There is a license error on this site:
License has expired
The Web site remains functional, but this message will be displayed until the license error has been corrected.

To correct this error:If you do not have a license file, please request one from EPiServer License Center.
Internet Usage and Security

You are about to leave the Midco Business site.

We’re taking you to our secure payment website where you can view your statements and manage your billing.

Internet Usage and Security

Use of the Midco network in violation of copyright, trademark or other intellectual property laws is a violation of our Acceptable Use Policy (AUP) and your Midco Business master service agreement and/or current contract.

Copyright infringement most commonly involves the possession, downloading, or sharing of electronic copies of music, movies, or videos without the permission or approval of the copyright holder. To protect their interests, copyright holders frequently monitor websites and other popular download locations to record the title, date, time, and Internet Protocol (IP) address associated with infringing activity.

Based on the IP address involved, the copyright holder determines the Internet Service Provider (ISP) that manages the IP address and sends them a notice describing the event. When we receive such notices, we determine what customer was assigned the IP address at the date(s) and time(s) listed in the notice(s). We only track IP address assignment and not how or where the IP address is used. Midco does not monitor or track customer activity on the Internet.

If we are able to identify a customer with the IP address, we will contact the customer so they are aware of the allegation(s) of copyright infringement and to provide them with an opportunity to prevent the activity or remove the material. We do not release a customer’s identity to the copyright holder unless we are required to do so by a court order or subpoena.

If we receive repeated copyright infringement notifications for the customer over a period of time, we will escalate our response to ensure the customer is aware of the situation and to provide suggestions that may help resolve the problem. If we continue to receive copyright infringement notifications against the customer, we may determine that they are in violation of our AUP and take appropriate action, which could include, but not limited to, reducing the customer's bandwidth or terminating their account.

If the customer feels a mistake has been made or that the copyright for the material mentioned is not being infringed upon, they may file a counter-notification with the copyright holder or work with them directly.

Customers may wish to seek legal advice from an attorney if they receive a copyright infringement notice.

Malware is any software that is installed on a piece of equipment on your network with the intention of performing unwanted tasks. There are multiple types of malware.

  • A virus is software that can replicate itself and spread to other computers, or can be programmed to damage a computer by deleting files, reformatting the hard drive, or using up memory.
  • Adware displays ads when you are connected to the internet.
  • Spyware gathers information – such as the websites you visit, your browser and system information, and your computer’s IP address – and transmits it to interested parties.
  • Browser-hijacking software is advertising software that modifies your browser settings. It can create desktop shortcuts and display advertising pop-ups.

For additional information about protecting your business, review our Fraud Prevention support information.

When a Distributed Denial of Service (DDoS) attack occurs, a malicious third party attempts to make an online service unavailable by overwhelming it with traffic from multiple sources. Sometimes, the third party gets users to unwillingly and unknowingly participate in a DDoS attack by implementing a virus that allows use of your own equipment to overwhelm the online service. 

Midco takes thorough measures to keep our network secure through the implementation and testing of many procedures and processes to protect our network and your services. However, we recommend you have your own security measures in place to keep your information safe.

ChatIcons