EPCOM GLOBAL NETWORKS TERMS

ACCEPTABLE USE POLICY

This document outlines the acceptable use policy for a comprehensive guide on appropriate usage and conduct when interacting with hosting, products, and services. 

The Acceptable Use Policy establishes crucial rules and expectations to ensure a secure and efficient environment for all users.

ACCEPTABLE USE POLICIES

DEFINITION AND PURPOSE

This Acceptable Use Policy fundamentally outlines what is considered appropriate and what is inappropriate when utilizing our hosting, products, and services. This is meticulously done to safeguard the confidentiality, integrity, and availability of information created, collected, and maintained. 

IMPORTANCE OF COMPLIANCE

Personnel bear the responsibility of complying with Epcom Global Networks’ policies when using Epcom Global Networks’  information resources. Furthermore, the Customer is accountable for its End Users’ compliance with the Epcom Global Networks, and for making its End Users aware of this Acceptable Use Policy. A violation of this Acceptable Use Policy by Customer or any End User may result in Epcom Global Networks opting to suspend Customer’s use of the Services. Personnel found to have violated this policy may face disciplinary action, including termination of employment, and related civil or criminal penalties.

SCOPE OF POLICY

The Epcom Global Networks Acceptable Use Policy broadly applies to any individual, entity, or process that interacts with any Epcom Global Networks Information Resource, encompassing all forms of access to or use. Similarly, the Epcom Global Networks Acceptable Use Policy comprehensively describes rules that apply to any party utilizing products and services provided by Epcom Global Networks Inc. or any of its affiliates, and any user of the Services, including through any products and services offered by the Customer. This ensures a consistent framework for digital conduct across a wide array of interactions.

COMMON VIOLATIONS

TYPES OF VIOLATIONS

Common violations of the Acceptable Use Policy often involve activities that compromise the integrity and security of telecommunications services and networks. Personnel should not purposely engage in activities that may harass, threaten, impersonate, or abuse others, degrade the performance of information resources, or deprive authorized personnel access. Any violation of Epcom Global Networks’ or any third party’s copyright, trademark, proprietary, or other intellectual property rights is also prohibited. Using the Service to violate any rule, policy, or guidelines outlined in the Epcom Global Networks Acceptable Use Policy is a violation.

It’s a significant violation to:

 
Category Prohibited Activities
Unauthorized Access & Security Circumvention
  • Obtain additional resources beyond those allocated.
  • Circumvent computer security measures.
  • Gain unauthorized access to the accounts or computer systems of others.
  • Spoof URL, DNS, or IP addresses.
  • Attempt to penetrate security measures.
Unsolicited Communications & Network Interference
  • Transmit uninvited communications.
  • Engage in “spamming,” “flaming,” or denial of service attacks.
  • Intercept, interfere with, or redirect email messages or other transmissions sent by or to others.
Malicious Content & Inappropriate Conduct
  • Introduce viruses, worms, harmful code, or Trojan horses onto the Internet or network.
  • Post off-topic information on message boards or social networking sites.
  • Engage in conduct that is defamatory, fraudulent, obscene, or deceptive.

CONSEQUENCES OF VIOLATIONS

If a Customer or any End User violates the Acceptable Use Policy, Epcom Global Networks reserves the right to suspend the Customer’s use of the Services. Epcom Global Networks, for instance, expressly reserves the right, in its sole discretion, to deny or restrict Service, or immediately to suspend or terminate Service, and pass on any directly resulting consequences if the use of Service violates the Acceptable Use Policy. This includes situations where Epcom Global Networks believes that circumstances related to an infringement of third-party intellectual property rights warrant such action, demonstrating the broad scope of enforcement.

Violations of company policy can lead to various actions depending on the individual’s role:

 
Violator Type Potential Consequences
Internal Personnel Disciplinary action, including termination of employment, and potentially related civil or criminal penalties.
Vendor, Consultant, or Contractor Removal of access rights, termination of contracts, and applicable civil or criminal penalties.

REPORTING VIOLATIONS

Personnel are obligated to promptly report harmful events or policy violations involving company assets or information to their manager. This ensures that any unauthorized access, interference, or other breaches of acceptable use policies are addressed swiftly. For customers, the violations of this policy, including any prohibited content or electronic communications, may be reported through a designated abuse reporting mechanism, such as their online portal. The Customer further agrees to immediately report any violation of the Epcom Global Networks Acceptable Use Policy to Epcom Global Networks and provide cooperation, as requested by Epcom Global Networks, to investigate and/or remedy that violation. This collaborative approach helps to mitigate the impact of security violations and uphold the integrity of the communication network for all users.

SECURITY VIOLATIONS

UNDERSTANDING SECURITY VIOLATIONS

Security violations encompass a range of harmful events that can compromise the integrity and availability of information resources and facilities. These violations can be categorized as follows:

Violation Type Description
Technology Incidents Specific occurrences that may lead to a failure, interruption, or loss of availability to a company’s Information Resources, potentially impacting telecommunications services.
Data Incidents Any potential loss, theft, or compromise of confidential company information.
Unauthorized Access Incidents Any attempt to gain unauthorized access to a company Information Resource.
Facility Security Incidents Any damage or potential unauthorized access to a company-owned, leased, or managed facility.

PREVENTIVE MEASURES

Personnel must not download, install, or run security programs that reveal or exploit system weaknesses, such as password cracking or packet sniffing utilities, as this constitutes a breach of security protocols. Access to data and programs should only be pursued with explicit authorization, and any attempt to gain unauthorized access is strictly prohibited. All remote connections to internal networks must be made through approved virtual private networks (VPNs) to ensure secure data transmission. Crucially, personnel must not divulge authentication information to third parties, nor share personal authentication details like passwords or security tokens, to prevent unauthorized disclosure.

RESPONSE STRATEGIES

Personnel are required to promptly report harmful events or policy violations involving company assets or information to their manager for rapid intervention. Cooperation with incident investigations, including those initiated by federal or state authorities, is mandatory, underscoring the serious implications of security incidents. If the security of a password is in doubt, immediate modification is required to prevent unauthorized access. 

BEST PRACTICES FOR COMPLIANCE

REGULAR POLICY UPDATES

Epcom Global Networks reserves the right to update this Acceptable Use Policy from time to time to remain relevant and effective in addressing emerging threats in telecommunications, highlighting the dynamic nature of digital security. Such updates may be communicated through reasonable notice, which can include notifications via the Customer’s account, email, or by posting an updated version of this Acceptable Use Policy, making sure that all users are informed of changes. This proactive approach allows organizations to adapt their guidelines for digital conduct, addressing new types of security violations and making sure that the policy continues to align with current laws and regulations regarding the use of the Internet and company resources.

MONITORING AND ENFORCEMENT

Epcom Global Networks reserves the right to log, review, and utilize any information stored on or passing through its Information Resources, enabling proactive identification of potential security violations. All mobile device usage in relation to company Information Resources may be monitored at the discretion of company IT Management, for adherence to policies even on personal devices. Epcom Global Networks, as an Internet service provider, may, but is not required to, monitor user compliance with the terms and conditions of its Acceptable Use Policy, and further reserves the right to pre-screen, refuse, or remove content that violates the law or the agreement, including instances of intellectual property infringement.

EPCOM GLOBAL NETWORKS

9 Fairview Dr, Pawcatuck, CT 06379, United States

service@epcomglobalnetworks.com

+1-855-GO-EPCOM