For support, please call 502-589-4638 or visit our support portal at https://support.bluegrass.net
Provider’s Wireless Wi-Fi Acceptable Use Policy (“AUP”) with respect to its users for use of Wi-Fi Internet access Services (“Services”) pursuant to this Agreement shall include the following, but the following shall be without limitation of ProviderÂ’s other rights to suspend or terminate access between it and its users for use of the Services that it otherwise possesses pursuant to law.
All users of the Services must agree to and must comply with this AUP. Provider of Services may remove, block, filter, or restrict by any other means the transmission of any material or use of the Services if Provider determines, in its sole discretion, that such transmission or use may be unlawful. Provider will cooperate or may initiate contact with legal authorities and/or third parties in the investigation of any suspected or alleged crime or civil wrong. Provider reserves the right to revoke or cease Services to or for any user.
f. Fraudulent activity: Using the Services to make fraudulent offers to sell or buy products, items, or services or to advance any type of financial scam such as “pyramid schemes,” “Ponzi schemes”, unregistered sales of securities, securities fraud and “chain letters.”
g. Forgery or impersonation: Adding, removing or modifying identifying network, message, or article header information in an effort to deceive or mislead is prohibited while using the Services. Attempting to impersonate any person by using forged headers or other identifying information is prohibited. The use of anonymous remailers or nicknames does not constitute impersonation.
h. Unsolicited commercial email/Unsolicited bulk email: Using the Services to transmit any unsolicited commercial email or unsolicited bulk email. Activities that have the effect of facilitating unsolicited commercial email or unsolicited bulk email, whether or not that email is commercial in nature, are prohibited. Using deliberately misleading headers in e-mails sent to multiple parties is prohibited.
i. Unauthorized access: Using the Services to access, or to attempt to access without authority, the devices of others, or to penetrate, or attempt to penetrate, security measures of another entity’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.
j. Copyright or trademark infringement: Using the Services to transmit any material (by email, uploading, posting, or otherwise) that infringes any copyright, trademark, patent, trade secret, or other proprietary rights of any third party, including, but not limited to, the unauthorized copying of copyrighted material, the digitization and distribution of photographs from magazines, books, or other copyrighted sources, and the unauthorized transmittal of copyrighted software.
m. Network disruptions and unfriendly activity: Using the Services for any activity, which adversely affects the ability of other people or systems to use the Services or the Internet. This specifically but without limitation includes excessive consumption of network or system resources whether intentional or unintentional. This also includes “denial of service” (DoS) attacks against another network host or individual user. Interference with or disruption of other network users, network services or network equipment is prohibited.
n. High volume, server hosting, and non-traditional end user activities: High volume data transfers via the Services, especially sustained high volume data transfers, are prohibited. High volume data transfer is defined to be 512kbps (kilobits per second) or more sustained for 30 minutes or more OR a total transfer of over 200MB (megabytes) in one session. Hosting a web server, IRC server, or any other server also is prohibited. Accordingly, Provider maintains the right to terminate any user’s connection following the detection of any high volume data transfer, server hosting, or non-traditional end user activity as determined by Provider.