Acceptable Use Policy
Last updated November 11, 2025
This Acceptable Use Policy (“Policy”) is part of our Terms of Use (“Legal Terms”) and should therefore be read alongside our main Legal Terms: https://logix.com/terms-of-use/. If you do not agree with these Legal Terms, please refrain from using our Services. Your continued use of our Services implies acceptance of these Legal Terms.
Please carefully review this Policy which applies to any and all:
(a) uses of our Services (as defined in “Legal Terms”)
(b) forms, materials, consent tools, comments, post, and all other content available on the Services (“Content”)
WHO WE ARE
We are LOGIX Communications, L.P. dba LOGIX Fiber Networks, doing business as LOGIX Fiber Networks (“Company,” “we,” “us,” or “our”) a company registered in Texas, United States at 2950 N Loop W, 10th Floor, Houston, TX 77092. We operate the website https://logix.com (the “Site”), as well as any other related products and services that refer or link to this Policy (collectively, the “Services”).
USE OF THE SERVICES
This Site and the information and materials available on or through it are provided by us as a service to you. You may use the Site only for your personal or internal business purposes. Except as otherwise expressly permitted herein, you may not modify, copy, distribute, broadcast, transmit, display, reproduce, publish, license, create derivative works from, transfer, sell, or otherwise use any information, products, services or material obtained from or through the Site. You may, for non-commercial use only, download or print any information or materials displayed on this Site, provided you also retain all copyright and other proprietary notices contained on the materials. You may not distribute, modify, transmit, reuse, report or use the content of this Site for public or commercial purposes, including the text, images, and/or audio and video, without our prior written permission. When you use the Services, you warrant that you will comply with this Policy and with all applicable laws.
Use of this Site is solely at your own risk and is subject to all applicable local, state, national, and international laws and regulations. While we seek to create a secure and reliable Site, please be advised that the confidentiality of any communication or material transmitted to/from the Site over the Internet cannot be guaranteed. Accordingly, we are not responsible for the security of any information transmitted via the Internet or for the consequences of any reliance on such information.
You also acknowledge that you may not:
- Systematically retrieve data or other content from the Services to create or compile, directly or indirectly, a collection, compilation, database, or directory without written permission from us.
- Make any unauthorized use of the Services, including collecting usernames and/or email addresses of users by electronic or other means for the purpose of sending unsolicited email, or creating user accounts by automated means or under false pretenses.
- Circumvent, disable, or otherwise interfere with security-related features of the Services, including features that prevent or restrict the use or copying of any Content or enforce limitations on the use of the Services and/or the Content contained therein.
- Engage in unauthorized framing of or linking to the Services.
- Trick, defraud, or mislead us and other users, especially in any attempt to learn sensitive account information such as user passwords.
- Make improper use of our Services, including our support services or submit false reports of abuse or misconduct.
- Engage in any automated use of the Services, such as using scripts to send comments or messages, or using any data mining, robots, or similar data gathering and extraction tools.
- Interfere with, disrupt, or create an undue burden on the Services or the networks or the Services connected.
- Attempt to impersonate another user or person or use the username of another user.
- Use any information obtained from the Services in order to harass, abuse, or harm another person.
- Use the Services as part of any effort to compete with us or otherwise use the Services and/or the Content for any revenue-generating endeavor or commercial enterprise.
- Decipher, decompile, disassemble, or reverse engineer any of the software comprising or in any way making up a part of the Services, except as expressly permitted by applicable law.
- Attempt to bypass any measures of the Services designed to prevent or restrict access to the Services, or any portion of the Services.
- Harass, annoy, intimidate, or threaten any of our employees or agents engaged in providing any portion of the Services to you.
- Delete the copyright or other proprietary rights notice from any Content.
- Copy or adapt the Services’ software, including but not limited to Flash, PHP, HTML, JavaScript, or other code.
- Upload or transmit (or attempt to upload or to transmit) viruses, Trojan horses, or other material, including excessive use of capital letters and spamming (continuous posting of repetitive text), that interferes with any party’s uninterrupted use and enjoyment of the Services or modifies, impairs, disrupts, alters, or interferes with the use, features, functions, operation, or maintenance of the Services.
- Upload or transmit (or attempt to upload or to transmit) any material that acts as a passive or active information collection or transmission mechanism, including without limitation, clear graphics interchange formats (“gifs”), 1×1 pixels, web bugs, cookies, or other similar devices (sometimes referred to as “spyware” or “passive collection mechanisms” or “pcms”).
- Except as may be the result of standard search engine or Internet browser usage, use, launch, develop, or distribute any automated system, including without limitation, any spider, robot, cheat utility, scraper, or offline reader that accesses the Services, or using or launching any unauthorized script or other software.
- Disparage, tarnish, or otherwise harm, in our opinion, us and/or the Services.
- Use the Services in a manner inconsistent with any applicable laws or regulations.
- Sell or otherwise transfer your profile.
- Operating as an unauthorized Internet Service Provider or reselling services to third parties.
- Running unauthorized servers, daemons, or cryptocurrency mining operations.
- Excessive resource consumption that degrades network performance for other customers.
- Failing to secure customer-managed phone systems against unauthorized access.
- Generating traffic to high-cost destinations that exceeds normal business usage patterns.
- Violating the acceptable use policies of upstream network providers.
- Using LOGIX services to provide web hosting or email services to third parties.
Subscriptions
If you subscribe to our Services, you understand, acknowledge, and agree that you may not, except if expressly permitted:
- Engage in any use, including modification, copying, redistribution, publication, display, performance, or retransmission, of any portions of any Services, other than as expressly permitted by this Policy, without the prior written consent of LOGIX Communications, L.P. dba LOGIX Fiber Networks, which consent LOGIX Communications, L.P. dba LOGIX Fiber Networks may grant or refuse in its sole and absolute discretion.
- Reconstruct or attempt to discover any source code or algorithms of the Services, or any portion thereof, by any means whatsoever.
- Provide, or otherwise make available, the Services to any third party.
- Intercept any data not intended for you.
- Damage, reveal, or alter any user’s data, or any other hardware, software, or information relating to another person or entity.
- Spam/unsolicited bulk email.
- Illegal file sharing.
- Network abuse (DoS/DDoS attacks).
- Malware distribution.
- Port scanning.
- Copyright infringement.
- Email harassment and mail bombing.
- Chain letters.
- Unlawful/indecent website content.
- Security breaches (cracking, unauthorized access).
- Network abuse and excessive resource consumption.
- IRC abuse (flooding, takeovers).
- Illegal activities (viruses, pirated software, gambling, pyramid schemes).
- Reselling services.
- Sending unsolicited bulk or commercial email (spam); distributing or propagating chain letters; email harassment or mail bombing; network scanning or probing; distributing malware or viruses; running unauthorized servers or daemons; cryptocurrency mining; using the service to facilitate illegal gambling or pyramid schemes; excessive resource consumption that impacts network performance; reselling or providing service to third parties; violating the acceptable use policies of third-party networks accessed through LOGIX services.
NETWORK MANAGEMENT RESPONSIBILITIES
Phone System Security: As the owner/manager of telecommunications equipment (including phone systems, PBX, SIP devices, and other customer-premises equipment), you are solely responsible for securing your systems to prevent unauthorized access. Proper security measures are essential to prevent telephone fraud, toll abuse, and unauthorized usage.
While LOGIX Network Operations Center (NOC) monitors the network and may take action to stop suspected fraudulent activity, you have the primary responsibility to manage and protect your telecommunications equipment.
FRAUD LIABILITY: ANY COSTS INCURRED DUE TO FRAUDULENT ACTIVITY ON CUSTOMER-MANAGED EQUIPMENT ARE THE SOLE RESPONSIBILITY OF THE CUSTOMER. This includes but is not limited to unauthorized long-distance calls, international toll fraud, premium service charges, and any other unauthorized usage of customer-managed systems.
Contact Requirements: Customers must designate one or more responsible contacts who are accessible to LOGIX for service-critical issues. For mission-critical services including primary domain servers, major network gateways, and high-availability systems, customers must maintain 24/7 contact availability. All customers must maintain a valid postmaster email address for receipt of abuse complaints.
NETWORK PERFORMANCE AND RESOURCE LIMITS
Shared Resources: LOGIX services operate on shared network infrastructure. Excessive use or abuse of shared resources by one customer negatively impacts all other customers. You are prohibited from excessive consumption of resources including CPU time, memory, disk space, bandwidth, and session time beyond your contracted service levels.
Prohibited Resource Abuse includes:
- Excessive bandwidth consumption beyond contracted limits
- Email storage exceeding contracted amounts
- Database queries or API calls that degrade system performance
- Any usage pattern that creates undue burden on shared network resources
High-Cost Traffic and Surcharges: If customer traffic to high-cost geographic destinations or premium services exceeds twenty percent (20%) of total traffic volume, or creates disproportionate costs to LOGIX, we reserve the right to:
- Apply call locality surcharges and additional fees necessary to cover our increased costs
- Suspend or disconnect services generating excessive expenses
- Require modifications to usage patterns
- Terminate services for continued excessive usage
LOGIX may terminate services, apply appropriate charges, or take other corrective action for resource consumption that significantly exceeds normal business usage patterns for similar services, even if below the 20% threshold.
DISCLAIMERS AND LIMITATIONS OF LIABILITY FOR TELECOMMUNICATIONS
NO WARRANTY: LOGIX services are provided “AS IS” and “AS AVAILABLE” without warranty of any kind, either express or implied. LOGIX makes no representations or warranties regarding service availability, reliability, accuracy, timeliness, or suitability for any particular purpose. We do not warrant that the Services will be uninterrupted, error-free, or free from viruses or other harmful components.
LIMITATION OF LIABILITY: TO THE FULLEST EXTENT PERMITTED BY LAW, LOGIX SHALL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES OF ANY KIND ARISING FROM OR RELATED TO SERVICE USE, INTERRUPTION, INABILITY TO USE SERVICES, OR ANY ERRORS OR OMISSIONS IN SERVICE DELIVERY. This includes without limitation damages for loss of profits, business interruption, loss of data, or any other commercial damages or losses, even if LOGIX has been advised of the possibility of such damages.
Customer-Managed Equipment: LOGIX is not responsible for the security, configuration, maintenance, or costs associated with customer-managed telecommunications equipment, including but not limited to PBX systems, routers, firewalls, SIP devices, and other customer-premises equipment. Customers are solely responsible for all costs arising from security breaches, unauthorized access, or misuse of customer-managed equipment.
Third-Party Network Policies: When accessing third-party networks or services through LOGIX, you are also subject to the acceptable use policies and terms of those third-party providers. LOGIX is not responsible for enforcement of or compliance with third-party policies, though we may take action if third-party violations impact our network or other customers.
CONSEQUENCES OF BREACHING THIS POLICY
The consequences for violating our Policy will vary depending on the severity of the breach and the user’s history on the Services, by way of example:
We may, in some cases, give you a warning, however, if your breach is serious or if you continue to breach our Legal Terms and this Policy, we have the right to suspend or terminate your access to and use of our Services and, if applicable, disable your account. We may also notify law enforcement or issue legal proceedings against you when we believe that there is a genuine risk to an individual or a threat to public safety.
We exclude our liability for all action we may take in response to any of your breaches of this Policy.
HOW CAN YOU CONTACT US ABOUT THIS POLICY?
If you have any further questions or comments, you may contact us by:
Phone: (800) 444-0258
Email: emailus@logix.com