Legal

Acceptable Use Policy

TELUS Communications Inc. and its affiliates ("TELUS") is committed to being the best possible network citizen. To assist us in protecting the usefulness and enjoyment of the Internet for our Customers and for other users, we require that our Customers comply with the terms of this document, which outlines our policies on acceptable use of our services.

Overview

When using TELUS Internet access services, hosting services, internetworking services, or any chat rooms, message boards, news groups, software libraries, personal web pages or any other message or communication services that may be available to the Customer on or through TELUS Internet systems (collectively, the "Communication Services"), the Customer is prohibited from engaging in certain activities which include, but are not limited to, those described in this Acceptable Use Policy.

For the purposes of this Acceptable Use Policy, a "Customer" is an individual or organization that has a service agreement or contract with TELUS for use of the Communication Services, or otherwise uses the Communication Services.

If the Customer engages in any of the prohibited activities described on these pages it may, at the sole discretion of TELUS and without notice to the Customer, result in the immediate (1) restriction, suspension or termination of the Customer's use of the Communication Services (including without limitation the Customer's TELUS Internet access or hosting service), without compensation to the Customer, (2) blocking or filtering of the Customer's content, data or materials, (3) application of complaint processing fees, disconnection fees and additional service charges to the Customer's account, (4) deletion of the Customer's content, data or materials from TELUS servers, or (5) involvement of law enforcement agencies. Such activities may also result in civil or criminal liability. The foregoing applies notwithstanding any language or term to the contrary contained in any agreement that the Customer may have with TELUS.

The Customer is responsible for use of the Communication Services by any third party who directly or indirectly utilizes the Communication Services provided by TELUS to the Customer, whether or not such use has been authorized by the Customer.

Prohibited Activities

Criminal Offences

While using the Communication Services, the Customer is prohibited from, in TELUS' sole judgment, posting, uploading, reproducing, distributing or otherwise transmitting information or materials where such activity constitutes a criminal offence or from otherwise engaging in or assisting others to engage in any criminal offence including, but not limited to, those offences listed below:

  • Communicating hatred
  • Pyramid selling
  • Unauthorized use of a computer
  • Mischief in relation to data
  • Fraud
  • Defamatory libel
  • Obscenity
  • Child pornography
  • Harassment/stalking
  • Uttering threats

Civil Offences and Violations of the Rights of Others

While using the Communication Services, the Customer is prohibited from, in TELUS' sole judgment, posting, uploading, reproducing, distributing or otherwise transmitting information or materials where such activity gives rise to civil liability or from otherwise violating the rights or assisting others to violate the rights of TELUS or any third party, including, but not limited to, the violations listed below:

  • Copyright infringement
  • Trade-mark infringement
  • Patent infringement
  • Misappropriation of trade secrets
  • Defamation

Other Prohibited Activities

While using the Communication Services, the Customer is prohibited from engaging in or assisting others to engage in any activity that, in TELUS' sole judgment, (1) violates applicable policies, rules or guidelines of TELUS or other on-line service providers, (2) disrupts or threatens the integrity, operation or security of any Communication Service or any computer or Internet system, (3) elicits complaints from other Internet users or Internet service providers, (4) is contrary to any law or regulation, or (5) is otherwise objectionable. Examples of such prohibited activity include, but are not limited to:

  • Scanning or probing another computer system
  • Obstructing or bypassing computer identification or security procedures
  • Engaging in unauthorized computer or network trespass
  • Maintaining a relay service open to the general public
  • Engaging in denial of service attacks
  • Posting, uploading, reproducing, distributing or otherwise transmitting any data, information or software that constitutes a virus, trojan horse, worm or other harmful or disruptive component
  • Exporting equipment, software, or data outside of Canada or the U.S. in contravention of applicable export control legislation
  • Falsifying address information, modifying message headers to conceal the Customer's identity or impersonating others, for the purpose of circumventing this Acceptable Use Policy
  • Posting, uploading, reproducing, distributing, otherwise transmitting, or collecting responses from unauthorized or unsolicited duplicative e-mail messages, junk or bulk e-mail messages, chain letters, newsgroup postings or other "spam" (TELUS reserves the right to determine, in its sole discretion, whether a message constitutes "spam")
  • Engaging in any conduct that directly or indirectly encourages, facilitates, promotes, relies upon or permits the foregoing prohibited activities including, without limitation, failing to implement reasonable technical or administrative measures to prevent spam, viruses and worms

Additional Info & Security Measures

Cooperation with Other Providers

TELUS may cooperate with other on-line service providers to discourage and resist abuses of acceptable use policies. TELUS reserves the right to take corrective action against the Customer upon notification to TELUS of unacceptable activities by the Customer on other networks. The Customer is prohibited from using the services of another provider to engage in or facilitate any activity that violates this Acceptable Use Policy.


Indemnification

The Customer will indemnify and hold harmless TELUS from all demands, claims, proceedings, awards, action, damages, losses, costs, charges and expenses, including legal fees, incurred by or made against TELUS, which result from or relate to violation by the Customer of this Acceptable Use Policy. The Customer shall give TELUS prompt notice of any such demand, claim or proceeding that the customer is aware of.

Reservation of Rights and TELUS Liability

Nothing in this Acceptable Use Policy shall be interpreted to limit TELUS' rights or remedies in any way with respect to any of the foregoing activities (including, without limitation, TELUS' rights or remedies under any agreement between TELUS and the Customer) and TELUS reserves all rights and remedies available to it with respect to such activities at law or in equity. TELUS does not assume liability to the Customer or any other party for failure to enforce the terms of this Acceptable Use Policy.

Modifications

The terms of this Acceptable Use Policy may change at any time and without prior notice. The Customer is responsible for frequently reviewing this Acceptable Use Policy posted on TELUS' web site to obtain timely notice of any such changes.


TELUS HSIA Security Measures Policy

Effective June 2004, TELUS implemented security measures on the High Speed Internet Access network called the HSIA Security Policy, which mainly consists of blocking certain network ports on the ADSL network in an effort to reduce the exploitation of customer PCs, and to reduce the levels of SPAM entering and leaving the ADSL network.

The purpose of the HSIA Security Policy is to protect the TELUS HSIA (ADSL) network from viruses.

NOTE: TELUS Port Blocking will only affect customers on Dynamic IP packages - customers on Static IP packages will still have access to all Ports.

Why has TELUS implemented the HSIA Security Policy?

The security policy has been implemented to protect the TELUS ADSL network from new type of viruses and worms that propagate themselves through unsecured/unpatched computers. A few examples of such worms are: Nachi, MSBlaster and Sasser. Any computer that has one of these viruses will immediately infect other computers on the network that do not have the proper security measures in place.

Benefits to Customers

  • By TELUS protecting its network, customers receive additional protection against hackers, viruses and spam as a by-product.
  • Inhibiting the spread of email viruses. Most email viruses have built-in email SMTP engines which allow viruses to email themselves to all the recipients in an address book without the user knowing; by TELUS blocking outbound SMTP traffic if a customer has an email virus it will not be able to spread itself to others.
  • Reduced Spam. By TELUS blocking outbound port 25 (SMTP), customers machines who have a virus whose goal is to turn the PC into a "zombie" machine will no longer flood the internet with millions of Spam messages. This helps significantly reduce Spam, especially considering that 95% of the world’s Spam originates from 'zombie' boxes.
  • Customers who neglect, are not aware of, or simply do not update their Windows software will no longer be as vulnerable. The security policy blocks how hackers and viruses exploit the security issues in Windows. This is not an alternative to customers updating their operating systems; customers should still keep their Windows Operating Systems up to date.
  • TELUS is not guaranteeing in anyway full protection of the customer’s computer but simply providing security for the TELUS network which consequently provides for a higher level of protection for TELUS customers. This policy is in no way a guarantee that customers’ computers won't get exploited by other means.

What are Internet Ports?

All programs that connect to the Internet use a specified "port". You can think of a port as a small part of your ADSL/Network connection and there are thousands of these "ports". All programs connect on various ports to the TELUS network. For example, if you are using Internet Explorer you are browsing the web on port 80.

What Ports are TELUS blocking?

The following ports will have inbound (ingress) and in some cases outbound traffic blocked.

TCP 21 (ftp)

  • Customers running an FTP server will no longer be able to have Internet users connect to their server.
  • This prevents computers to be used as FTP servers to store illegal files.

TCP 25 (smtp)

  • Customers running a SMTP mail server will no longer be able to receive e-mail requests, nor will it allow outbound traffic for mail servers external to the TELUS.NET, TELUS IDCs and Hostopia networks on port 25.
  • This prevents mail servers that operate as an open relay. Open relays are used without a customer's knowledge to send millions of pieces of Spam.

TCP 80 (www)

  • Customers running a Web server will no longer be able to have Internet users connect to their server.
  • Common exploit on old Window IIS server and Linux boxes that are not properly patched.

TCP 110 (pop3)

  • Customers running a POP mail server will no longer be able to have Internet users connect to the server.
  • This prevents mail servers that operate as an open relay. Open relays are used without a customer's knowledge to send millions of pieces of Spam.

TCP 6667 (ircd)

  • Customers running an IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.

TCP/UDP 135-139 (dcom and netbios)

  • These ports are commonly exploited by worm viruses.
  • 135 Windows RPC
  • 136 PROFILE Naming System (basically unused)
  • 137-139 Windows NetBios

TCP/UDP 443 (ssl)

  • Customers will not be able to accept inbound ssl connections on this port.
  • Customer IP Point Of Sale (IP POS) devices are not blocked. No need for a Server plan for IP POS

TCP/UDP 445 (ms-ds)

  • Microsoft Directory Services - customers that allow legitimate Internet users access to their computers will lose this ability.
  • This allows hackers to directly connect to a Windows based computer and gain total control over the OS.

TCP/UDP 1433-1434 (ms-sql)

  • Microsoft SQL server - Customers running an SQL server will no longer be able to have Internet users connect to their server.
  • There are several worm viruses that exploit holes in SQL server.

Contact

Questions?

If you have any questions about this Acceptable Use Policy, please e-mail TELUS at abuse@telus.com.

Contact TELUS

Contact us for further support

Tell us what you think It's in our nature to listen. As TELUS.com/business continues to evolve, we'd love to hear more from you.