Acceptable Use Policy
Logic may establish policies and rules from time to time (collectively, the “Policies”) concerning use of the Service, Equipment and materials or services used in connection therewith. Any use of the Services is subject to the Policies, which Policies form part of this Agreement.
Customer agrees not to use the Services for anything other than Customer’s personal use. For greater certainty, Customer may not resell the Services, provide network access or any other part of the Services to any third party. Customer may not transfer the Services without the prior written consent of Logic. Customer shall use all Logic products and services, including the Services, in accordance, and in compliance, with all applicable laws, regulations, and rules.
Customer agrees to use the Services in accordance with the guidelines, instructions and list of acceptable uses provided by Logic at www.logic.ky, which may be updated from time to time. Conduct that violates this policy includes, but is not limited to, the activities in the following list, when such violations involve or use or are handled by Logic’s network or servers:
use of automatic dialing-announcing devices or automatic dialing devices, which are strictly prohibited, initiating or propagating electronic chain letters, and outbound telemarketing, spam, or mass marketing via e-mail that violates good marketing industry practice as set out in any applicable law, regulation, or recognized industry association guidelines;
use of Services in such a way that would violate Logic’s contracts with its service providers;
giving access to an account, through sharing of passwords or otherwise, to any person other than the assigned user or pre-authorized group users for that account;
using the network to gain unauthorized access to any computer system or to purposely install a virus or any other unauthorized program on any computer system;
unauthorized attempts to circumvent data protection schemes or uncover security loopholes, which includes running programs that are designed to identify security loopholes or decrypt intentionally secure data;
knowingly or recklessly performing an act that will interfere with the normal operation of Logic’s computers, peripherals, or network;
deliberately wasting or overloading Logic’s network or server resources, or those of any other system via Logic;
inappropriate or unsolicited mass mailings or talk requests such as multiple mailings to newsgroups, mailing lists or individuals;
inappropriate posting of commercial or inflammatory material to newsgroups not intended or inappropriate for such postings;
forging communications to make them appear to originate from another person; or,
attempting to monitor or tamper with another user’s electronic communications, or reading, copying, changing or deleting another user’s files or software without the express agreement of the other user.