Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

System Abuse Policy

System abuse is strictly prohibited. Config.Com Internet services may terminate or modify service immediately and may bill for any resulting support charges if the client engages in system abuse. Following is a list of actions which are defined to be system abuse. This list is non-exclusive; any action about which there is any doubt should be referred to Config.Com Internet services for evaluation. Please report any abuse via This email address is being protected from spambots. You need JavaScript enabled to view it. This e-mail address is being protected from spam bots, you need JavaScript enabled to view it Every minute counts during an abuse attack, so please report as promptly as possible!

Actions which constitute system abuse include, but are not limited to:

* attempting to circumvent user authentication or security of any host, network, or account on Config.Com systems or the Internet at large ("cracking");
* attempting, in any way, to interfere with or deny service to any user or any host on the Internet;
* forging email or USENET posting header information;
* sending large numbers of unsolicited mail messages (i.e. "junk mail"); this includes adding or attempting to add addresses to any mailing list without explicit positive consent of the addressee.
* forwarding or posting "chain letters" (multiple forwarding) of any type;
* posting inappropriate messages to USENET newsgroups e.g., posting large numbers of unsolicited posts indiscriminately ("spamming"), or posting encoded binary files to USENET newsgroups not specifically named for that purpose;
* attempting to cancel, supersede, or otherwise interfere with email or USENET posts other than one's own;
* engaging in harassment, whether through language, frequency, or size of messages;
* using an account at another provider to promote an Config.Com Web site in an abusive manner;
* using a Config.Com account or network connection to collect replies to messages sent from another provider which violate these rules or those of that provider;
* reselling Config.Com services to third parties who do not abide by these guidelines.


This computer network belongs to Config.Com Incorporated and may be used only by Config.Com Corporate employees for work-related purposes only and Config.Com network access subscribers. The Config.Com Corporation reserves the right to monitor use of this network to ensure network security and to respond to specific allegations of employee or subscriber misuse. Use of this network shall constitute consent to monitoring for such purposes. In addition, the Config.Com Corporation reserves the right to consent to a valid law enforcement request to search the network for evidence of a crime stored within the network.

Patrons of the Config.Com Internet services at 124 East Spruce Avenue, Ravenna, Ohio 44266-3048 may not use its computers to access, view, or obtain obscene materials. To ensure compliance with this policy, the Config.Com Internet services reserves the right to record the names and addresses of World Wide Web sites that patrons visit using Config.Com Internet services computers.

Like our Facebook Page

Go to top