www.comcast.net/terms/use.jsp
It is Comcasts intent to provide our customers with the best cable Internet service possible. In order to accomplish this task, we have adopted this Acceptable Use Policy the AUP or Policy. This Policy outlines acceptable use of the Comcast High-Speed Internet service the Service, as well as permissible and prohibited conduct for using the Service to access the Internet. This Policy, including its customer use restrictions, is in addition to the restrictions contained in the Comcast High-Speed Internet Subscriber Agreement the Subscriber Agreement. All capitalized terms used in this AUP that are not defined here have the meanings given to them in the Subscriber Agreement. It is the responsibility of all Comcast High-Speed Internet customers and all others who have access to Comcasts network customer, you, or your, to comply with this AUP and all Comcast policies. As a Service customer, it is your responsibility to secure your computer equipment so that it is not subject to external threats such as viruses, spam, and other methods of intrusion. Failure to comply with these or any other Comcast policies could result in the suspension or termination of your Service. If you do not agree to comply with all of these policies including the AUP, you must immediately stop use of the Service and notify Comcast so that your account may be closed. Note: Comcast reserves the right to immediately terminate the Service and the Subscriber Agreement if you engage in any of the prohibited activities listed in this AUP or if you use the Comcast Equipment or Service in a way which is contrary to any Comcast policies or any of Comcasts suppliers policies. You must strictly adhere to any policy set forth by another service provider accessed through the Service. Prohibited Uses and Activities Prohibited uses include, but are not limited to, using the Service, Customer Equipment, or the Comcast Equipment to: i undertake or accomplish any unlawful purpose.
Security You are responsible for any misuse of the Service, even if the misuse was committed by a friend, family member, or guest with access to your Service account. Therefore, you must take steps to ensure that others do not use your account to gain unauthorized access to the Service by, for example, strictly maintaining the confidentiality of your Service login and password. In all cases, you are solely responsible for the security of any device you choose to connect to the Service, including any data stored or shared on that device. Comcast recommends against enabling file or printer sharing of any sort unless you do so in strict compliance with all security recommendations and features provided by Comcast and the manufacturer of the applicable file or printer sharing devices. Any files or devices you choose to make available for shared access on a home LAN, for example, should be protected with a strong password or as otherwise appropriate. Neither Comcast nor any of its affiliates, suppliers, or agents have any obligation to monitor transmissions or postings including, but not limited to, e-mail, newsgroup, and instant message transmissions as well as materials available on the Personal Web Pages and Online Storage features made on the Service. However, Comcast and its affiliates, suppliers, and agents have the right to monitor these transmissions and postings from time to time for violations of this Policy and to disclose, block, or remove them in accordance with the Subscriber Agreement and any other applicable agreements and policies. Electronic Mail The Service may not be used to send unsolicited bulk or commercial messages and may not be used to collect responses from unsolicited e-mail sent from accounts on other Internet hosts or e-mail services that violate this Policy or the acceptable use policy of any other Internet service provider. Moreover, unsolicited e-mail may not direct the recipient to any Web site or other resource that uses the Service. Activities that have the effect of facilitating unsolicited commercial e-mail or unsolicited bulk e-mail, whether or not the e-mail is commercial in nature, are prohibited. Forging, altering, or removing electronic mail headers is prohibited. You may not reference Comcast or the Comcast network eg by including Organization: Comcast in the header or by listing an IP address that belongs to Comcast or the Comcast network in any unsolicited e-mail even if that e-mail is not sent through the Comcast network or Service. Comcast is not responsible for forwarding e-mail sent to any account that has been suspended or terminated. This e-mail will be returned to the sender, ignored, deleted, or stored temporarily at Comcasts sole discretion. In addition, Comcast may at any time reserve any identifiers on the Service for Comcasts own purposes. Newsgroups Messages posted to newsgroups must comply with the written charters or FAQs for those newsgroups as well as any other terms and conditions applicable to any particular newsgroups or provider of newsgroups. Advertisements, solicitations, or other commercial messages should be posted only in those newsgroups whose charters or FAQs explicitly permit them. You are responsible for determining the policies of a given newsgroup before posting to it. Comcast reserves the right to discontinue access to any newsgroup at any time for any reason. Comcast permits users of the Service to download a maximum of one gigabyte 1GB of newsgroup content in any one month, unless users are subject to a Service plan that permits downloading more newsgroup content. Instant Messages Users alone are responsible for the contents of their instant messages and the consequences of any instant messages. Comcast assumes no responsibility for the timeliness, mis-delivery, deletion or failure to store instant messages. Personal Web Page and File Storage As part of the Service, Comcast provides you with access to personal Web pages and storage space through the Personal Web Pages and Online Storage features collectively, the Personal Web Features. You are solely responsible for any information that you or others publish or store on the Personal Web Features. You must ensure that the intended recipient of any content made available through the Personal Web Features is appropriate. For example, you must take appropriate precautions to prevent minors from receiving or accessing inappropriate content. Comcast reserves the right to remove, block, or refuse to post or store any information or materials, in whole or in part, that it, in its sole discretion, deem to be offensive, indecent, or otherwise inappropriate regardless of whether this material or its dissemination is unlawful.
For purposes of this Policy, material refers to all forms of communications including narrative descriptions, graphics including photographs, illustrations, images, drawings, logos, executable programs and scripts, video recordings, and audio recordings. Comcast may remove or block content contained on your Personal Web Features and terminate your Personal Web Features and/or your use of the Service if we determine that you have violated the terms of this Policy. Network, Bandwidth, Data Storage and Other Limitations You must comply with all current bandwidth, data storage, and other limitations on the Service established by Comcast and its suppliers. In addition, you may only access and use the Service with a dynamic Internet Protocol IP address that adheres to the dynamic host configuration protocol DHCP. You may not access or use the Service with a static IP address or using any protocol other than DHCP unless you are subject to a Service plan that expressly permits otherwise. You must ensure that your activity including, but not limited to, use made by you or others of any Personal Web Features does not improperly restrict, inhibit, or degrade any other users use of the Service, nor represent in the sole judgment of Comcast an unusually large burden on the network. In addition, you must ensure that your activities do not improperly restrict, inhibit, disrupt, degrade or impede Comcasts ability to deliver the Service and monitor the Service, backbone, network nodes, a...
|