Internet Acceptable Use Policy

//Internet Acceptable Use Policy
Internet Acceptable Use Policy 2018-02-13T13:07:41+00:00
Table of Contents


This section provides a general understanding of Waterloo Wireless’s Policy on the Acceptable Use of the Waterloo Wireless Internet Access Services (the “Service”). It is designed to help protect our Service, our customers, and the internet community.

If a Waterloo Wireless internet account is involved in a violation of these policies, we reserve the right to suspend or terminate Service without notice.

    1. In the event that an internet account is de-activated or cancelled as a result of any activities contrary to this Policy, the account may be subject to set-up fees, re-activation charges, and/or deposit requirements to be determined by Waterloo Wireless, if such account is permitted to be re-activated or re-established. Users whose accounts have been cancelled for misuse or violations of the terms and conditions applicable to the Service or this Policy are not entitled to re-register for the Service without express written approval from Waterloo Wireless outside the normal flow of the registration process. Any further registrations for the Service by or for the user whose account has been terminated for such activities may be rejected or the new account(s) may be terminated upon discovery, and such further registration or use may subject the user to additional account set-up, analysis, monthly usage, and/or termination charges for each such registration in amounts to be determined by Waterloo Wireless.
    2. Waterloo Wireless may take such action as it deems appropriate against any subscriber or account user for violations of the terms and conditions applicable to the Service or of this Policy. However, there is no promise or obligation on our part to monitor or police any such activity and Waterloo Wireless will have no liability to any party for any other party’s violation of these policies or the terms and conditions applicable to the Service.
    3. Waterloo Wireless has no obligation to censor or monitor use of the Service by you, any customer or any third party, including without limitation any obligation to censor or monitor any content, material or other information sent, received, or accessible through the Service or the internet. However, Waterloo Wireless has the right to, without notice, monitor use of the Service and monitor, review, and retain such content, material or information if Waterloo Wireless believes in good faith that such activity is reasonably necessary to provide the Service to customers, ensure adherence to or enforce the terms of this Policy, comply with any laws or regulations, respond to any allegation of illegal conduct or claimed violation of third party rights, or protect itself or others.
    4. If at any time you become aware of any violation, by any person or entity, of the acceptable use rules set out in the above, which involves your account, you agree to immediately notify Waterloo Wireless and provide Waterloo Wireless with assistance, as requested, to stop and/or remedy such violation. Waterloo Wireless contact information may be found at www.Waterloo
    1. Without limiting any of Waterloo Wireless’s rights to suspend, restrict, or terminate your Waterloo Wireless Internet Services account as described elsewhere in this Policy, Waterloo Wireless may suspend, restrict, or terminate your Waterloo Wireless Internet Services account and the Service without notice if, in Waterloo Wireless’s sole and absolute discretion, you have violated any of the provisions set out in this Policy or there is an Emergency Security Issue. An Emergency Security Issue means either (a) your use of the Service is in violation of this Policy in a manner that (i) could disrupt the Service; (ii) could disrupt use of the Service by other users; or (iii) could disrupt Waterloo Wireless’s network or servers or those of its suppliers used to provide the Service; or (b) unauthorized third-party access to the Service. Suspend, restrict, or terminate your Waterloo Wireless Internet Services account and the Service means immediate disabling of access to the Service or components of the Service as may be applicable, to prevent further use of the Service.
    2. Waterloo Wireless shall not be responsible or liable to you or any third party for any suspension, restriction or termination of your account. Waterloo Wireless shall not be responsible for any damages, caused directly or indirectly, including, but not limited to loss of profits, loss of data or any loss of information as a result of the termination of your account.
    1. In the event that Waterloo Wireless receives a complaint relating to use of the Service by a customer, Waterloo Wireless may, in its sole and absolute discretion and without notice or liability, investigate the complaint, restrict, monitor data traffic, suspend, or terminate the account(s) involved and/or remove any content, information, or materials from its servers.
    2. Waterloo Wireless may, without notice or liability, disclose to third parties any customer information or any content, information, or materials associated with a Waterloo Wireless Internet Services account, if Waterloo Wireless believes that such activity is reasonably necessary to provide the Service to customers, ensure adherence to or enforce the terms of this Policy, comply with any laws or regulations, respond to any allegation of illegal conduct or claimed violation of third party rights, or protect itself or others.

Amendments to this Policy

Waterloo Wireless reserves the right to amend this Policy at any time. Waterloo Wireless will publish this Policy and any amendments on its website at www.Waterloo, or otherwise electronically transmitted to users over the Service, as may be updated from time to time, before such amendments become effective. You are responsible for regularly reviewing the Waterloo Wireless website to obtain timely notice of such amendments. If any amendment is unacceptable, you may terminate your Waterloo Wireless Internet Services account. If you do use your account after the effective date of the amendment, you will be conclusively deemed to have accepted the amendment.

Service, network, and system interference

  1. Subscribers may not attempt to interfere with or compromise the operation of the Waterloo Wireless internet network in whole or part, to interfere with any of the equipment comprising Waterloo Wireless’s system, or to access other accounts or restricted areas of Waterloo Wireless’s system.
  2. Subscribers may not use the Service in a manner that adversely affects the availability of its resources to other Waterloo Wireless internet customers.
  3. Subscribers may not attempt to subvert or aid others to subvert the security of any computing facility.
  4. Subscribers may not interfere with use by any other authorized user, nor compromise the confidentiality of Waterloo Wireless’s or any other party’s internal business practices or records.
  5. Any attempts, whether successful or not, to gain access to any computer system or customer’s data without consent is prohibited.
  6. The Service is intended for accessing and using the internet. It is not intended, nor may it be used, as a substitute for other services such as local area network extension except where specified.


  1. As the user of the Service you may receive announcements from time to time from Waterloo Wireless by email regarding various aspects of the Service, including without limitation, notices of future upgrades or changes, service affecting issues or events, or special offers for Service users from Waterloo Wireless.
  2. You agree that sending mass, unsolicited email by users of the Service whether for advertising or other purposes is prohibited. Using a Waterloo Wireless email address to collect responses from unsolicited commercial email is prohibited. You may not use the Service to send threatening or harassing email. Waterloo Wireless will not attempt to mediate or otherwise become involved in any particular argument or dispute between users of the Service. Waterloo Wireless will cooperate with appropriate law enforcement agencies involved in investigating instances that may be reported to such authorities by users of the Service who believe they are being subject to unlawful harassment or other criminal activity.
  3. Sending outrageously threatening or harassing email (for example, making terrorist threats, or threatening physical injury or damage to persons or property), especially after being requested to stop, is prohibited. However, not every “flame” message or angry exchange of email can automatically be considered harassment. Waterloo Wireless is not responsible for the content or tone of any email or other transmissions of the subscribers to its Service or other parties using the internet, and subscribers or others should not expect that Waterloo Wireless would attempt to mediate or otherwise become involved in any particular disagreement or dispute between internet users.
  4. You acknowledge and agree that Waterloo Wireless’s Policy with respect to unsolicited email applicable to users of the Service may change from time to time. Such changes will be reflected in revised versions of the terms and conditions applying to the Service and/or this Policy and made available to users of the Service from time to time, including but not limited to, being made available to your system’s administrator for the Service. Waterloo Wireless reserves the right to immediately suspend or terminate your Service in the event you do not comply with Waterloo Wireless’s Policy respecting unsolicited email.
  5. You may not attempt to send email using a name and address of someone other than yourself. Attempting to impersonate any person, using forged headers or other identifying information, is prohibited. Attempts to do so that are discovered by Waterloo Wireless or reported by other parties may be reported to the proper authority immediately, and may result in the offending account being terminated immediately. The use of anonymous remailers and nicknames, by themselves, does not necessarily constitute impersonation if it is not being done with the intention of misleading the recipient or another party into believing that you are some other specifically identifiable user or person other than yourself.
  6. Subscribers also may not engage in the following activities while using the Service:
    • Intercepting, redirecting, or otherwise interfering or attempting to interfere with email intended for other parties;
    • Posting or transmitting a file that would infringe upon the rights of others including without limitation, trademarks, or service marks, confidential and/or proprietary information, and copyrighted materials;
    • Posting or transmitting a file or message through any storage medium that contains viruses, ‘Trojan Horses,’ worms or any other destructive or contaminating features;
    • Knowingly deleting any author attributions, legal notices or proprietary designations or labels in a file that the user mails or sends;
    • Publishing, posting, distributing or disseminating defamatory, infringing, obscene or other unlawful material or information;
    • Using the Service or systems to threaten, harass, stalk, abuse, or otherwise violate the legal rights (including rights of privacy and publicity) of others;
    • Advertising, transmitting or otherwise making available any software, program, product or service that is designed to violate this Acceptable Use Policy, which includes the facilitation of the means to spam, initiation of pinging, flooding, mailbombing, denial of service attacks and piracy of software;
    • Advocating, promoting or providing any assistance in carrying out violence or any other unlawful activity against any persons, animals or any governments, business or other entities;
    • Describing or displaying a weapon, or parts of weapons, or manuals for assembling any weapon, including but not limited to firearms, ammunition, explosives, grenades, bombs and caustic or other dangerous substances contrary to any laws;
    • Foregoing or misrepresenting message headers, whether in whole or in part, to mask the originator of the message;
    • Exporting encryption software over the internet or otherwise, to points outside Canada or the United States;
    • Accessing illegally or without authorization, computer accounts or networks belonging to another party, or attempting to penetrate security measures of another individual’s system or engaging in any activity that be used as a precursor to an attempted system penetration, including but not limited to post scams, stealth scans, or other information gathering.
  7. It may be necessary for Waterloo Wireless employees or representatives to examine system operational and accounting logs and other records to resolve Service-related problems. Waterloo Wireless reserves the right to access an account’s mailbox or other features to resolve problems or mail system errors.
  8. Email accounts that are inactive for a period of six months or more may be automatically deleted from the system in order to maintain optimum system server performance.
  9. In the event your Service is terminated for any reason by Waterloo Wireless, your email accounts provided as a feature of the Service will be terminated as well, meaning that you will be unable to access your messages stored in mailboxes assigned to you on and after the date of termination of your Service. Messages sent to your email mailboxes after termination of your Service will be returned to the sender with a message advising the sender that their message was unable to be delivered. The content of your mailbox at the time of termination of your Service will be retained for a period of ninety (90) days, after which time such content will be purged from Waterloo Wireless’s system, unless you make specific arrangements with Waterloo Wireless for a one-time access for the purpose of retrieving the content of your mailbox.
  10. Waterloo Wireless will not whitelist any Waterloo Wireless customer domain whether upon customer request or otherwise. Waterloo Wireless will not approve requests to take action to enable bulk messages to bypass systems in place to safeguard against bulk unsolicited email to Waterloo Wireless customers.
  11. In addition to Sections 1 – 10 above, Subscribers to any Waterloo Wireless Hosted Exchange email offering by subscribing to and using such offerings agree to the following Terms. In the event of any conflict between this Section 11 and any other section of this Acceptable Use Policy, the content of this Section 11 shall apply. In this Section 11, “Service Provider” means Waterloo Wireless.

A. General terms and conditions for use

  1. The Service Provider maintains a policy of not monitoring the content of its customers’ data in any way; however, the Customer acknowledges that in the course of providing the services Service Provider employees may access content. In this case, employees are prohibited from disclosing or divulging the contents of the data unless required to do so by law. The Customer further agrees that the Service Provider has the right, but not the obligation, to monitor or disclose the contents of private communications/data if the Service Provider, in its reasonable discretion, believes that such action is necessary to (i) comply with applicable laws or a valid legal process; or (ii) protect the Service Provider’s rights or property, or (iii) maintain the personal safety of an individual.
  2. The Customer acknowledges that the internet is an inherently insecure environment and that the Service Provider has no control over the privacy of any email message or other data when the same is outside of Service Provider’s own internal system. Service Provider recommends that the Service Provider system not be used for the transmission or receipt of confidential information of any type; any such use shall be at the sole risk of the Customer and/or the user; the Service Provider and its employees, associates, and related corporations shall be relieved from all liability in connection with such use including all liability for any disclosure of confidential information.
  3. The Customer agrees that access or use of the Service is solely for the Customer’s internal business or personal purposes and is not for re-sale, lease, rent, transfer, or distribution of any kind to a third party. The Customer’s use of the Service will be subject to the following limits or capacities, which may be revised at Service Provider’s discretion:
    1. Each mailbox accessed by the Customer in connection with the Service will be subject to a maximum capacity determined by the service program;
    2. The Customer may only create or access one public folder in the Microsoft Software in connection with use of the Service and such folder shall have a maximum capacity of 50 MB;
    3. Each SharePoint site will be subject to the maximum capacity of users and storage determined by the Customer’s service program. In the event the Customer exceeds the preceding limits or capacities, Service Provider reserves the right to suspend, alter, or terminate access to or use of the Service, until such time as remedial action has been completed to Service Provider’s reasonable satisfaction.
  4. Neither the Customer, nor any of its users, shall:
    1. Post, transmit, send, receive, or distribute any information constituting, or encouraging conduct which would constitute, a criminal offence or which would give rise to civil liability, or otherwise use the Services in a manner which is contrary to law;
    2. Post or transmit any message, information, or software which contains a virus, cancelbot, Trojan horse, worm, or other component which is harmful or disruptive to computer systems;
    3. Upload, post, publish, transmit, reproduce, or distribute, in any way, information, software, literary work, or other material which is protected by copyright, or other intellectual property right, or any derivative works with respect thereto, without obtaining the prior written permission of the copyright owner or right holder;
    4. Carry out any unsolicited mass email, spam, or usenet advertising campaigns, or harvest email addresses for any purpose including re-sale, or misrepresent or impersonate other internet users;
    5. Engage in any activity which could cause loss or degradation of service to other Service Provider customers or internet users or which could compromise the security or integrity of other parties’ computer systems or software. If the Service Provider is advised of or detects any violation of the above prohibitions the Customer authorizes the Service Provider, without notice or compensation to Customer, to take such steps as the Service Provider deems reasonably necessary to protect the integrity of the Service Provider’s business and systems, including, without limitation, placing filters on routers which serve the Customer or ceasing to deliver some or all of Customer’s email messages or suspension of services. If the Service Provider is advised of or detects any violation of the above prohibitions the Customer authorizes Service Provider, without notice or compensation, to take such steps as Service Provider deems reasonably necessary to protect the integrity of Service Provider’s business and systems, including, without limitation, placing filters on routers which serve the Customer, ceasing to deliver some or all of the Customer’s email messages, and/or restricting access to the Service on a temporary or permanent basis.
  5. Service Provider (and its licensors, where applicable) shall own all right, title, and interest, including all related intellectual property rights, in and to the Service and any ideas, enhancement requests, feedback, recommendations, or other information provided by you or any other party relating to the Service. This Agreement is not a sale and does not convey to you any rights of ownership in or related to the Service or the intellectual property rights owned by Service Provider.
  6. The Customer shall indemnify and hold Service Provider, its suppliers, its licensors, and each such party’s parent organizations, subsidiaries, affiliates, officers, directors, employees, attorneys and agents harmless from and against any and all claims, costs, damages, losses, liabilities and expenses (including attorneys’ fees and costs) arising out of or in connection with a claim arising from the breach by the Customer or its users of this Agreement, provided in any such case that Service Provider:
    1. Gives written notice of the claim promptly to the Customer;
    2. Gives the Customer sole control of the defense and settlement of the claim (provided that the Customer may not settle or defend any claim unless the Customer unconditionally releases Service Provider from all liability and such settlement does not affect Service Provider’s business or Service);
    3. Provides the Customer with all available information and assistance;
    4. Has not compromised or settled such claim.
  1. Service Provider, its suppliers, and its resellers and licensors make no representation, warranty, or guarantee as to the reliability, timeliness, quality, suitability, truth, availability, accuracy, or completeness of the Service. Service Provider and its licensors do not represent or warrant that:
  1. The use of the service will be secure, timely, uninterrupted or error-free or operate in combination with any other hardware, software, system, or data;
  2. The service will meet the Customer’s requirements or expectations;
  3. Any stored data will be accurate or reliable;
  4. The quality of any products, services, information, or other material purchased or obtained by the Customer through the service will meet the Customer’s requirements or expectations;
  5. Errors or defects will be corrected; or
  6. The service or the server(s) that make the Service available are free of viruses or other harmful components. The Service and all content is provided to the Customer strictly on an “as is” basis. All conditions, representations and warranties, whether express, implied, statutory, or otherwise, including, without limitation, any implied warranty of merchantability, fitness for a particular purpose, or non-infringement of third party rights, are hereby disclaimed to the maximum extent permitted by applicable law by Service Provider and its licensors.
  1. In no event shall Service Provider’s or Service Provider’s suppliers’ aggregate liability exceed the amounts actually paid by the Customer for use of the Service in the twelve- (12-) month period immediately preceding the event giving rise to such claim. In no event shall either party and/or its licensors be liable to anyone for any indirect, punitive, special, exemplary, incidental, consequential or other damages of any type or kind (including loss of data, revenue, profits, use or other economic advantage) arising out of, or in any way connected with this Service, including but not limited to the use or inability to use the Service, or for any content obtained from or through the Service, any interruption, inaccuracy, error or omission, regardless of cause in the content, even if the party from which damages are being sought or such party’s licensors have been previously advised of the possibility of such damages.
  2. Service Provider reserves the right to modify the terms and conditions of this Agreement or its policies relating to the Service at any time, by providing notice by means of an email message to the Customer’s administrator email address on record in Service Provider’s account information, or by written communication sent by first class mail or prepaid post to the Customer’s address on record in Service Provider’s account information. Continued use of the Service after any such changes shall constitute the Customer’s consent to such changes.
  3. This Agreement shall be governed by Ontario law and applicable Canadian federal law, without regard to the choice or conflicts of law provisions of any jurisdiction, and any disputes, actions, claims or causes of action arising out of or in connection with this Agreement or the Service shall be subject to the exclusive jurisdiction of the Ontario courts located in Kitchener, Ontario. If any provision of this Agreement is held by a court of competent jurisdiction to be invalid or unenforceable, then such provision(s) shall be construed, as nearly as possible, to reflect the intentions of the invalid or unenforceable provision(s), with all other provisions remaining in full force and effect. No joint venture, partnership, employment, or agency relationship exists between the Customer and Service Provider as a result of this Agreement or use of the Service. The failure of Service Provider to enforce any right or provision in this Agreement shall not constitute a waiver of such right or provision unless acknowledged and agreed to by Service Provider in writing. This Agreement comprises the entire agreement between the Customer and Service Provider and supersedes all prior or contemporaneous negotiations, discussions or agreements, whether written or oral, between the parties regarding the subject matter contained herein.

B. Terms and conditions relating to your use of Microsoft software

The provisions of this section B concern use of Microsoft Software, which includes computer software provided to you by Service Provider in connection with the Service, and may include associated media, printed materials, and “online” or electronic documentation (individually and collectively “Software Products” for this section B).

Service Provider does not own the Software Products and the use thereof is subject to certain rights and limitations. The Customer’s right to use the Software Products is subject to the Customer’s agreement with Service Provider, and to the Customer’s understanding of, compliance with and consent to the following terms and conditions, which Service Provider has no authority to vary, alter, or amend.

  1. Definitions. “Client Software” means software that allows a Device to access or utilize the services or functionality provided by the Server Software. “Device” means each of a computer, workstation, terminal, laptop, netbook, tablet, handheld PC, pager, telephone, personal digital assistant, “smartphone,” or other electronic device. “Server Software” means software that provides services or functionality on a computer acting as a server. “Redistribution Software” means the software described in Paragraph 4 (“Use of Redistribution Software”) below.
  2. Ownership of Software Products. The Software Products are licensed to Service Provider from an affiliate of the Microsoft Corporation (“Microsoft”). All title and intellectual property rights in and to the Software Products (and the constituent elements thereof, including but not limited to any images, photographs, animations, video, audio, music, text, and “applets” incorporated into the Software Products) are owned by Microsoft or its suppliers. The Software Products are protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. The Customer’s possession, access, or use of the Software Products does not transfer any ownership of the Software Products or any intellectual property rights to you.
  3. Use of Client Software. The Customer may use the Client Software installed on the Customer’s Devices only in accordance with the instructions, and only in connection with the Services, provided to the Customer by Service Provider. The terms of this document permanently and irrevocably supersede the terms of any Microsoft End User License Agreement which may be presented in electronic form during the Customer’s use of the Client Software.
  4. Use of Redistribution Software. In connection with the Services provided to the Customer by Service Provider, the Customer may have access to certain “sample,” “redistributable,” and/or software development (“SDK”) software code and tools (individually and collectively “Redistribution Software”).The Customer may not use, modify, copy, and/or distribute any Redistribution Software unless the Customer expressly agrees to and complies with certain additional terms contained in the messaging services use rights applicable to Service Provider, which terms must be provided to the Customer by Service Provider. Microsoft does not permit the Customer to use any Redistribution Software unless the Customer expressly agrees to and complies with such additional terms, as provided to the Customer by Service Provider.
  5. Copies. The Customer may not make any copies of the Software Products; provided, however, that the Customer may (i) make one (1) copy of Client Software on your Device as expressly authorized by Service Provider; and (ii) make copies of certain Redistribution Software in accordance with Paragraph 4 (Use of Redistribution Software). The Customer must erase or destroy all such Client Software and/or Redistribution Software upon termination or cancellation of the Customer’s agreement with Service Provider, upon notice from Service Provider, or upon transfer of the Customer’s Device to another person or entity, whichever first occurs. The Customer may not copy any printed materials accompanying the Software Products.
  6. Limitations on reverse engineering, decompilation, and disassembly. The Customer may not reverse engineer, decompile, or disassemble the Software Products, except and only to the extent that applicable law, notwithstanding this limitation expressly permits such activity.
  7. No rental. The Customer may not rent, lease, lend, pledge, or directly or indirectly transfer or distribute the Software Products to any third party, and the Customer may not permit any third party to have access to and/or use the functionality of the Software Products.
  8. Termination. Without prejudice to any other rights, Service Provider may terminate the Customer’s rights to use the Software Products if the Customer fails to comply with these terms and conditions. In the event of termination or cancellation, the Customer must stop using and/or accessing the Software Products, and destroy all copies of the Software Products and all of its component parts.
  9. No warranties, liabilities, or remedies by Microsoft. Any warranties, liability for damages, and remedies, if any, are provided solely by third parties and not by Microsoft or its affiliates or subsidiaries.
  10. Product support. Any product support for the Software Products is provided to the Customer by third parties and is not provided by Microsoft or its affiliates or subsidiaries.
  11. Not fault tolerant. The software products may contain technology that is not fault tolerant and is not designed, manufactured, or intended for use in environments or applications in which the failure of the software products could lead to death, personal injury, or severe physical, property, or environmental damage.
  12. Export restrictions. The Software Products are of U.S. origin for purposes of U.S. export control laws. The Customer agree to comply with all applicable international and national laws that apply to the Software Products, including the U.S. Export Administration Regulations, as well as end-user, end-use, and destination restrictions issued by U.S. and other governments. For additional information, see
  13. Liability for breach. In addition to any liability the Customer may have to Service Provider, the Customer agrees that the Customer will also be legally responsible directly to Microsoft for any breach of these terms and conditions.


Off-topic or inappropriate newsgroup postings

  1. Waterloo Wireless does not intend to censor the content of any newsgroups or other communications passing through its systems. We believe such choices should generally be left to the individual subscriber. Software tools are available to screen a subscriber account’s access to newsgroups and websites that might be considered offensive. It is the subscriber’s responsibility to make use of such tools if desired.
  2. Newsgroup postings and other email messages sent via the Service and the internet are communications between the senders and consenting receivers thereof, and Waterloo Wireless has neither the authority nor the responsibility to regulate their content. The views and comments expressed by Waterloo Wireless internet subscribers or other senders of such postings or messages are solely those of their authors and do not reflect any review, approval, or endorsement by Waterloo Wireless. Waterloo Wireless will, however, attempt to assist subscribers who continually receive email they deem to be objectionable and/or unsolicited email and who notify Waterloo Wireless of the problem.
  3. Generally, there is no restriction on content or postings, except as defined by each newsgroup. However, continued posting of off-topic or inappropriate articles is prohibited. Please note that commercial advertisements are off-topic in the vast majority of newsgroups. If numerous complaints are received with respect to off topic or inappropriate postings from a particular subscriber, Waterloo Wireless reserves the right to take appropriate actions, which may include but not be limited to issuing a warning to that subscriber or terminating that subscriber’s account without notice.

Fair Access Policy

  1. To ensure fair access for all Waterloo Wireless subscribers of Waterloo Wireless’s Wireless Internet Service offerings, Waterloo Wireless maintains a running average Fair Access Policy. Fair access establishes an equitable balance in internet access across all Waterloo Wireless’s Wireless internet services by service plan for all Waterloo Wireless customers, regardless of their frequency of use or volume of traffic. To ensure this equity, customers may experience some temporary throughput limitations. Waterloo Wireless’s Wireless internet access is not guaranteed. This Policy applies to all service plans including “Unlimited” plans where customers’ use of the Service is not limited to a specific number of hours per month. Approximately 5% of subscribers are responsible for a disproportionate share – often as much as half – of the total Waterloo Wireless service traffic. Unfortunately, many of those subscribers are not using Waterloo Wireless’s Wireless Internet Service offering for its intended purpose. To ensure that all Waterloo Wireless subscribers have fair and equitable access to the benefits of Waterloo Wireless’s Wireless Internet Service, Waterloo Wireless has enacted a Fair Access Policy to prevent abusive consumption of bandwidth by a handful of users.
  2. The Fair Access Policy is straightforward. Based on an analysis of usage data, Waterloo Wireless has established a download data usage threshold well above the maximum typical usage rates. When a customer exhibits patterns of system usage that exceed that threshold for an extended period of time, the Fair Access Policy may temporarily limit that subscriber’s throughput to ensure the integrity of Waterloo Wireless’s Wireless Internet Service for all subscribers.
  3. To ensure fair access to all customers, monthly bandwidth may be reduced if the use is excessive (i.e. at or more than 200GB). Should this occur, Waterloo Wireless will notify the customer of any remedial action to be taken (to remain in effect until the end of the customer’s current monthly billing period). Usage and speed limits are subject to change by Waterloo Wireless from time to time. Waterloo Wireless will endeavour to notify customers of any such changes.