Concito Toll Free 866-898-2624
home    |     about us    |     contact us    |     Affiliates    |     Member Access
56K Dialup   Motiv8   ISDN   Compare Us   Web Hosting   Technical Support   Join Now    

Acceptable Use Policy

Concito Networks Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what Concito Networks expects of them while using the service. All users of Concito Network's Internet services: including those who access any of our Services but do not have accounts, as well as those who pay a service fee to subscribe to the Services, must comply with this AUP and our TOS (Terms of Service).

Use of Concito Networks Service constitutes acceptance and agreement to Concito Network's AUP as well as Concito Network's TOS (Terms of Service).

Concito Networks strives to provide its customers with the highest quality Internet service available and at the same time respect the standards that have been created within the Internet community. To that end, Concito Networks believes that certain activities and conduct is inappropriate or abusive and will not be tolerated on the Concito Networks network.

Concito Networks supports the uncensored flow of information and ideas over the Internet and does not actively monitor subscriber activity under normal circumstances. Similarly, we do not exercise editorial control over the content of any web site, e-mail transmission, newsgroups, or other material created or accessible over or through the services. However, in accordance with our TOS (Terms of Service), we may remove any materials that, in our sole discretion, may be considered or thought to be illegal, may subject us to liability, or which may violate this AUP. Concito Networks will cooperate with legal authorities and/or third parties in the investigation of any suspected or alleged crime or civil wrongdoing. An alleged violation of this AUP may result in the temporary suspension of any and/or all services on your Concito Networks account WITHOUT PRIOR NOTICE pending an investigation into the matter. At the conclusion of the investigation, if it is determined that the violation is legitimate, your account with Concito Networks may be terminated or other actions may be taken as detailed in this AUP. If it is determined that the alleged violation was illegitimate, service will be restored promptly.


The following activities constitute violations of this AUP:
  1. Dialup Access: Concito Networks works hard to provide our dialup users with the best possible access across traditional POTs and ISDN lines. To that end, users are expected to use the service in a reasonable manner including but not limited to e-mail, newsgroups, file transfers, Internet chat, online games, and browsing the World Wide Web. High vloume or commercial use including but not limited running a server of any sort is strictly prohibited. Concito Networks will periodically review connections and terminate those connections which have not been actively passing traffic for a period of time. Any attempt by the user to circumvent this policy may result in a significant up charge on the user's bill. A dialup account is intended for use by one user, simultaneous login attempts from multiple users is not allowed unless it's an ISDN account

  2. Inappropriate Use of Software: Use of software or any device that would facilitate a continued connection on a dialup service, i.e. automated ping programs, while using Concito Networks services could result in suspension of service.

  3. Your FREE Personal Web Page: Most Concito Networks access accounts include FREE personal web space. Concito Networks does not routinely monitor the contents of your personal web page(s) or the network transfer that originates from such. Your are solely responsible for any information contained on your personal web page(s). However, if complaints are received regarding language, content or graphics contained on your personal web page(s), Concito Networks may, at its sole discretion, remove the personal web page(s) hosted on Concito Networks servers and revoke your access to that space.

    You may not use your personal web site to publish material, which Concito Networks determines, at its sole discretion, to be unlawful, indecent or objectionable. For purposes of this policy, "material" refers to all forms of communications including narrative descriptions, graphics (including photographs, illustrations, images, drawings, logos), executable programs, video recordings, and audio recordings. NO ADULT orientated material may be stored in your personal web space or displayed on your personal web page(s).

    This space should not be used for commercial activities. Limited server side scripting is supported, i.e.: CGI, PERL, PHP. Client side scripting may be used at your discretion, however, Concito Network's phone support will not provide in-depth support for any of the above listed services. If you feel you need additional services such as administrative control over your domain, greater scripting capabilities, and your own domain name then please consider our hosting packages starting at just $10/month. If you need more in-depth support with your scripts you may decide to take advantage of our web consulting services. Inquiries should be sent to

    Note: Web sites for SOHO (Small Office, Home Office) based businesses will be permitted provided that they do not receive excessive traffic. We want you to get the best possible use out of your FREE web space. If your traffic becomes problematic or excessive, we will ask that it be removed or that you purchase a domain hosting account to better suit your needs. As always, your site will be subject to all other provisions of this AUP and TOS.

  4. Hosted Domain Account: You may not use your hosted domain site to publish material, which Concito Networks determines, at its sole discretion, to be unlawful, indecent or objectionable. For purposes of this policy, "material" refers to all forms of communications including narrative descriptions, graphics (including photographs, illustrations, images, drawings, logos), executable programs, video recordings, and audio recordings. NO ADULT orientated material may be stored in your hosted domain site or displayed on your hosted domain pages.

    If you feel your site is of a questionable nature, please contact us before you sign up and we can discuss your intentions.

  5. Illegal use: Use of the Concito Networks service to transmit any material (by e-mail, uploading, posting or otherwise) that, intentionally or unintentionally, violates any applicable local, state, national, or international law, or any rules or regulations promulgated there under. Examples of such activities, includes but is not limited to, posting illegal copies of software on our news server or providing such software from your web space.

  6. Threats and acts of Terrorism: Use of the Concito Networks service to transmit any material (by e-mail, uploading, posting or otherwise) that threatens or encourages bodily harm, encourages destruction of property or promotes senseless hatred toward other groups of people in society is not permitted. This also includes communications or transmissions of any sort to others intended for the purpose of planning unspeakable acts against society. If Concito Networks becomes aware of any such activity it will be reported to the proper authorities without any notice to the customer.

  7. Harassment: Use of the Concito Networks service to transmit any material (by e-mail, uploading, posting or otherwise) that harasses another user or member of society is not permitted.

  8. Harm to minors: Use of the Concito Networks service to harm, or attempt to harm, minors in any way, including, but not limited to child pornography or sexual solicitation is not permitted and may result in criminal charges.

  9. Forgery or impersonation: Adding, removing or modifying identifying network header information in any manner in an effort to deceive or mislead is prohibited. Attempting to impersonate any person by using forged headers or other identifying information is prohibited. The use of anonymous remailers or nicknames is discouraged but does not constitute impersonation.

  10. E-mail / News Bombing: Malicious intent to impede another person's use of electronic mail services or news media will result in the immediate termination of the offending Concito Networks account.

  11. E-mail / Message Forging: Forging any message header, in part or whole, of any electronic transmission, originating or passing through the Concito Networks service is in violation of this AUP.

  12. Unsolicited commercial e-mail / Unsolicited bulk e-mail (spam) Use of the Concito Networks service to transmit any unsolicited commercial or unsolicited bulk e-mail is expressly prohibited. Violations of this type will result in the immediate suspension and possible termination of the offending Concito Networks account. Each report of U.C.E. by another user or third party will incur a fee according to the TOS.

    Persons and or Businesses using Concito Network's network to propagate e-mail lists are not exempt from this policy or the fees. Such e-mail lists, commonly called list servers, must present the user with a verification of their subscription prior to sending e-mail to the recipient. This verification process must also be able to provide proof of the recipient's approval to prevent account termination. Concito Networks, at it's sole discretion, may terminate any account if complaints regarding the e-mail list(s) become excessive

  13. Usenet spamming: Concito Networks has a zero tolerance policy for the use of its network for the posting of messages or commercial advertisements, which violate the rules, regulations, FAQ or charter of any newsgroups or mailing list. Commercial messages that are appropriate under the rules of a newsgroup or mailing list or that are solicited by the recipients are permitted.

  14. Unauthorized access: Use of the Concito Networks service to access, or to attempt to access, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Concito Network's or another entity's computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in the corruption or loss of data, is expressly prohibited and the offending Concito Networks account is subject to immediate termination.

  15. Infringement of Copyright, Patent, Trademark, Trade Secret, or Intellectual Property Right: Use of the Concito Networks service to transmit any material (by e-mail, uploading, posting or otherwise) that infringes any copyright, trademark, patent, trade secret or other proprietary rights of any third party, including, but not limited to, the unauthorized copying of copyrighted material, the digitization and distribution of photographs from magazines, books, or other copyrighted sources, and the unauthorized transmittal of copyrighted software.

  16. Collection of personal data: Use of the Concito Networks service to collect, or attempt to collect, personal information about third parties without their knowledge or consent is not permitted. Any user found in violation of this policy may be reported to the appropriate authorities.

  17. Network disruptions and unfriendly activity: Use of the Concito Networks service for any activity which affects the ability of other people or systems to use Concito Networks Services or the Internet. This includes, but is not limited to, "denial of service" (DOS) and "distributed denial of service" (DDOS) attacks against another network host or individual user. Interference with or disruption of other network users, services or equipment is prohibited. It is the Subscriber's responsibility to ensure that their network is configured in a secure manner. A Subscriber may not, through action or inaction, allow others to use their network for illegal or inappropriate actions. A Subscriber may not permit their network, through action or inaction, to be configured in such a way that gives a third party the capability to use their network in an illegal or inappropriate manner. Unauthorized entry and/or use of another company and/or individual's computer system will result in immediate account termination. Concito Networks will not tolerate any subscriber attempting to access the accounts of others, or penetrate security measures of other systems, whether or not the intrusion results in corruption or loss of data. Ignorance of such activity originating from a Subscriber's equipment is no excuse and service will be suspended until such time that the offense is rectified.

  18. Fraud: Involves a knowingly misrepresentation or misleading statement, writing or activity made with the intent that the person receiving it will act upon it.

  19. Fraudulent activity: Use of Concito Networks service to make fraudulent offers to sell or buy products, items, or services, or to advance any type of financial scam such as "pyramid schemes," "ponzi schemes," and "chain letters."

  20. Distribution of Viruses or Hostile software: Intentional distributions of software that attempts to and/or causes damage, harassment, or annoyance to persons, data, and/or computer systems are prohibited. Such an offense will result in the immediate termination of the offending account.

  21. Reselling the services: Reselling of Concito Networks service without our express written authorization is prohibited.

  22. Third Party Accountability: Concito Networks subscribers will be held responsible and accountable for any activity by third parties, using their account, that violates guidelines created within the Acceptable Use Policy. This includes but is not limited to DSL and other dedicated customers who are running servers connected through Concito Networks access. Applicable fines may apply.

  23. Mail Box usage: As the primary account holder, you are responsible for all account activity. All provisions of the Acceptable Use Policy apply to your use of all e-mail boxes. Misuse of Extra E-mail Boxes services may result in termination of your account. If a secondary mailbox is involved in a violation of the Acceptable Use Policy, your account, including all secondary mailboxes may be terminated. A terminated account will result in lost e-mail and Internet access for all users of your account. Therefore, it is important that your make sure everyone you will allow to use your account or a secondary mailbox understands all terms of this Acceptable Use Policy and the consequences of violations.

  24. Security: You are responsible for any misuse of your account, even if the inappropriate activity was committed by a friend, family member, guest or employee. You must adopt adequate security measures to prevent or minimize unauthorized use of your account by taking steps to ensure that others do not gain unauthorized access to your account. In addition, you may not use your account to breach security of another account or attempt to gain unauthorized access to another network or server.

    Password Privacy and Protection: Your password provides access to your account. It is your responsibility to keep your password secure. Sharing your password and account access with unauthorized users is prohibited. You should take care to prevent others from using your account since you will be held responsible for such use. User accounts will be terminated immediately if Concito Networks feels your password has been compromised.

  25. Network and Personal Security: Users who violate systems or network security may incur criminal and/or civil liability. Concito Networks will cooperate fully with investigations of violations of systems or network security at other sites, including cooperating with law enforcement authorities in the investigation of suspected criminal violations. Attempting to obtain another user's account password is strictly prohibited, and may result in termination of service. You may not attempt to circumvent user authentication or security of any host, network or account. This includes, but is not limited to, accessing data not intended for you, logging into or making use of a server or account you are not expressly authorized to access, or probing the security of other networks. Use or distribution of tools designed for compromising security is prohibited. Examples of these tools include, but are not limited to, password guessing programs, cracking tools or network probing tools.

  26. Network Performance: Concito Networks accounts operate on shared resources. Excessive use or abuse of these shared network resources by one customer may have a negative impact on all other customers. Misuse of network resources in a manner which impairs network performance is prohibited by this policy and may result in termination of your account.

  27. a) You are prohibited from excessive consumption of resources, including CPU time, memory, disk space and session time. You may not use resource-intensive programs which negatively impact other customers or the performances of Concito Networks systems or networks. Concito Networks reserves the right to terminate or limit such activities. This includes, but is not limited to, unattended processes running on our web server.

    b) You may not establish more than one connection to our network from your account at any one time.

    c) You may not provide network services from your account (for example, you may not use your account to operate an ftp or a web server), unless your account type specifically provides for it. Currently ADSL and Dedicated accounts have the ability to provide these services.

    d) Each customer account will be provided 50 MB of total disk storage for all e-mail boxes. Messages left on Concito Network's mail servers for more than thirty days (30 days) are subject to immediate deletion read or unread. Total mailbox storage is limited to 50 MB per account without regard to the age of the messages in any of the mailboxes. Once the 50 MB limit is exceeded, any incoming messages will be returned to the sender until the subscriber reduces mailbox size by removing mail from the server. Additional capacity may be purchased in some of the packages, please contact

    e) You may not employ automated electronic or mechanical processes designed to defeat network inactivity time-outs. Such tools include, but are not limited to, use of an auto-dialer and repetitive pinging of a host.

  28. Internet Relay Chat: Although Concito Networks does not offer technical support for Internet Relay Chat (IRC), you may use your account to connect to IRC; servers and networks maintained by Concito Networks or third parties. Please remember that you are a guest when you make use of these facilities. It is particularly important that you do not engage in activities which might interfere with other customers' access to IRC. a) You may not use IRC;scripts or programs that interfere with or deny service to other users on any other server, host, network or channel.

    b) You may not engage in activities which harass other users. This includes, but is not limited to, "flooding" (rapidly entering text with the intent to disrupt service), "flashing" (disrupting terminal emulation), "takeovers" (improper seizure and abuse of operator privileges), attempting to send private messages to those who do not wish to receive them, attempting to return to a channel after being banned from it, and other disruptive behaviors.

    c) You may not attempt to impersonate other users. The use of nicknames does not constitute impersonation.

    d) You may not run; " clones" (multiple simultaneous IRC;connections).

    e) You may not attempt to run IRC bots on our servers at any time.

  29. Unattended applications: Programs, scripts and/or applications which are run unattended on Concito Networks servers are expressly forbidden. Such programs include but are not limited to proxies and relays. It is understood that users may write CGI programs for their web pages, however these scripts must not persist once the data has been submitted and/or the http session has closed. Any efforts to circumvent the spirit of this rule will result with a fine up to $500 and any and all accounts with shell access being disabled. If the offense is deemed severe enough, the account may be terminated.

  30. Applications Expressly Banned on Concito Networks Servers: The following applications and any of their derivatives are banned from our servers:
    • Eggdrop
    • Bitchx
    • ircd
    • linsniff
    The servers are monitored for the presence of these applications and their existence on the filesystem. Any user found in possession of these programs will be warned once, further infractions will be viewed as a disregard for the AUP and service will be terminated. Attempts to store or run these programs under different names will result in the same actions being taken against the user.


Concito Networks requests that anyone who believes that there is a violation of this AUP direct the information to the Abuse Department at

If available, please provide the following information:
  1. The IP address used to commit the alleged violation
  2. The date and time of the alleged violation, including the time zone or offset from GMT
  3. Evidence of the alleged violation
Failure to provide sufficient information, as deemed by Concito Networks, will result in a dismissal of the complaint. Concito Networks regards reports of abuse with the utmost seriousness and require legitimate information as to avoid falsely accusing users. False accusations will result in reports filed against the reporting party to the appropriate contacts.

E-mail with full header information provides all of the above, as do system log files. Other situations will require different methods of providing the above information.

Concito Networks, at it's sole discretion, may take any one or more of the following actions in response to complaints:
  1. Issue written or verbal warnings
  2. Suspend the Subscriber's newsgroups posting privileges
  3. Suspend the Subscriber's account
  4. Terminate the Subscriber's account
  5. Bill the Member for administrative costs and/or reactivation charges
  6. Bring legal action to enjoin violations and/or to collect damages, if any, cause by violations


Concito Networks reserves the right to revise, amend, or modify this AUP, our TOS (Terms of Service) and our other policies and agreements at any time and in any manner. Notice of any revision, amendment, or modification will be posted in accordance with our TOS (Terms of Service).


Free Virus, Spam, Pop-Up and Spyware Protection.
Click here to learn more. Antivirus and Firewall

You can feel assured that any information entered is secured and protected. Click below to validate our identity

Find a local telephone number to dial into the Internet.

Search For Access Numbers In Your Area

Check By Area Code:
Check By State:
Home   |    About Us   |    Contact Us   |    56k Dialup   |    ISDN   |    Compare Us   |    Web Hosting   |    Motiv8   |    Support   |    Affiliates   |    Join Now
Terms of Use   |   Acceptable Use Policy   |   
© 1999-2006 D/B/A Your ISP All Rights Reserved