Iridium Fair Use Policy
This Iridium Fair Use Policy outlines acceptable use of Iridium Services. To ensure high quality network performance for all Iridium network users and customers (‘Subscribers’), Iridium reserves the right to actively monitor usage statistics of Subscribers on the Iridium Communications System (‘ICS’) and take proactive measures to regulate, and if necessary, suspend or deactivate access to the ICS on an ongoing basis.
In addition, the Iridium Fair Use policy’s purpose is to set forth Iridium’s expectations for the reasonable use of the ICS that is in the best interest of all Subscribers and to diminish or eliminate excessive or proper use of the ICS that may negatively impact other Iridium Subscribers or the performance of the ICS.
Prohibited Uses and activities include, but are not limited to, using the Service to:
- Access peer-to-peer file sharing or use any peer-to-peer networking technology or services
- Download music, full-length movies, and videos
- Access streaming services, unless the use of Certus™ Streaming IP Data Service and for a specific business purpose
- Access unauthorized or un-optimized VoIP services
- Host server devices such as email, FTP, or web servers
- Host computer applications, such as web-cam feeds and internet-based PC backup services, that archive your data on a central server with the exception of security-camera feeds that meet a specific business purpose
- Provide cloud-based products or services
- Undertake or accomplish any unlawful purpose. This includes, but is not limited to transmitting or disseminating information, data, or material which in any way constitutes or encourages conduct that would constitute a criminal offence, or otherwise violate any local, state, federal or non U.S. law, order or regulation
- Generate and transmit abnormal or excessive amounts of data or messaging traffic, regardless of application or service type, or excessive voice usage, including without limitation always-on or open connections, as determined solely by Iridium, or
- Generation and transmission of:
- Unsolicited messages or any other voice or data communications, including but not limited to marketing spam
- Any communications or traffic that introduces or poses a security, Integrity, privacy, safety, or performance risk to the ICS or to any Subscriber as determined solely by Iridium or
- Any communications or traffic on the ICS that (i) results in a denial-of-service attack, a distributed denial-of-service, or an application layer denial-of-service attack to the ICS or any other network or (ii) introduces malware, including, but not limited to, viruses, spyware, worms, Trojans, adware, back doors, bots, or web-crawlers to the ICS.
Iridium reserves the right to terminate Service for any device or Subscriber found in violation of this Fair Use Policy without recourse. In this instance, the Subscriber will receive no compensation for lost time or usage of the device and/or Service.
Iridium reserves the right to investigate suspected violations of this Policy at any time and to take any of the aforementioned actions and measures to ensure high quality network performance for all Iridium network users and Subscribers on an ongoing basis.
Iridium Fair Use Policy also applies to Certus Services in addition to the following Iridium Certus Fair Access Policy:
Iridium Certus® Fair Access Policy
(Applies to all Iridium Certus® Services)
This Iridium Certus® Fair Access Policy (the “Policy”) outlines Iridium’s expectations for the reasonable use of the Iridium Certus® satellite telephony and data communication services (“Services”) on the Iridium Communications System (“ICS”) that is in the best interests of all network users (“Subscribers”) and diminishes or eliminates excessive, improper, or illegal use of the ICS that may negatively impact other Subscribers or the performance and integrity of the ICS. Specifically, the Policy’s intent is to prevent any use or misuse of the ICS that:
- Negatively impacts the fair use of the ICS for other service partners or other Iridium Subscribers;
- Negatively impacts the performance of the ICS;
- Is illegal based on U.S. or local laws and regulations; or
- Results in traffic bypassing ICS network elements or being rated incorrectly.
Prohibited Uses and Activities:
Prohibited uses and activities include, but are not limited to, attempting to or using the Service to:
- Undertake or accomplish any unlawful purpose. This includes, but is not limited to transmitting or disseminating information, data or material which in any way constitutes or encourages conduct that would constitute a criminal offense, or otherwise violate any local, state, federal, or non-U.S. law, order, or regulation;
- Generate and transmit abnormal or excessive amounts of data or messaging traffic, regardless of application or service type, data traffic or pings whose sole or primary purpose is to keep a data connection, channel, or circuit open or dedicated without sending any actual application data or payload content, or excessive voice usage, including without limitation always-on or open connections that negatively impacts other Iridium Subscribers or the performance of the ICS, as determined solely by Iridium;
- Generate and transmit: (i) Marketing spam (unsolicited messages, voice or data communications); (ii) Communications or traffic that introduces or poses a security, integrity, privacy, safety, or performance risk to the ICS or any Subscriber; or (iii) Any communications or traffic on the ICS that threatens the ICS (e.g., attack on network communications, denial-of-service attacks, introduction of viruses, malware, code, software, or program of a malicious nature).
- Restrict, inhibit, or otherwise interfere, regardless of intent, purpose or knowledge, with the ability of any other Subscriber to use or enjoy the Service;
- Restrict, inhibit, interfere with, or otherwise disrupt or cause a performance degradation, regardless of intent, purpose or knowledge, to the Service or any Iridium network; or
- Divert or reroute, including any attempt to divert or reroute, any inbound or outbound traffic or communications on the ICS to avoid normal routing of calls or the correct usage rating (i.e., Bypass). Bypass (as defined in the Agreement) is prohibited.
- Additionally, unless explicitly authorized by Iridium, service partner may not alter, modify, or tamper with Iridium equipment, devices, or Service or permit any other person to do the same.
Violation of this Fair Access Policy:
- Iridium reserves the right to actively monitor usage statistics of Subscribers on the ICS and take proactive measures to regulate, and if necessary, suspend or deactivate access to the ICS to ensure high quality network performance for all Iridium Subscribers and its service partners on an ongoing basis.
- Iridium reserves the right to refuse to transmit and to block any traffic, that it, in its sole discretion, deems to be in violation of this Policy, or otherwise harmful to the ICS regardless of whether the traffic is unlawful so long as it violates this Policy.
- Iridium reserves the right to investigate suspected violations of this Policy and respond appropriately if it becomes aware of inappropriate use of the Service.
- If the Service is used in a way that Iridium, in its sole discretion, believes violates this Policy, Iridium may take any responsive or corrective actions it deems appropriate under the circumstances with or without notice. These actions include, but are not limited to, the immediate suspension or termination of all or any portion of the Service or a device’s access to the ICS, suspend or terminate service partner’s account, or terminate the Agreement without recourse (e.g., no compensation for lost time or usage of the device and/or Service, lost revenues, and any initial purchases or sales incentives for the device will be forfeited and charged back to service partner). Accordingly, neither Iridium nor its agents will have any liability for any of these responsive actions. These actions are not Iridium's exclusive remedies and Iridium may take any other legal or technical actions it deems appropriate with or without notice.