Tango Networks Acceptable Use Policy
ACCEPTABLE USE POLICY
WHAT ARE THE PERMITTED AND PROHIBITED USES FOR THE MOBILE-X eSIM/SIM AND SERVICE(S)?
This Acceptable Use Policy (“AUP”) governs your use of the Mobile-X Services. The Tango Network’s Global Private Mobile Network (GPMN) – Mobile-X Service is a shared resource, which Tango Networks manages for the benefit of all our Partners, Customers and you as an individual user/subscriber. Your Data Plan(s) are intended specifically for Web browsing, messaging, and similar activities. Certain activities and uses of our Mobile-X Service(s) are permitted and others are not. If you purchase and/or use our Mobile-X eSIM/SIM in a Mobile Device manufactured specifically to be used on Mobile Networks, you agree, and Tango Networks and our other customers and users rely on your agreement, that you intend to use the eSIM/SIM activated on our Mobile-X Service(s) and will not resell or modify the eSIM/SIM, or assist anyone doing so. You accept these conditions of service by doing any of the following things:
1) giving us a written or electronic signature or confirmation, or telling us orally that you accept; or
2) activating, using or paying for the Mobile-X Service(s).
Here are examples of permitted and prohibited uses of the Mobile-X eSIM/SIM on our mobile network.
Mobile-X eSIM/SIM permitted uses include:
1) Voice calls;
2) Web browsing;
5) Streaming music;
6) Uploading and downloading applications and content to and from the Internet or third-party stores;
7) Using applications and content without excessively contributing to network congestion; and
8) Tethering your Device to other non-harmful devices pursuant to the terms and conditions and allotments of your Data Plan.
Unless explicitly permitted by your Rate Plan or Data Plan, you are not permitted to use your Mobile-X eSIM/SIM or the Services in a way that we/Tango Networks determine:
1) Uses a repeater or signal booster other than one we provide to you;
2) Compromises network security or capacity, degrades network performance, uses malicious software or “malware”, hinders other customers’ access to the network, or otherwise adversely impacts network service levels or legitimate data flows;
3) Uses applications which automatically consume unreasonable amounts of available network capacity;
4) Uses applications which are designed for unattended use, automatic data feeds, automated machine-to-machine connections, or applications that are used in a way that degrades network capacity or functionality;
5) Misuses the Service, including “spamming” or sending abusive, unsolicited, or other mass automated communications;
6) Accesses the accounts of others without authority;
7) Uses a fixed wireless device (provided for use in a fixed location) at a location or address other than the one provided at activation;
8) Resells the Service, either alone or as part of any other good or service;
9) Tampers with, reprograms, alters, or otherwise modifies your Device to circumvent any of our policies or violate anyone’s intellectual property rights;
10) Causes harm or adversely affects us, the network, our customers, employees, business, or any other person;
11) Conflicts with applicable law;
12) Is not in accordance with these permitted or prohibited uses; or
13) Attempts or assists or facilitates anyone else in any of the above activities.