Intentional Network Disruptions and Abusive Activity. Using service for any activity that adversely affects the ability of other people or systems to use service or third-party Internet-based resources. This specifically, but without limitation, includes excessive consumption of network or system resources whether intentional or unintentional. This also includes denial of service (DoS) attacks against another network host or individual user. Interference with or disruption of other network users, network services or network equipment is prohibited. The transmission of viruses, malware, or engaging in mail bombing, chat flooding, cybersquatting, and similar unlawful behavior is also prohibited. Attempting to circumvent user authentication or security of any host, network, or account on ITC’s systems or the Internet at large (“cracking”). This includes scanning or probing ports without the consent of the owner of the machine being scanned. Email access may be limited from areas where ITC notices attacks to compromise customer’s accounts. ITC will provide VPN access for basic email access in these areas as needed, or the customer may use their own VPN. ITC strongly recommends customers use Encryption, VPNs, and stronger physical device security when traveling.
Appears in 2 contracts
Sources: Broadband Service Agreement, Broadband Service Agreement