Acceptable Use Policy

This Acceptable Use Policy (AUP) constitutes part of the Client Service Agreement (CSA) between Panasonic Canada Inc. (PCI) and the Client (Client).

This AUP describes acceptable use of and access to the Services and any devices and/or equipment used with the Service. By accessing or using the Services, the Client agrees to the terms of this AUP. If the Client violates this AUP or authorizes or helps others to do so, PCI may suspend or terminate use of the Services immediately.

PCI may report any activity that it suspects violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. PCI’s reporting may include disclosing appropriate Client information. PCI may also cooperate with appropriate law enforcement agencies, regulators, or other appropriate third parties to help with the investigation and prosecution of illegal conduct by providing network and systems information related to alleged violations of this AUP.

PCI may, in its sole and absolute discretion, modify this AUP from time to time. If Client objects to any such changes, Client’s sole recourse shall be to cease using the Services. Continued use of the Services following any such changes shall indicate Client’s acknowledgement of such changes and agreement to be bound by the terms and conditions of such changes.


The Client shall not and shall not allow or enable anyone to:

  1. Use the Services for chat lines or long distance calls made using call forwarding and three-way calling features;
  2. Use the Service for call centre, call back, call sell (telemarketing)or debit card services;
  3. Use the Service for bulk faxing;
  4. Use the Service for multi-party conference call or party lines, unless the Client has subscribed to a PCI conferencing service;
  5. Upload content or use the Services in a manner that PCI believes:
    1. Violates any local, provincial, national, foreign, or international statute, regulation, rule, order, treaty, or other law (each a Law), including but not limited to, the Digital Millennium Copyright Act, or those Laws concerning child pornography and illegal gambling;
    2. Is abusive, deceptive, pornographic, obscene, defamatory, slanderous, offensive, or otherwise inappropriate;
    3. Violates or otherwise encroaches on the rights of others, including, but not limited to, infringing or misappropriating any intellectual property or proprietary right of another;
    4. Advocates or induces illegal activity;
    5. Stalks, harasses, or harms anyone, including minors;
    6. Impersonates any person or entity or otherwise misrepresents Client’s affiliation with a person or entity;
    7. Modifies, alters, tampers with, repairs, or otherwise creates derivative works of any software included in the Services (except to the extent software included in the Services is provided to Client under a separate license that expressly permits the creation of derivative works);
    8. Except as allowed by local law, reverse engineers, disassembles, or decompiles the Services or software included in the Services;
    9. Access or uses the Services in a way intended to avoid incurring fees or exceeding usage limits or quotas;
    10. Interferes with or disrupts the Services or servers or networks connected to the Services;
    11. Uses any high volume automated means (including robots, spiders, scripts or similar data gathering or extraction methods) to access the Services or any other accounts, computer systems, or networks connected to the Services (each a System);
    12. Attempts to gain unauthorized access to any portion of the Services or any System, whether through hacking, password mining, or any other means;
    13. Violates the security or integrity of a System, including, but not limited to:
      1. Accessing or using any System without permission, including attempts to probe, scan, or test the vulnerability of a System or to breach any security authentication measures used by a System;
      2. Monitoring data or traffic on a System without permission;
      3. Forging packet or email headers, or any part of a message describing its origin or route;
      4. Uploading content that contains viruses, worms, corrupt files, Trojan horses, or other forms of corruptive code, or any other content that may compromise the Services; or
      5. Hacking, destabilizing, or adapting the Services, or altering another website to falsely imply it is affiliated with the services;
    14. Connects to any users, hosts, or networks where Client does not have permission to communicate with such users, hosts, or networks, including but not limited to:
      1. Monitoring or crawling a System so that such System is impaired or disrupted;
      2. Conducting denial of service attacks;
      3. Intentionally interfering with the proper functioning of any System; including any deliberate attempt to overload a system by any means;
      4. Operating network services like open proxies, open mail relays, or open recursive domain name servers; or
      5. Using means (manual or electronic) to avoid any use limitations placed on a System, such a access and storage restrictions;
    15. Distributes, publishes, sends, or facilitates unsolicited mass e-mailings, promotions, advertising, or solicitations, including commercial advertising and informational announcements;
    16. Alters or obscures mail headers or assume a sender’s identity without the sender’s explicit permission; or
    17. Collects replies to messages if those violate this AUP.
  6. Use the Services to invade another person’s privacy; appropriate another person’s personality; unlawfully promote or incite hatred;
  7. Post, transmit, distribute, disseminate, upload or download content which is unlawful, threatening, harassing, abusive, libelous, slanderous, defamatory or otherwise offensive or objectionable or encouraging conduct that would constitute a criminal offence, give rise to civil liability, or otherwise violate any municipal, provincial, federal or international law, order, rule or regulation;
  8. Use the Services to access any computer systems, software, data or any confidential copyright protected or patent protected material or personal information of any other person without the knowledge and consent of such person, make unauthorized attempts to gain access to any account or computer resource not belonging to the Client (engage in ‘hacking’, ‘spoofing’, ‘phishing’, ‘carding’ or ‘pharming’) or otherwise gain unauthorized access to, alter or destroy any information of another person by any means or device;
  9. Use the Services to upload, post, publish, deface, modify, transmit, reproduce, or distribute in any way, information, software or other material which is confidential, protected by copyright or other intellectual, property or proprietary right, or related derivative works, without obtaining permission of the copyright owner or right holder;
  10. Disrupt PCI’s network, or the nodes or services thereof, or directly or indirectly, use the Services to restrict, inhibit or otherwise interfere with the ability of any other person to use or enjoy the use of the products or Services of PCI or the Internet, including, without limitation, knowingly posting or transmitting any information or software which contains a virus, lock, key, bomb, worm, cancelbot, Trojan horse or other harmful, debilitating or disruptive feature or engage in unauthorized linking or framing (‘denial of service attack’);
  11. Send any unsolicited communication (engage in ‘spamming’), including but not limited to sending large quantities of unwanted or unsolicited email (engage in ‘mail bombing’) or VoIP messages to individual email or VoIP accounts (engage in ‘voicecasting’), attempt to overload a system (engage in ‘flooding’), participate in broadcast attacks, interfere howsoever with Service to or by any user, host or network, engage in counterfeit, subterfuge or malicious activities (including ‘splogging’), make inappropriate postings to news groups, send false commercial messages or engage in any other abuse of email or news group servers or otherwise interfere howsoever with the provision by PCI of any of its Services to any other of its customers;
  12. Obtain or attempt to obtain products or services from PCI or anyone else by any means or device with intent to avoid payment therefor;
  13. Unless permitted by the CSA, sell, resell or make, directly or indirectly howsoever, any of the products or services received from PCI available to any third party. The Client shall not permit any third party to gain access to the termination equipment of PCI. The Client shall not permit any third party to gain access to the termination equipment of the Client for the purpose of obtaining access to PCI’s network for the purpose of obtaining any of the products or services of PCI, whether directly or indirectly;
  14. Engage in any activities that deny, disrupt or misdirect Service to or use of Service by any customer or end-user of PCI;
  15. Engage in account sharing, including, without limiting the generality of the foregoing, permitting third parties to use the Client’s account or password
  16. Use the Services for simultaneous sessions using the same User ID or password;
  17. Forge any part of an IP packet header;
  18. Violate any system or network security measures including engaging in unauthorized access or use of PCI’s or a third party’s network, data or information;
  19. Use another sites mail server to relay mail;
  20. Use, intend or attempt to use, or allow the use of the Services contrary to any municipal, provincial, federal or international law, order, rule or regulation;
  21. Use any of the Services contrary to the decisions, orders, policies or other requirements of the Canadian Radio-television and Telecommunications Commission or of any other regulatory body with jurisdiction over the Services, PCI or the Client; or
  22. Engage in any activity which PCI advises the Client is, in the sole and unfettered discretion of PCI, similar to any of the foregoing or is reasonably and generally regarded in the industry to be an unacceptable use of the Services or is otherwise unacceptable use of the Services.

Fair Usage Policy

PCI reserves the right to either immediately suspend the Client’s Services and offer Client an alternative Service plan or terminate Client’s Service if PCI determines, in PCI’s sole and absolute discretion, that Client’s use of the Service or the Equipment is, or at any time was, inconsistent with normal usage patterns or Client exceeds the fair usage limits. In addition, Client will be required to pay PCI’s higher rates for service for all periods in which Client’s use of the Service or the Equipment was inconsistent with normal use or the fair usage limits.