SECURITY INCIDENT REPORT FORM
Please note that this security incident report form is to be used only for reporting network abuse by users of the Access Communications services, in violation of the AccessHighSpeed Service Agreement. Abuse originating from outside the Access Communications network should be reported to those responsible for the originating network.
Access Communications is dedicated to ensuring that its service is used in a manner that is consistent with the policies set forth in its Service Agreement, which absolutely forbids spam and other network abuse. Access Communications takes all reported abuse complaints seriously, and will handle them in accordance with the above policies in a timely and efficient manner. Should we require further information regarding your complaint, we will contact you.
If you are reporting spam (unsolicited bulk email) sent by or relayed through an Access Communications subscriber, please ensure that you have included the complete message and full headers of the message in your report.
If you are reporting a security violation by an Access Communications subscriber, please ensure that you include relevant log entries in plain text format. Log entries should include — as a minimum — the date and time, source IP address, protocol (TCP, UDP, ICMP, etc.) and any applicable ports involved. Please also be sure to specify the timezone of any times mentioned. We ask that you limit such reports to one offending IP address per report, to enable us to group reports more efficiently.
As a general rule, the more information you can provide, the more effective we can be at putting a stop to the abusive behaviour. In particular, it would be a good idea to explain why you are reporting something as abuse; it's not always as obvious to us as it is to you.
Although it is not always possible for us to provide a direct human response to your complaint, we do investigate all complaints. As such, please do not interpret a lack of response as a lack of action taken. If we find that a customer is in violation of our policies, we will take the necessary action to stop the activity in question.
Thank you for taking the time to contact Access Communications.