Legal

Acceptable Use

You may use your account for communications, research, public relations, education, and entertainment. This statement describes certain uses which are consistent with the purposes of the Internet. It is not intended to exhaustively list all such possible uses or abuses. We expect our customers to respect the culture and civility of communications and discourse on or through the Internet. We expect our customers to maintain respect for privacy, legal issues, and courtesy to other users and network resources.

Ethical guidelines

We expect you to:

1) Obey all federal and state laws regarding your use of the Internet and information obtained or transmitted through our network.
2) Respect the ownership of information including copyright and license agreements. Please read copyright policies and procedures listed on the other side of this form.
3) Be courteous in your use of the Internet and network resources.

Legal Issues

You may NOT use your account:

1) For any purpose which violates US Federal or State Laws.
2) To interfere with or disrupt network users, services or equipment including distributing unsolicited advertising, propagating computer worms or viruses, and using the network to make unauthorized entry to other computational, information, or communications devices or resources. It is illegal to attempt to access the computer systems of individuals or organizations without authorization. Such attempts are subject to service termination and prosecution. Such behavior is not condoned by Bloomer. Individuals are encouraged to utilize hardware/software security measures as appropriate.
3) To transmit threatening, obscene, or harassing materials.
4) It is prohibited to resell any of Bloomer’s bandwidth without exception, as a Gaming, Web or email server behind our connection.

Network Integrity of Efficiency

You may NOT use your account:

1) In a manner that precludes or significantly hampers its use by others.
2) To send messages likely to result in the loss of recipients’ work or systems.
3) To intentionally develop programs that harasses other users or infiltrates a computer or computing system and/or damage or alter the software components of a computer or computing system.