You are about to leave the Midco Business site.

We’re taking you to our secure payment website where you can view your statements and manage your billing.

Internet Usage and Security

Copyright Infringement

Use of the Midco network in violation of copyright, trademark or other intellectual property laws is a violation of our Acceptable Use Policy (AUP) and your Midco Business master service agreement and/or current contract.

Copyright infringement most commonly involves the possession, downloading, or sharing of electronic copies of music, movies, or videos without the permission or approval of the copyright holder. To protect their interests, copyright holders frequently monitor websites and other popular download locations to record the title, date, time, and Internet Protocol (IP) address associated with infringing activity.

Based on the IP address involved, the copyright holder determines the Internet Service Provider (ISP) that manages the IP address and sends them a notice describing the event. When we receive such notices, we determine what customer was assigned the IP address at the date(s) and time(s) listed in the notice(s). We only track IP address assignment and not how or where the IP address is used. Midco does not monitor or track customer activity on the Internet.

If we are able to identify a customer with the IP address, we will contact the customer so they are aware of the allegation(s) of copyright infringement and to provide them with an opportunity to prevent the activity or remove the material. We do not release a customer’s identity to the copyright holder unless we are required to do so by a court order or subpoena.

If we receive repeated copyright infringement notifications for the customer over a period of time, we will escalate our response to ensure the customer is aware of the situation and to provide suggestions that may help resolve the problem. If we continue to receive copyright infringement notifications against the customer, we may determine that they are in violation of our AUP and take appropriate action, which could include, but not limited to, reducing the customer's bandwidth or terminating their account.

If the customer feels a mistake has been made or that the copyright for the material mentioned is not being infringed upon, they may file a counter-notification with the copyright holder or work with them directly.

Customers may wish to seek legal advice from an attorney if they receive a copyright infringement notice.

DDoS Attack

What is a DDoS attack?

When a distributed denial-of-service (DDoS) attack occurs, a malicious third party attempts to make an online service unavailable by overwhelming it with traffic from multiple sources.

How does Midco protect you?

Midco takes thorough measures to keep our network secure by mitigating potential DDoS threats as early as possible. This protection transfers to our customers, providing a free basic level of defense to businesses using our internet. We also have elevated levels of protection available to our dedicated fiber internet customers. However, we recommend that your business also have its own security measures in place to keep your information safe.

What is Midco Enhanced DDOS Mitigation, and why is it beneficial for my business? 

It’s a customizable solution that detects and mitigates DDOS attacks against your internet connection. The technology we use protects against upstream attacks and constantly updates so nothing slips through the cracks.  

You receive your own DDoS portal where you can see exactly what’s going on with your connection. 

  • Create and view reports. 
  • View alerts. 
  • See the origins of threats.  
  • Receive real-time threat mitigation updates.  
  • View traffic going in and out. 

To get enhanced DDoS protection for your business, you need a dedicated fiber internet connection at the location you would like to be protected.
Get support for enhanced DDoS services.

Viruses and Malware

Malware is any software that is installed on a piece of equipment on your network with the intention of performing unwanted tasks. There are multiple types of malware.

  • A virus is a software that can replicate itself and spread to other computers, or can be programmed to damage a computer by deleting files, reformatting the hard drive, or using up memory.
  • Adware displays ads when you are connected to the internet.
  • Spyware gathers information – such as the websites you visit, your browser and system information, and your computer’s IP address – and transmits it to interested parties.
  • Browser-hijacking software is advertising software that modifies your browser settings. It can create desktop shortcuts and display advertising pop-ups.

For additional information about protecting your business, review our Fraud Prevention support information.