Lumen's Acceptable Use Policy

Effective April 26, 2024


This Acceptable Use Policy ("AUP") defines acceptable practices relating to the use of Lumen’s network, websites, systems, facilities, products, and services (collectively, the "Services") by Lumen customers and users that have gained access to the Services through customer accounts (collectively, “Users”). The Services must be used in a manner that is consistent with the intended purpose of the Services and the terms of the applicable agreement with Lumen. By using the Services, Users consent to be bound by the terms of this AUP. For purposes of this AUP, “Lumen” includes CenturyLink Communications, LLC d/b/a Lumen Technologies Group or its affiliated entities, including direct and indirect subsidiaries of Lumen, Inc.


Prohibited Conduct.

  • General. Users will not use the Services to transmit, distribute or store material in a manner that: (a) violates any applicable law or regulation; (b) may adversely affect the Services or Users; (c) may expose Lumen to criminal or civil liability or (d) violate, infringe upon or otherwise misappropriate any third party rights, including intellectual property rights, rights of publicity and privacy rights. Users are prohibited from facilitating the violation of any part of this AUP or applicable third‑party policies, including, but not limited to transmitting, distributing, or otherwise making available any product or service that violates this AUP or another provider's policy.
  • Inappropriate Content. Users will not use the Services to transmit, distribute or store material that Lumen reasonably determines is inappropriate, obscene, indecent, defamatory, libelous, tortious, threatening, abusive, hateful, or excessively violent. Users will also not use the Services to host terrorist‑related web sites, including sites that advocate human violence and hate crimes based upon religion, ethnicity, or country of origin.
  • Intellectual Property. Material accessible through the Services may be subject to protection under privacy, publicity, or other personal rights and intellectual property rights, including but not limited to, copyrights and laws protecting patents, trademarks, trade secrets or other proprietary information. Users will not use the Services in any manner that would infringe, dilute, misappropriate, or otherwise violate any such rights. If a domain name is used with any of the Services, it may not be used in violation of the trademark, service mark, or other rights of any third party.
  • Harmful Content. Users will not use the Services to transmit, distribute or store content or material that may be harmful to or interfere with the Services or any third party's networks, systems, services, or websites. Prohibited harmful content includes, but is not limited to, viruses, worms, or Trojan horses, root kits, password crackers, adware, and key stroke capture programs.
  • Fraudulent/Misleading Content. Users will not use the Services to transmit or distribute content or material containing fraudulent offers for goods or services, or advertising or promotional materials that contain false, deceptive, or misleading statements, claims, or representations. In addition, Users are prohibited from submitting any false or inaccurate data on any order form, contract or online application, including the fraudulent use of credit cards.
  • Email and Unsolicited Messages. Users will not use the Services to (i) transmit unsolicited e‑mail messages, including, without limitation, unsolicited bulk email, where such emails could reasonably be expected to provoke complaints; and (ii) send e‑mail messages which are excessive and/or intended to harass or annoy others ("Spam"). Further, Users are prohibited from using the service of another provider to send Spam to promote a site hosted on or connected to the Services. In addition, Users will not use the Services to (a) continue to send e‑mail messages to a recipient that has indicated that he/she does not wish to receive them; (b) send e‑mail with forged TCP/IP packet header information; (c) send malicious e‑mail, including, but not limited to, "mail-bombing"; (d) send or receive e‑mail messages in a manner that violates the use policies of any other service provider; or (e) use an e‑mail box exclusively as a storage space for data.
  • Third Party Rules; Usenet. Users will not use the Services in violation of the rules, guidelines or agreements associated with search engines, subscription Web services, chat areas, bulletin boards, Web pages, USENET, or other services accessed via the Services.
  • Inappropriate Actions. Users will not use the Services to conduct activities that may be harmful to or interfere with the Services, a User’s terminal session or any third party's networks, systems, services, or websites. Users will not engage in any activities designed to harass, or that will preclude or interfere with the use of Service (e.g., synchronized number sequence attacks) by any other User on the Lumen network or on another provider’s network. In addition, Users will not use the Service (a) by any means or device to avoid payment; (b) to access User’s account or Lumen Services after User has terminated User’s account; (c) on behalf of persons or firms listed in the Spamhaus Register of Known Spam Operations database at www.spamhaus.org; or (d) to engage in phishing activities. Users will not use the Service to engage in any activities that may interfere with the ability of others to access or use the Service or the Internet.
  • Illegal Use: User will not use the Services in a manner that constitutes illegal activities, including but not limited to, death threats, terroristic threats, threats of harm to another individual, multi‑level marketing schemes, HYIP or Ponzi schemes, invasion of privacy, credit card fraud, racketeering, defamation, slander, child pornography and violations of the Child Protection Act of 1984, or any other applicable law.
  • Security Breaches and Obligations. Users are prohibited from violating or attempting to violate the security of the Services or the computers, accounts, or networks of another party, including but not limited to, circumventing the user authentication or security of any host, network or account. Users will not use the Services to cause security breaches or disruptions of Internet communication and/or connectivity. Security breaches include, but are not limited to, accessing data, accounts or systems without authorization or logging into a server or account that the User is not expressly authorized to access and denial of service attacks. Disruptions include port scans, flood pings, email‑bombing, packet spoofing, IP spoofing, forged routing information. User must use reasonable care in keeping its software on the Lumen’s servers up‑to‑date and patched with the latest security updates.
  • IP Allocation. Users are prohibited from using IP addresses not allocated for use or on unassigned VLANs or servers. All IP Addresses currently owned and registered to Lumen are non‑transferable and non‑portable. User retains no ownership or transfer rights. User will only announce border gate protocol (“BGP”) prefixes for which the User owns, shows a valid LOA or WHOIS entry indicating the prefixes are leased or loaned for their use, or acquired from Lumen.
  • IP Portability: Users using Lumen IP space with other ISP’s must also advertise the routes on a directly connected Lumen session. The User’s advertisement to Lumen must not require significant traffic engineering (such as BGP prepending), and the User must have adequate transit capacity.
  • IP Records: Users must maintain current registrations of their ASNs and IP space from the regional registries that assigned such resources. Failure to maintain registration may result in Lumen not providing routing transit for the ASNs and the IP space.
  • Infrastructure Investment and Jobs Act (IIJA) Grant Programs: Any User participating in an IIJA program, including but not limited to, the Middle Mile Grant, Tribal Connectivity Broadband, and the Broadband Equity Access and Deployment (BEAD) Grant Programs, will not pay for Services with funds obtained through the IIJA or other similar grants that would obligate Lumen to provide certain information or perform certain regulatory compliance functions, unless each of those functions and obligations is explicitly identified and agreed to by the parties in the Agreement or in an amendment to the Agreement.


Rights of Lumen.  

  • Lumen may suspend or terminate Service of any User which Lumen believes has violated any element of this AUP. Lumen will suspend Service for violation of the AUP on the most limited basis as Lumen determines is reasonably practical under the circumstances to address the underlying violation. Lumen will attempt to notify Users via email or other method prior to suspending Service for violation of the AUP; provided, however, Lumen may suspend Service without notice if Lumen becomes aware of a violation of any applicable law or regulation or activity, including but not limited to a violation of the AUP that exposes Lumen to criminal or civil liability or that exposes the Lumen network or Lumen customers' network or property to harm. Such harm to a network may include, but is not limited to, risk of having an IP address placed on blacklists. Lumen may take such further action as Lumen determines to be appropriate under the circumstances to eliminate or preclude repeat violations.  
  • Lumen reserves the right to take down any material―or otherwise block access to―created or accessible on or through the Services and suspend or terminate any User creating, storing or disseminating material where Lumen becomes aware that the material violates this AUP and/or exposes Lumen to civil or criminal liability, including without limitation, under applicable copyright laws. Lumen reserves the right to avail itself to the safe harbor provisions of the Digital Millennium Copyright Act.
  • Please click here for information relating to the Service Provider/Designated Agent Information pursuant to the Digital Millennium Copyright Act, 17 U.S.C., Section 512(c).
  • Users are responsible for configuring their own systems to provide the maximum possible accountability. Lumen shall not be liable for any damage caused by such system configurations regardless of whether such configurations have been authorized or requested by Lumen. For example, Users should ensure there are clear "path" lines in news headers so that the originator of a post may be identified. Users should also configure their Mail Transport Agents (MTA) to authenticate (by look‑up on the name or similar procedures) any system that connects to perform a mail exchange, and should generally present header data as clearly possible. As another example, Users should maintain logs of dynamically assigned IP addresses. Users are responsible for educating themselves and configuring their systems with at least basic security. Should systems at a User's site be violated, the User is responsible for reporting the violation and then fixing the exploited system. For instance, should a site be abused to distribute unlicensed software due to a poorly configured FTP (File Transfer Protocol) Server, the User is responsible for re‑configuring the system to stop the abuse.
  • Lumen reserves the right to cooperate with legal authorities and third parties in the investigation of any alleged wrongdoing related to this AUP, including the disclosure of the identity of the User that Lumen deems responsible for the wrongdoing. Lumen will not be liable for any damages of any nature suffered by any User, or any third party resulting in whole or in part from Lumen's exercise of its rights under this AUP.
  • Lumen reserves the right to install and use, or require that User install and use, any appropriate devices to prevent violations of this Policy, including devices designed to filter or terminate access to the Service. By accepting and using the Service, Users consent to allowing Lumen to collect service information and routing information in the normal course of our business, and to use such information for general business purposes. Users may not use the Service to monitor any data, information or communications on any network or system without authorization. Users may not attempt to gain unauthorized access to the accounts or passwords of other Users.
  • In most cases, Lumen will notify Users of complaints received by Lumen regarding an alleged violation of this Policy. User agrees to promptly investigate all such complaints, assign a representative responsible for receciving communications, and take all necessary actions to remedy any violations of this Policy. Lumen may inform the complainant that the complaint is being investigated and may provide the complainant with the necessary User contact information to resolve the complaint directly. 
  • Lumen reserves the right to modify this AUP in its discretion at any time. Modifications will be effective upon posting, and use of the Services after such modification constitutes acceptance of the modifications.

Responsibility for Content. Lumen takes no responsibility for any content or material created or accessible on or through the Services and will not exercise any editorial control over content or material. Lumen is not obligated to monitor material or content but reserves the right to do so.


Violations of this AUP may be reported to: abuse@aup.lumen.com.