, indecent, lewd, harassing, threatening, harmful, invasive of privacy or publicity rights, abusive, inflammatory, inciting unlawful or violent acts, or otherwise objectionable. Without limiting the foregoing, you may not access or use our Devices or Services in any manner for the transmission or dissemination of images containing child pornography. We reserve the right to remove or delete any content you have disseminated using our Services that, in our sole discretion, have determined violates this Agreement or is otherwise objectionable.
c. Fraudulent Conduct: Engaging in any fraudulent activity, including, but not limited to: (1) conducting fraudulent business operations and practices; (2) offering or disseminating fraudulent goods, services, schemes, or promotions (e.g., make-money-fast schemes, chain letters, and pyramid schemes); and (3) individual or business representation as an authorized third-party affiliation or agent for a business entity without the business’ prior consent.
d. Falsification/Impersonation: Using the Device or Services to impersonate any person or entity; falsely state, mask, or otherwise misrepresent yourself or your affiliation with any person or entity; or create a false identity for the purpose of misleading others. Without limiting the foregoing, you may not use invalid or forged headers, invalid or non-existent domain names, false date or time stamps, false originating e-mail addresses or other identifiers, or other means of deceptive addressing.
e. Commercial, Unsolicited, and Spam Communications: Using the Services to distribute, publish, send, or engage in: (i) commercial, marketing, advertising, or promotional communications or solicitations to any person without the person’s consent; (ii) spam, chain mail, bulk messages, automatically generated messages, numerous copies of the same or substantially similar messages, empty messages, or messages that contain no substantive content; and (iii) telemarketing, autodialed, or prerecorded communications. This includes using our mail servers or another site’s mail server to relay messages without the express permission of the account holder or the site.
f. Violation of Third-Party Policies: Violating the rules, regulations, or policies that apply to any third-party network, server, computer database, website, or application you access.
g. Excessive Utilization of the Services: Engaging in excessive use of the Services relative to typical usage by other enTouch Wireless customers on similar service plans, including making or receiving an abnormally high number of calls, sending or receiving an unusually high number of messages, repeatedly placing calls of unusually long duration, or consuming a disproportionate amount of available network resources, including data. Such activities suggest the Services are being used other than for personal, non-commercial use in violation of this Agreement and may impair or degrade use of the Services by other customers.
h. Uses Causing Excessive Utilization of Services: Continuous, unattended, or excessive streaming, downloading, or uploading of videos, music, or other files; using applications that automatically consume disproportionate amounts of network resources, are designed for unattended use, operate as automatic data feeds, constitute automated machine-to-machine connections, or are used in a way that degrades network capacity or functionality; using the Services in connection with server devices or to operate a hosting service; using the Services as the functional equivalent of a private or dedicated access line or an access point for intra-company private branch exchange services; maintaining open lines of communication for extended periods of time (e.g., baby monitoring or other monitoring services); and placing or receiving an abnormally high number of calls or repeatedly placing or receiving calls which result in abnormally long call lengths or high costs, including operating a dispatch service, excessive use of multi-party calling features or separate calls that are not bridged together, and excessive use of single party or multi-party chat line services.
i. Traffic Pumping/Access Stimulation: Using the network for any and all activities that are designed to generate traffic to increase the intercarrier compensation billed to enTouch Wireless, including to dial telephone numbers associated with free conference calls, free chat lines, or similar services that are used for traffic pumping/access stimulation. If your use of unlimited services for conference calling or call forwarding is significantly above that of our average customer, enTouch Wireless may, at its option, terminate your service or change your plan to one with no unlimited usage components.
j. Unauthorized Information Collection: Using our Services for unauthorized information collection, including, but not limited to: phishing, spidering, harvesting, or any other unauthorized collection of e-mail addresses, screen names, or other identifiers of others, using software (including “spyware”) designed to facilitate such activity; or conducting commercial research or commercial data collection, including collecting responses from unsolicited messages.
k. Malicious Software: Distributing, publishing, or posting content that is malicious software (i.e., malware) into the network or through the Services, including, without limitation, viruses, Trojan horses, worms, time bombs, zombies, cancelbots, or any other computer programming routines that may damage, interfere with, secretly intercept or seize any system, program, data, or personal information.
l. Hacking: Without the express prior authorization of the owner of any data, systems, or networks, accessing or using such data, systems, or networks, including attempting to gain unauthorized access to, alter, or destroy any information that relates to any enTouch Wireless subscriber or other end-user and attempting to probe, scan, or test the vulnerability of a system or network or to breach security or authentication measures.
m. Interception: Monitoring data or traffic on any system or network without the express prior authorization of the owner of the system or network.
n. Intentional Interference: Interfering with service to any user, host, or network including, without limitation, denial-of-service attacks, mail bombing, news bombing, other flooding techniques, deliberate attempts to overload a system, and broadcast attacks.
o. Device Modifications: Unlocking, re-flashing, rooting, tampering with, altering, or otherwise modifying your enTouch Wireless Device or its software without authorization.
p. SIM Card Modifications: If your Device has a SIM card, without authorization, removing the SIM card, placing the SIM card in another Device, or altering, bypassing, copying, deactivating, reverse-engineering, or otherwise circumventing or reproducing the stored encoded information stored or the encryption mechanisms of the SIM card.
q. Signal Enhancements: Installing, deploying, or using any regeneration equipment or similar mechanism (e.g., a repeater or signal booster) to originate, amplify, enhance, retransmit, or regenerate a transmitted radiofrequency signal, unless authorized by enTouch Wireless.
r. Miscellaneous: Reselling or leasing the Services; using the Service for commercial activities; using the Services for pager or voicemail retrieval service; engaging in any other conduct that could or does harm or adversely affect our other subscribers, employees, business, reputation, network, property, Services, operations, or any other person; or assisting, facilitating, or allowing anyone else to do or attempt to do any of the above activities.
This Acceptable Use Policy, including the prohibited uses, applies to all enTouch Wireless Service Plans, including plans with unlimited talk, text, and data Allotments. If you use unlimited Allotments for anything other than personal, non-commercial use or engaging in any other unauthorized, excessive, or abusive use, including uses prohibited by this Acceptable Use Policy, we may, at our sole discretion, terminate, suspend, modify, or limit your Services, as discussed in Section 8.
You are responsible for all fraudulent use of your Device and the Services. In the event you discover or reasonably believe your Device or the Services are being used for fraudulent activities, you must immediately notify enTouch Wireless at 1-866-488-8719. In the event enTouch Wireless discovers or reasonably believes your Device or the Services are being used for fraudulent activities, enTouch Wireless may take action to prevent such fraudulent activities from taking place, including the termination, suspension, modification, or limitation of your Services, as discussed in Section 8.
Always use your Device in a safe manner that does not create a risk to your safety or the safety of others around you. While driving, use a hands-free mechanism for your wireless device and do not use your wireless Device to send text messages.
You agree that a violation of this Acceptable Use Policy harms enTouch Wireless, which cannot be fully redressed by money damages, and that we shall be entitled to immediate injunctive relief in addition to all other remedies available without the requirement to post a bond. If you want to report any violations of this Acceptable Use Policy, please email us at info@enTouchwireless.com.