Acceptable Use Policy for Cloud PBX Services
JNS “Joint Network Systems”, we are committed to delivering exceptional customer service to our Clients. This policy is intended as a general guideline for acceptable use and is not all-inclusive. JNS will use its best judgment and ultimately make the final decision as to what activities are not acceptable.
Violations of this policy whether intentional or unintentional or due to lack of action on your part are cause for immediate Service suspension and if severe enough, Service termination. You will also be held responsible for activities of third parties using your Account or Services by using your login and password. It is very important to always keep your login information secure.
We reserve the right to change this policy at any time and any revisions to this policy will be posted to the JNS Web Site.
Our [JNS] Services may not be used for illegal activities or to support the illegal activities of others. We reserve the right to cooperate with legal authorities in any investigation resulting from suspected illegal activities.
Our [JNS] Services may not be used to threaten or harass others. You may not store, post, or transmit threatening or harassing material or support the threatening or harassment of others.
Our [JNS] Services may not be used to make fraudulent claims or offers to buy or sell goods or services, or to promote pyramid schemes or chain letters.
The following activities are not allowed:
- Sending unsolicited commercial e-mail.
- Sending unsolicited bulk e-mail.
- Sending e-mail bombs.
- E-mail message or header forging.
Excessive or Improper Resource Utilization
The following activities are not allowed:
- Causing excessive or improper CPU utilization which causes service delays or disruptions to others.
- Causing excessive or improper Memory utilization which causes service delays or disruptions to others.
- Causing excessive or improper Network utilization such as sending network traffic or packets for the purposes of disabling, disrupting, attacking, snooping, or harming networks or servers.
- Sending modified Network Packets with the intention of disguising or deceiving or attempting to hide the true identity of any network traffic.
- Distribution of viruses or worms.
- Hacking or attempting to access, modify, or disrupt other servers, systems, or devices without proper authorization.
Note: Using an unreasonable amount of “constant” throughput on the network is not allowed unless you are on a guaranteed bandwidth circuit plan. We may temporarily limit your port speed on a case by case basis in order to ensure optimal performance for other users on the network.
Unlimited Voice Services
JNS “Joint Network Systems” reserves the right to review usage of unlimited minute plans to ensure that you are not abusing such plans. You agree to use the unlimited minute plans for normal voice or fax calls and will not employ methods or devices to take advantage of unlimited plans by using the voice or fax services excessively or for means not intended by JNS. Excessive use will be defined by JNS as use that substantially exceeds the average use for all other JNS unlimited plan customers. Unlimited voice services may not be used for conference calling, monitoring services, data transmissions, transmission of broadcasts or transmission of recorded material. JNS may terminate your service or change your service plan if, in its sole discretion, you are abusing the unlimited minute plan.
Our services may not be used for: auto-dialing; continuous or extensive call forwarding, fax or voicemail broadcasting or blasting.
Our [JNS] services may not be used to: impersonate another person; send bulk unsolicited messages; use robots, data mining techniques, or other automated Devices or programs to catalog, download, store, or otherwise reproduce or distribute information from our Service or use any automated means to manipulate our Service.
Copyright or Trademark Infringement
Our [JNS] services may not be used to store, post, or transmit any material that infringes any copyright, trademark, patent, trade secret or other proprietary rights of any third party, including, but not limited to, the unauthorized copying of copyrighted material, the digitization and distribution of books, music, photographs, or other copyrighted sources, and the unauthorized transmittal of copyrighted software.
Collection of Personal Information
Our [JNS] services may not be used to collect, or attempt to collect, personal information about third parties without their knowledge or consent.
Last Modified on 09/07/2020