Acceptable Use Policy
Gila River Telecommunications, Inc. Internet Service Acceptable Use Policy and Disclosure Statement
This Acceptable Use Policy (“Policy”) applies to your use of and access to the Gila River Telecommunications, Inc. (“GRTI”) owned or operated networks (“Network”), including electronic transmissions sent, received, posted, accessed, or stored via this Network including, without limitation, data, voice, and messaging services, and Internet services (collectively the “Service” and “Services”). By using the Service, you agree to comply with this Policy. Your use of the Service(s) may be suspended or terminated for violation of this Policy.
You agree to take reasonable precautions to prevent others from gaining unauthorized access to the Services. Except as otherwise specified in this Policy, you are responsible for any unauthorized use and for controlling access to the Services, the Network, your equipment, and licensed software including payment of any charges incurred as a result of any such unauthorized use.
We reserve the right, at our discretion, to update or revise this Policy. Modifications to this Policy will be effective when posted on our website and are available on our website. References to “we” or “our” throughout mean GRTI.
1. Specifically, you may not:
a. Use Service for any illegal or fraudulent activity.
b. Use Service in any manner that could damage, disable, overburden or impair the GRTI website, our Network or Service(s), or in any other way negatively impact GRTI.
c. Attempt to use or gain unauthorized access to data, accounts, hosts, servers, systems or networks of others, nor relay communications through any third-party servers without the GRTI's authorization.
d. Probe, scan or test the vulnerability of our system or Network or attempt to access our Network without our prior consent.
e. Interfere with the Services of another or another's use of Services in any way.
f. Use any forged, false or misleading number identity, email header, invalid or non-existent domain names in email or postings nor employ techniques to hide, obscure or counterfeit the source of e-mail or other posting.
g. Collect or use information without the consent of the owner or use email addresses, screen names or other identifiers without the consent of the person identified.
h. Post or transmit information or communications that, whether explicitly stated, implied, or suggested through use of symbols, are libelous, defamatory, invasive of another person’s privacy, obscene, indecent, pornographic, sadistic, cruel, or racist in content, or of a sexually explicit or graphic nature; or which espouses, promotes, or incites bigotry, hatred, or racism, or might be legally actionable for any reason, or hurts minors in any way;
i. Engage in conduct likely to result in retaliation against our website, Network or Service(s), employees, officers or other agents of GRTI, for example by engaging in behavior that results in any server being the target of a denial of service attack (DoS), IP address blacklisting or other similar acts.
j. Configure your use of Services in a manner that prevents 911 from operating properly.
k. Resell services that are not available for resale or rebroadcast, retransmit, redistribute, or charge admission to view or listen to any content provided over our Services unless you obtain all applicable licenses and authorizations
l. Use the Services to violate email, telemarketing or telecommunication laws or regulations, or in a manner that has a negative effect on our network or service delivery (including, without limitation, by the use of mass dial or pre-recorded calling applications in violation of law or regulation; overloading servers; violating caller-id regulations; causing any portion of our network to be blocked by other network providers; generating unresolved third party complaints or complaints which, in our discretion, impose an unreasonable administrative burden on the company; etc.).
m. Use unauthorized software or devices to maintain continuous active Internet connection when the connection would otherwise have entered idle mode.
2. Additionally, you may not use our Services to upload, attach, create, post, or otherwise distribute or facilitate distribution of any Content that:
a. Violates the intellectual property rights of any third party.
b. Contains viruses, corrupted files, malware, trojan horses, cancelbots, worms, or any other similar software or programs that may damage our Networks or operation of other's computers.
c. Transmits code, files, scripts, agents, or programs that cause harm, including viruses or malware, or using automated means, such as bots designed to gain access to or use the Services.
d. Is unlawful, threatening, abusive, harassing, libelous, defamatory, obscene, deceptive, fraudulent, invasive of another's privacy, discriminatory or tortious.
e. Victimizes, harasses, degrades, or intimidates an individual or group of individuals on the basis of religion, gender, sexual orientation, race, ethnicity, age, disability or any other reason.
f. Has a negative effect on our business, Network, or Service delivery (including, without limitation, overloading servers; causing any portion of our network to be blocked by other network providers; generating unresolved third party complaints or complaints which, in our discretion, impose an unreasonable administrative burden on GRTI).
g. Constitutes unsolicited, duplicative, or unauthorized e-mail (commercial or otherwise).
Should GRTI receive written notice from a copyright holder that you have infringed on their rights, GRTI will follow the procedures outlined in the notice, which may include suspending or terminating your Service to expeditiously remove or disable access to the infringing material.
We reserve the right to take all legal and technical steps available to prevent the foregoing activities from being conducted using the Services, including the right, without prior notice, to monitor content and traffic patterns, perform vulnerability tests on systems residing on our IP address space, or to quarantine servers or Customer accounts if circumstances require. Such testing may include, but is not limited to, testing of mail and Internet servers or proxy servers for unrestricted third-party relaying. Customer may be required to correct any system vulnerability upon notification and/or suspend or terminate operations of a known compromised system. Any failure by us to enforce this Policy in every instance in which it might have application does not amount to a waiver of our rights.
Questions regarding acceptable use should be directed to:
Gila River Telecommunications, Inc.
Attn: General Manager
Box 5015
7065 W Allison Rd
Chandler, AZ 85226
520-796-3333
E-mail: grti@gilanet.net
CONTACT US