Acceptable use policy

1. ACCEPTABLE USE

The Customer is solely responsible for use of the Services by any of its employees, officers, directors, agents and any other end user of the Services (collectively, the “End Users”). Bell Services may be used only for lawful purposes as defined by the applicable government authorities or jurisdiction where the Services are provided. The Customer agrees to comply, and to ensure that, the End Users comply with the following policies and procedures associated with the use of the Services. The Acceptable Use Policy must be read in conjunction with the terms and conditions set out in the applicable Service Schedule and Agreement. End Users must use the Services only for the intended use as defined in the Agreement and make reasonable efforts to ensure proper security and management controls are used through the Service Term.

2. PROHIBITED PRACTICES

While using the Service, the Customer’s End Users shall not:

  • post, transmit or otherwise distribute information constituting or encouraging conduct that would constitute a criminal offense or give rise to civil liability, or otherwise use the Service in a manner which is contrary to law or would serve to restrict or inhibit any other user from using or enjoying the Service or the Internet;
  • post or transmit messages constituting “commercial electronic messages” or "spam", which includes but is not limited to unsolicited e-mail messages or mail bombing;
  • post or transmit any information or software which contains a virus, "cancelbot", "trojan horse", "worm" or other harmful or disruptive component;
  • Intentionally or negligently inject bad routing information, incorrect DNS information or similar false data into the internet;
  • upload or download, post, publish, retrieve, transmit, or otherwise reproduce, distribute or provide access to information, software or other material which: (i) is confidential or is protected by copyright or other intellectual property rights, without prior authorization from the rights holder(s); (ii) is defamatory, obscene, child pornography or hate literature; or (iii) constitutes invasion of privacy, appropriation of personality, or unauthorized linking or framing;
  • engage in account sharing, including, without limitation, permitting third parties to use your Service account and password;
  • use the Service for simultaneous sessions using the same User ID and Password;
  • violate any system or network security measures including but not limited to engaging in unauthorized access or use of Bell’s or a third party’s network, data or information;
  • monitor Bell or third party’s data, systems or network traffic;
  • interfere with service to any user, host or network including without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks;
  • forge any TCP-IP packet header or any part of the header information in an e-mail or newsgroup posting;
  • use the services without adequate security measures in place, including, but not limited to patching and updating software, implementing passwords on all devices (including but not limited to devices connected to the internet (“Internet of Things Devices”);
  • compromise the operation of Bell Services through the use of Internet of Things Devices;
  • Introduce devices, software or systems that could jeopardize safe operation of these services; or
  • while using an e-mail service, engage in improper use or distribution of e-mail over Bell’s network or the internet.

Sending unsolicited e-mails, including without limitation commercial advertising, to individuals who have not indicated a willingness to receive such messages is prohibited, as is the use of another mail server to relay e-mail.

3. VIOLATION OF ACCEPTABLE USE POLICY

Bell considers the above prohibitive practices to constitute abuse of its service. Therefore, Bell’s terms and conditions of service prohibit these practices. Engaging in one or more of these practices may result in termination or suspension of the offender’s account and/or access to Bell’s services in accordance with the Customer’s agreement with Bell.

Nothing contained in this policy shall be construed to limit Bell’s actions or remedies in any way with respect to any of the foregoing activities. Bell reserves the right to take any and all additional actions it may deem appropriate with respect to such activities which may include audits of the Customer’s use of the Services to ensure compliance to the AUP.

This AUP may be revised at any time without written notice at the sole discretion of Bell Canada.