Acceptable Use
Conditions and Terms of Use for TA Internet Service :

The Goal of TA Internet is to provide the best possible internet experience to all its customers. TA has adopted this policy in the furtherance of that goal.

All TA Internet customers and all others who use the service (the "user", "users", "customer", "customers" "you" or "your") must comply with this Policy. Your failure to comply with the terms outlined in this Policy may result in the suspension or cancellation of the Service Agreement. If you do not agree with the terms of this Policy, immediately stop the use of any and all TA services and notify TA so that it can close your account. Use of any TA services constitutes an agreement to abide by the Policy.

Unlawful activity :

Generally TA prohibits any activities that are illegal, fraudulent, infringes on the rights of any person or entity, or interferes with the use and enjoyment of the Service by others. This includes but is not limited to the examples listed below:

Use of the service to:

Transmit, receive, store, post, or otherwise disseminate any defamatory, obscene, libelous, unlawful, or threatening data, information, or material.
 
In any way disseminate any material, data, or information that any reasonable person could deem as unlawful, or could constitute a criminal offense, or in any way violates any local, state, or federal law.
 
Infringe in any manner the copyright or proprietary rights of any rights holders.
 
Download or in any way distribute any copyrighted material without the express permission of the copyright holder.
 
Engage in unsolicited bulk or commercial email messages ("spam").
 
Perform any activity that disrupts the servers, services, or network of TA or any other entity, commonly referred to as a denial of service attacks.
 
Rrestrict, inhibit, or otherwise diminish with the ability of any person or entity, regardless of intent, purpose or knowledge, to use or enjoy the Service (with the exception of tools designed for saftey, such as firewall or parental control software).
 
Falsify, alter, or remove message headers or packet headers or in any way alter normal network operations.
 
Impersonate any person or entity by name or other identifier in messages, engage in sender address falsification, forge anyone else's digital or manual signature, or perform any other similar fraudulent activity, commonly referred to as "phishing".
 
Violate the terms of service, acceptable use, rules, regulations, or policies of any service, network, system, server, or application you access or use.
 
Access any entities computer, network, data, or software without the consent of the owner; bypass or attempt to breach any security measures of any computer, network, service, or account. This includes but is not limited to using another entities credentials to which you are not authorized, accessing data not intended for you, and any unauthorized port scanning.
 
Obtain, distribute, or use any tools or devices designed or commonly used for compromising the security of computers, networks, or software. This includes but is not limited to password generators, decoders, packet sniffers, keystroke loggers, cracking tools, and Trojan Horse programs.
 
Perform any service, alterations, or modifications with the TA equipment or Service or permit any other person to do such who is not authorized by TA.
 
Redistribute or resell the service or otherwise make the service available to anyone outside the premises. This includes wired and wireless networking technologies.
 
Use the service as an Internet service provider, whether or not for profit.

Responsibility for equipment:

The customer's premise equipment, hereafter referred to as CPE (sometimes referred to as a modem) is provided by TA for use by the customer for the purposes of enjoying the Service. A fee is payed each month that the account is active for the rental of the CPE. The CPE remains the property of TA internet. TA will replace the CPE in the event that it is defective in the normal use of the internet service. Improper use or handling of the CPE, or in the event that the CPE is lost or stolen additional charges for replacement including but not limited to equipment costs and labor costs will be the responsibility of the customer.

Access to the configuration interfaces, including web based and command-line configuration is prohibited except when performed by a TA agent or employee. Any other entity that accesses the configuration of the CPE may require that the CPE be re provisioned by a TA employee at the customer's expense.
 

Remote Backups

Try our online data backup service and discover how easy it is to securely backup your computer to an off-site location. The average business has $30,000 worth learn more...

Remote Support

TACS Remote Helpdesk provides support for you or your companies end users.  Our support staff provides telephone, email and remote control support for industry  learn more...