ACCEPTABLE USE POLICY

Effective Date: Feb/2/2015

I. Purpose

This Policy addresses acceptable use, and unacceptable misuse, of internet services ("Services") provided by SparkMatrix Technologies Inc. (“SparkMatrix”) to Customer location occupants under contracts with those businesses/persons.

II. Definitions

"Customer": an organization or individual residing at the location which contracts with SparkMatrix for Services.

"Authorized Users": persons authorized by a Customer to use SparkMatrix Services at the Customer's location.

"CIO": the SparkMatrix Vice President of Information Technology and Chief Information Officer.

"IT Representative": the representative of a Customer designated by the Customer as responsible for oversight of the Customer's use of Services.

"IT Resources": all information technology resources, including, but not limited to, computerized information, computing facilities, computer networks, hardware, software, systems, programs and devices.

"SparkMatrix IT Resources": IT Resources owned, leased, or used by SparkMatrix, and used by SparkMatrix or by Customer so that Customer can access the Services.

"SparkMatrix": SparkMatrix Wireless Internet Services

III. Requirement of Acceptable Use

Customers and Authorized Users must use Services and SparkMatrix IT Resources in accordance with SparkMatrix policies, procedures, and guidelines, software licenses and contracts SparkMatrix enters into regarding Services, and applicable laws. Use of Services must be responsible and professional. Direct and indirect use of Services and SparkMatrix IT Resources made available to a Customer and its Authorized Users is a privilege granted by SparkMatrix, and is revocable by SparkMatrix at the discretion of the CIO.

IV. Misuse

Misuse is use of Services and SparkMatrix IT Resources in a manner not consistent with standards for acceptable use. Misuse by Customers and their Authorized Users includes, but is not limited to:

Securing unauthorized access to or unauthorized use of Services or SparkMatrix IT Resources, or facilitating such use or access by another person.

Accessing or attempting to access Services or SparkMatrix IT Resources without authorization. This is also referred to as hacking.

Any deliberate or reckless act that denies or interferes with the access and use of Services or SparkMatrix IT Resources by others.

Use of Services or SparkMatrix IT Resources in violation of the law, the policies of SparkMatrix, or the terms of contracts through which SparkMatrix secures any part of the Services.

Personal communication, or other personal use, that interferes with the use of Services and SparkMatrix IT Resources by Authorized Users or by SparkMatrix and its personnel.

Software theft or piracy, data theft, copyright violations, and other actions that violate intellectual property rights of others.

Inappropriate access, use or disclosure of data including social insurance numbers, birth dates, or addresses; unauthorized sale or transfer of such information.

Altering SparkMatrix system hardware configurations without authorization; installing or deleting system software without authorization; installing or removing system hardware without authorization.

Intercepting or monitoring communications, user dialog, or password input intended for another recipient.

Collecting or storing information about users of Services or SparkMatrix IT Resources without user authorization.

Illegal activity.

Transmitting messages that are threatening, obscene, vulgar, derogatory or harassing, messages that attack another individual or group of individuals, or messages that violate the policies of SparkMatrix.

Anomalous (unusual or unexpected) internet activity that is illegal or wasteful of SparkMatrix IT Resources, that violates the terms of use of the licenses and agreements through which SparkMatrix obtains or uses SparkMatrix IT Resources, or that violates the terms of the Customer's agreement with SparkMatrix for Services.

Authorized Users must abide to the following use standards, as well as any others that SparkMatrix may issue:

Authorized Users shall not post or transmit any message anonymously or under a false name.

Authorized Users shall not post or transmit any message which is libelous, defamatory or which discloses private or personal matters concerning any person.

Authorized Users shall not post or transmit any message, data, image or program which is illegal, indecent, obscene or pornographic.

Authorized Users shall not post or transmit any message, data, image or program that would violate the intellectual property rights of others.

Authorized Users r shall not interfere with use of the internet by any of SparkMatrix's other users.

Authorized Users shall not post or transmit any file which contains viruses, worms, "Trojan horses" or any other destructive features, regardless whether damage is intended or unintended by Authorized Users.

Authorized Users shall not post or transmit any message which is harmful, threatening, abusive or hateful.

Authorized Users shall not post or transmit any advertising, promotional materials or any other solicitation for goods or services, except in those areas of the internet that are designated for such purposes, such as marketplace bulletin boards or classified advertisement sections of Web sites.

Authorized Users shall not list or send unsolicited mass e-mailings, if such unsolicited e-mailings provoke complaints from the recipients.

V. Security and Monitoring

The maintenance, operation, and security of SparkMatrix IT Resources require SparkMatrix to monitor and access IT Resources. SparkMatrix monitors SparkMatrix IT Resources and Customer's use of Services as part of normal operations and maintenance. Normal monitoring includes, but is not limited to, logging activity and monitoring usage patterns. In special situations, communications including internet activity of specific individuals or systems are subject to monitoring by SparkMatrix for other purposes, e.g., allegations of violation of law or allegations of unauthorized use of Services and SparkMatrix IT Resources.

To the extent feasible, as determined by SparkMatrix, and taking into account the electronic environment and the public agency status of SparkMatrix, SparkMatrix will protect the confidentiality of Customer communications and data transmitted with use of Services. Access to and disclosure of confidential information to others in any manner not permitted by law is prohibited.

There is no assurance of confidentiality or privacy for much of the information transmitted using Services. Provincial and federal laws, and the needs of SparkMatrix to meet its administrative, business, and legal obligations, require SparkMatrix to routinely monitor activities involving Services and SparkMatrix IT Resources, and may require SparkMatrix to access and view communications using Services.

SparkMatrix seeks to maintain the security of SparkMatrix IT Resources, but cannot guarantee security. Customers and Authorized Users have no expectation of privacy as to information stored or transmitted using Services and SparkMatrix IT Resources, and generally should not maintain or transmit sensitive commercial or personal information using Services or SparkMatrix IT Resources. Customers are responsible for making arrangements, independent of SparkMatrix, for encryption and other protective measures regarding their business information transmitted via the internet using Services.

SparkMatrix may monitor the use of Services by Customer and its Authorized Users without notice to Customer or the Authorized User in situations when it is necessary or appropriate in the judgment of the CIO, e.g.:

The activity has been made available to the public, as by posting to an electronic list or web page.

Monitoring is necessary to preserve the security, integrity, or functionality of Services and IT Resources.

SparkMatrix has a reasonable basis to suspect that Customer or an Authorized User may be violating this Policy, or the terms of Customer's agreement with SparkMatrix for Services.

Use of Services is demonstrating anomalous activity based on usage patterns.

SparkMatrix has a reasonable basis to suspect that a person using Services made available to Customer is doing so without authorization.

Otherwise necessary, as permitted by law, required by lawful directive to SparkMatrix, or required to investigate allegations of misuse of SparkMatrix IT Resources.

When monitoring of specific activity and accounts is required, the CIO will consult with the IT Administrator prior to monitoring activities of specific Authorized Users.

VI. Administration and Enforcement of Policy

The CIO is responsible for the administration and enforcement of this Policy. Allegations of violations by Customers and Authorized Users will be resolved by the CIO following consultation with the IT Administrator. The CIO may suspend a Customer's Services until an investigation is completed. The CIO shall refer suspected criminal violations of law to the Police. Immediate action may be taken by the CIO in response to potential or ongoing threats to SparkMatrix IT Resources security, the health or safety of persons, the privacy rights of students, employees, patients, clients, research subjects or others, compliance with the law, or the security of confidential or proprietary information.