Acceptable Use Policy – Triton Networks Internet and Network Usage
Including CyberSecurity waiver
Triton Networks, LLC and its affiliates and subsidiaries (“Triton,” “we,” or “us”) appreciate the opportunity to provide you with a connection to the Internet. This Acceptable Use Policy, together with the terms and conditions for your Internet service, provide guidelines for your conduct on the Internet as a Triton customer.
By using Triton’s Internet services, you agree to comply with this Acceptable Use Policy and to remain responsible for all activity originating from your account. We reserve the right to modify this Acceptable Use Policy from time to time, effective when posted to https://tritonnet.com. Your use of the Internet services after changes to the Acceptable Use Policy are posted shall constitute acceptance of any changed or additional terms.
This Acceptable Use Policy applies to Triton’s data services that provide (or include) access to the Internet, including but not limited to dialup, Broadband DSL, dedicated, data center services, managed security, and cloud firewall services, or that are provided over the Internet or wireless data networks (collectively “Internet services”).
For ease of reference, this policy addresses the following topics:
- Section 1: Prohibited Activities
- Section 2: Consequences for Activities in Violation of this Policy
- Section 3: Privacy
- Section 4: Account Usage
- Section 5: Cybersecurity Waiver
- Section 6: Copyright Complaints
Section 1: Prohibited Activities
It shall be a violation of this Acceptable Use Policy to use our Internet service in any way that is unlawful, harmful to or interferes with use of our network or systems, or the network of any other provider, violates the policies of any network accessed through our Internet service, interferes with the use and enjoyment of services received by others, infringes intellectual property rights, results in the publication of threatening material, or constitutes Spam/E-mail/Usenet abuse, a security risk or a violation of privacy.
If you have any questions regarding this Acceptable Use Policy or wish to report a suspected violation of this policy, you may contact your account representative or email us at email@example.com, attention Internet AUP.
Intellectual Property Rights
Triton’s Internet services shall not be used to host, publish, submit/receive, upload/download, post, use, copy or otherwise reproduce, transmit, re-transmit, distribute or store any content/material or to engage in any activity that infringes, misappropriates or otherwise violates the intellectual property rights or privacy or publicity rights of Triton or any individual, group or entity, including but not limited to rights protected by any intellectual property right.
Triton’s Internet services shall not be used to host, publish, submit/receive, upload/download, post, use, copy or otherwise reproduce, transmit, re-transmit, distribute or store child pornography. Suspected violations of this prohibition may be reported to Triton at the following e-mail address: firstname.lastname@example.org. If Triton receives a complaint of child pornography regarding your use of Triton’s Internet services and child pornography is apparent in the complaint, we will terminate your Internet service immediately. Further, we will report the complaint, any images received with the complaint, your subscriber information, including your screen name or user identification, your location, your IP address, and the date, time and time zone that the images were transmitted to the National Center for Missing and Exploited Children and to any applicable law enforcement agency.
E-mail and Related Services
Spam/E-mail or Usenet abuse is prohibited using Triton’s Internet services. Examples of Spam/E-mail or Usenet abuse include, but are not limited to the following activities:
- Sending a harassing e-mail, whether through content, frequency, or size
- Sending the same (or substantially similar) unsolicited e-mail message to an excessive number of recipients
- Sending multiple unwanted e-mail messages to the same address, or sending any e-mail that provokes a complaint to Triton from the recipient
- Continuing to send e-mail to a specific address after the recipient or Triton has requested you to stop
- Falsifying your e-mail or IP address, or any other identification information
- Using e-mail to originate chain e-mails or originate or forward pyramid-type schemes
- Using a mail server to relay or intercept e-mail without the express permission of the owner
- Placing your web site address, which you have hosted through Triton, on unsolicited commercial messages
- Sending e-mails, files or other transmissions that exceed contracted for capacity or that create the potential for disruption of Triton’s network or of the networks with which Triton interconnects, by virtue of quantity, size or otherwise
- Sending unsolicited mass or commercial e-mail (“spamming”) for any purpose whatsoever. Mass or commercial e-mail may be sent only to recipients who have expressly requested receipt of such e-mails, by the sending of an e-mail request to the person performing the mass or commercial mailings. This exchanging of requests, acknowledgements, and final confirmations (commonly referred to as a “double opt-in” process) must be adhered to in its entirety for any mass or commercial e-mail to be considered “solicited.” If you send mass or commercial e-mail, you must maintain complete and accurate records of all e-mail subscription requests, specifically including the e-mail and associated headers sent by you. Subscriptions that do not have a specific recipient-generated e-mail request associated with them are invalid and are strictly prohibited. A violation of the CAN-SPAM Act will be considered a violation of this policy.
- Newsgroup spamming or cross-posting the same (or a substantially similar) article to multiple Newsgroups; Many Newsgroups prohibit posting of commercial advertisements or solicitations. Usenet policy prevents off-topic posting of articles. You are required to comply with both Newsgroup(s) and Usenet’s policies. We reserve the right to restrict access to any Newsgroups.
- Using an Internet Relay Chat (“IRC”) bot, or violating any policy of an IRC server, including use of IRC-based telephony and video conferencing. It is your responsibility to determine the acceptable use policies for any IRC server to which you connect. We reserve the right to restrict access to IRC services.
Hacking and Attacks
Hacking or attacking is prohibited using Triton’s Internet services. Hacking is any unauthorized attempt to monitor access or modify computer system information or interference with normal system operations, whether this involves Triton equipment or any computer system or network that is accessed through our service. Attacking is any interference with Internet service to any user, host or network, including mail bombing, ping flooding, broadcast attempts or any attempt to overload a system to interrupt service. Examples of hacking and attacking include, but are not limited to the following:
- Satan or port scans, full, half, FIN or stealth (packet sniffing)
- SubSeven port probes
- BO scans or attacks
- Mail host relaying, mail proxying, or hi-jacking
- Telnet, FTP, Rcommands, etc. to internal systems
- Attempts to access privileged or private TCP or UDP ports
- Multiple and frequent finger attempts
- User ID/Password cracking or guessing schemes
- Virus, worms and Trojan horse attacks
- Smurf, teardrop and land attacks
- Participation in botnets, including but not limited to, spam e-mail messages, viruses, computer/server attacks, or committing other kinds of crime and fraud
To preserve the integrity of our network, we implement reasonable network management practices to ensure that all customers have an enjoyable experience using the Internet. Triton’s Internet services shall not be used in a manner that is excessive or unreasonable with respect to frequency, duration or bandwidth consumption when compared to the predominant usage patterns of other customers on a similar service plan or in your geographic area. As technology and customer usage change, Triton reserves the right to adjust its determination of excessive or unreasonable use. Triton reserves the right to terminate service that it determines is excessive or unreasonable or to implement charges for excessive or unreasonable usage in its sole discretion. I n the event Triton determines, in its sole discretion, a customer’s usage is excessive or unreasonable, Triton will make reasonable efforts to provide customer with notice prior to taking any action regarding customer’s service.
Section 2: Consequences for Activities in Violation of this Policy
Suspension and Termination
Triton has the right, in its sole discretion, with or without notice, to suspend or terminate your account when you engage in any conduct that violates Triton’s Terms and Conditions (which includes this policy, your written contract with Triton, if applicable, or any other Triton policy applicable to the service) at https://tritonnet.com/terms-and-conditions-of-service/. We will make reasonable efforts to contact you if you are in jeopardy of suspension or termination; however, to protect our network and our customers, we reserve the right to block you first and subsequently contact you. We also reserve the right to cancel e-mail messages and/or restrict the size of e-mail distribution lists.
You agree to be responsible and pay for any activities that result in damages and/or administrative costs to us or our customers. These damages include but are not limited to the following: system shutdowns, retaliatory attacks or data flooding, and loss of peering arrangements. Damages may be as follows:
- Legal fees, subject to a minimum fee of $500
- Activation fee or further deposits to reconnect suspended services
- Simultaneous login (Dial-up services); $1.00 per hour. One-hour minimum charge; time exceeding the first hour will be rounded up to the next hour. Each simultaneous login will be treated as a separate instance of billing.
- Unsolicited bulk e-mail (spam clean-up): You will be charged $300 + $5 per message sent + $100 per complaint received by Triton.
Triton reserves the right to modify its rates any time and will provide notice through this policy.
Section 3: Privacy
Any information transmitted through the Internet, including information about you, can be intercepted by unwanted third parti es. There is no guarantee that you or Triton can prevent this. We provide certain security measures to reduce the risk that information about you is intercepted by others.
To protect your privacy, we:
- use security techniques designated to prevent unauthorized access of information about you.
- will honor your requests to remove your name from e-mail solicitation lists.
- do not collect personally identifiable information about you unless you provide it to us.
- do not sell the names and addresses of our customers, or visitors to our sites, to others without providing information of that disclosure when the personally identifiable information is collected.
- do not provide customer information to other companies with which we do business without an understanding that they will respect your privacy.
Triton can help you safeguard your family online. Triton has partnered with industry leading experts to offer a robust collection of tools and services regarding Internet security. For more information, visit .
Section 4: Account Usage
Your Triton Internet account may only be used according to your service plan. If your account is not a dedicated account, then it may not be used to provide dedicated services such as e-mail, gaming, or streaming audio or video servers. Dedicated accounts may include, but are not limited to ethernet internet, private networks and dedicated internet access. We have several dedicated service solutions if you desire continuous access to the Internet. We may end an internet session following periods of inactivity to minimize the burden on the network. The use of automated intervention, such as software or hardware devices, for the purpose of maintaining a connection to the service is strictly prohibited.
Personal web space is limited to 10 megabytes per Internet account. Personal web space shall be used for non-commercial use only. Triton reserves the right to restrict access to sites that are being used for commercial use. Commercial web space size is dependent on the web-hosting package purchased by the customer. If a personal page receives an inordinately large number of hits, the owner of said page will have the option of moving the page to our commercial section or remove the page from their home directory.
You are solely responsible for maintaining the confidentiality of your account I.D. and passwords. Subscribers should not provide their login and password for use by others outside of their immediate business or household. You must notify us immediately if your account I.D. and/or password have been lost, stolen, or otherwise compromised. Simultaneous use of our service by multiple users with a single login and password is not allowed. Reselling or sharing, in whole or in part, access to your Internet account or Internet connectivity without our expressed written consent is prohibited.
Triton is not a software licensor, and the license agreement for your Internet software is not a part of your service agreement with us. This means that your software license agreement may either remain in effect or terminate independently from your Internet service.
We are not responsible for technical support or the integrity of any files or software that you obtain from any other source. It is your responsibility to determine whether any software that you intend to use, including any program that you intend to download from the Internet, is compatible with your computer and can be installed correctly and safely. We strongly recommend that you review the documentation accompanying any software before you attempt to install it.
Section 5: Cybersecurity Waiver
Triton takes certain precautions within Triton’s network to prevent malicious activities. Every internet connection should be behind a firewall, and the firewall should be properly configured to disallow any malicious activity and/or access to potentially malicious sites. Triton strongly recommends the same to any customer purchasing network services or devices from or through Triton. Further, Triton recommends a strong AUP agreement for each of its employees, outlining the Company’s restrictions on internet usage, and training on recognition of common internet pitfalls and how to avoid malicious attacks.
Triton offers network management and monitoring services, as well as network devices such as firewalls, routers, SDWAN and similar devices. In order to provide for proper alerting and a timely response to security problems or issues, the client’s network devices must include the proper precautionary configurations to prevent these malicious attack attempts.
When these security precautions and recommendations are not adhered to, and if the client’s network is open for potential threats, the client hereby knowingly release Triton, its vendors and its employees from any liability or legal responsibility from malicious attacks. Client will bear sole liability and legal, financial, and regulatory responsibility for any and all network security issues, including but not limited to hacking, breaches, malware or ransomware.
Section 6: Copyright Complaints
The Digital Millennium Copyright Act of 1998 (“DMCA”) provides recourse for owners of copyrighted material who believe their rights under U.S. copyright law have been infringed on the Internet or other telecommunications networks.
As a provider of transitory digital communications, Triton’s activities are typically by a safe harbor provision of the DMCA (see 17 U.S.C. 512 (a)). Triton is therefore not obligated to respond to a copyright owner (or the owner’s agent) nor does Triton have a duty to remove or disable access to material transmitted, routed or connected to the Triton network(s) that is initiated and/or directed by an individual user.
If you believe that Triton has infringed your copyrighted work in a way that does not fall within the applicable DMCA safe harbor provision, please provide notice to our Designated Copyright Agent at the address below. The notice must include the following information as required by the DMCA (see 17 U.S.C. 512 (c)(3)). In addition, the notice should include the basis for your belief that Triton is not merely providing transitory digital communications under 17 U.S.C. 512 (a) of the DMCA:
- A physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed;
- Identification of the copyrighted work claimed to have been infringed, or, if multiple copyrighted works at a single online site are covered by a singled notification, a representative list of such works at that site;
- Identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provided to locate the material;
- Information reasonably sufficient to permit the service provider to contact the complaining party, such as address, telephone number, and, if available, an electronic mail address at which the complaining party may be contacted;
- A statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law;
- A statement that the information in the notification is accurate and under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
The Designated Copyright Agent for Triton may be reached as follows:
Triton Networks, LLC
12655 N Central Expy, Suite 500
Dallas, TX 75243
Attention: Designated Copyright Agent
By email: email@example.com
If a copyright infringement notice has been wrongly filed against you because of a mistake or a misidentification of the material, you may file a counter notification with our Designated Copyright Agent at the address noted above. The counter notification must provide the following information:
- Physical or electronic signature of the subscriber;
- Identification of the material that has been removed or to which access has been disabled and the location at which the material appeared before it was removed or access to it was disabled;
- A statement under penalty of perjury that the subscriber has a good faith belief that the material was removed or disabled because of mistake or misidentification;
- The subscriber’s name, address, telephone number and e-mail address, and a statement that the subscriber consents to the jurisdiction of the Federal District Court for the judicial district in which the address is located, or if the subscriber’s address is outside of the United States, for any judicial district in which the service provider may be found, and that the subscriber will accept service of process from the person who provided notification or an agent of such person.