Legal Information 

Select the country for your information query

  • Measures in Management, traffic and network administration
  • Resolution 5161-2017
  • Internet Sano
  • Data protection act
  • Important Notice

Calculate the latency and speed of your bandwidth service from anywhere in the region

Resolution 5161-2017

Internet Sano: Protection, prevention, and detection

Internet Sano is the campaign by the Ministry of Information Technologies and Communications so that all Colombians can understand the importance of the prevention of child and youth pornography on the Internet.



‘Internet Sano” is the healthy way to surf the net’

Information about filtering mechanisms that can be installed in the user's equipment in order to prevent and counteract any content of sexual abuse of children or teenagers (MASI)

Download sites:

web site: qustodio

web site: k9 webprotection

1.Internet Sano – IFX Networks

www.ifxnetworks.com (IFX Networks Colombia S.A.S.)  Supports all actions that comply with the measures imposed by law 679 of 2001 and decree 1524 of 2002 for the prevention and detection of child pornography on the internet. For this reason, we are committed to preventing, blocking, fighting, and reporting the exploitation, storage, use, publication and spreading of  images, texts, documents, audio-visual files, improper use of global information networks or the establishment of telematic links of any kind, related to pornographic material or allusive to sexual activities of minors.

In compliance with Decree 1078 of 2015 and its complementary and amending regulations, especially with numerals 2.2.10.2.1. Prohibitions Service providers or servers, administrators and users of global information networks will not be able to: 1. Host images, texts, documents or audiovisual files on their own site that directly or indirectly involve sexual activities with minors. 2. Host pornographic material on their own site, especially images or videos, when there are indications that the people photographed or filmed are minors. 3. Host links on their own site, to telematic sites that contain or distribute pornographic material related to minors. ARTICLE2.2.10.2.2.Duties. Notwithstanding the obligation to report this expressed in the law for all residents of Colombia, providers, administrators and users of global information networks must: 1. Report any criminal act against minors which they are aware of to the proper authorities. This includes spreading any pornographic material associated with minors. 2. Fight against, using all the technical means at their disposal, the distribution of pornographic material with minors. Refrain from using global information networks to share illegal material with minors. Establish technical blocking mechanisms by means of which users can protect themselves or their children from illegal, offensive or undesirable material in relation to minors. 2.2.10.3.3. Administrative Sanctions. Providers or servers, administrators and users who do not comply or violate what is expressed in this chapter, will be sanctioned by the Ministry of Information Technology and Communications successively as follows: 1. Fines of up to one hundred (100) minimum wage legal monthly payments, which will be paid to the Fund Against the Sexual Exploitation of Minors, as expressed in article 24 of Law 679 of 2001. 2. Suspension of the corresponding web site. 3. Cancellation of the corresponding web site. For disciplinary sanctioning, the procedure established in the Code of Administrative Procedure and Administrative Litigation will be applied, in compliance with the due process and criteria of suitability, proportionality and recurrence. Paragraph. The Ministry of Information Technologies and Communications will carry out the pertinent administrative investigations and will impose, if applicable, the sanctions provided in this Title, notwithstanding criminal investigations carried out by the proper authorities and the sanctions resulting therefrom.

Report any event that may be classified as child pornography to the Ministry of Communications. You can find more information about this campaign at the following telephone number:

Ministry of  Communications telephone number: 01900 09 12667

Internet Sano is a campaign of the Ministry of Communications so that all Colombians can understand the importance of prevention of child and youth pornography on the internet.

www.mintic.gov.co

Other institutions where you can make your report:

Central Management of Judicial Police - DIJIN:

Computer Crimes Investigative Group

Carrera 77A # 45-61 Barrio Modelia

PBX phone numbers: 426 6900 Ext. 6301-6302

Direct telephone number: 4266300

adelinfo@dijin.policia.gov.co

Office of the Attorney General of the Nation:

Telephone: 01800 09 12280

www.fiscalia.gov.co

contact@fiscalia.gov.co

Colombian Institute of Family Welfare:

Bogota Telephones: 01 8000 91 8080 - 6605520 - 6605530 - 6605540

Available from 7am to 9pm from Monday to Sunday

www.bienestarfamiliar.gov.co

  1. TERMS AND CONDITIONS

Terms of Use of the IFX Website

Unless otherwise indicated, the information on this website is property of IFX Corporation and it is protected by the property rights of IFX Corporation, Copyright © 2001 of IFX Corporation (“IFX”). All rights reserved.

Agreement of terms and conditions

When you enter this site, you acknowledge to have read the terms and conditions described below and agree to follow them. If you do not agree with these terms and conditions, you must leave website now.

Intellectual property

IFX hereby authorizes you to see, copy, print, and distribute content from this website, provided that such content is used exclusively for information or non-commercial purposes. The use of information for other purposes is not authorized. Taking this authorization in account, you agree that any copy of these documents will keep all copyright and other proprietary notices that it may contain. IFX Networks and the IFX logo are registered trademarks or service brands of IFX Corporation. You are not to use these marks, or any other brand of IFX, without prior authorization, in writing, from IFX Corporation.

Nothing contained in this document can be understood as granting, whether by implication, dismissal or otherwise, of any license or right under any patent or trademark of IFX or third parties. Apart from what is expressly stated above, no information contained in this document will be understood as granting of any right or license under any copyright of IFX.

Documents published by IFX on the World Wide Web Server are delivered "AS IS" AND WITHOUT WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, SUITABILITY FOR A PARTICULAR PURPOSE OR INFRINGEMENT. Under no circumstances will IFX have legal responsibility for any special, punitive, exemplary, incidental, indirect or consequential damages, including but not limited to, damages resulting from the use OR TRUST IN the presented information, loss of assets or income or costs due to the replacement of goods, even if there is information about such damage in advance.

Every commercially reasonable effort will be made to ensure the accuracy of the information presented. However, IFX assumes no responsibility for the accuracy of the information. Product information is subject to change without prior notice. The changes, if any, will be incorporated into new editions of these publications. IFX may make improvements and / or changes in the products and / or programs described in these publications, at any time and without prior notice. Any mention of products or services not owned by IFX is for information purposes only and does not constitute endorsement or recommendation.

Links

While this website may contain links to third-party sites, IFX is not responsible for the content of any of the sites to which such links are directed. IFX provides these links for your convenience and does not endorse the companies or the contents of any of the sites to which such links are directed.

Publication of information

Publishing or transmitting any content that is unlawful, threatening, obscene, insulting or otherwise offensive is strictly prohibited.

Deliveries

Any content, information or idea sent to this website or published on it, will be considered as non-confidential and will not be subject to intellectual property. IFX may share or otherwise use the content sent, for the purposes that IFX deems appropriate. If the information sent is of personal nature, you accept that IFX may use such personal data beyond international borders for commercial purposes that IFX deems appropriate.

Jurisdiction and choice of applicable law

This agreement and all claims or disputes relating to this website will be governed by the laws of the State of Florida. Any legal action related to these Terms and Conditions or to this website must be filed within one (1) year after the claim or cause of the action arises, and it must be done in the State of Florida.

All products and brand names are trademarks or registered trademarks of their respective owners.

The products and services may vary from country to country. Contact your local IFX representative for specific information.

IFX Privacy Statement

For a long time we at IFX have acknowledged that the people who we do business with value their privacy. However, in order to carry out global business in this growing electronic economy, the gathering of personal information is generally necessary and desirable. IFX is committed to balancing the benefits of electronic commerce with the rights of individuals, with the aim of avoiding the misuse of your personal information.

Gathering of information from domains

IFX also gathers information regarding domains, as part of its analysis of the use of this site. This data allows a better understanding of the type of customer that visits our site, how often they visit it and which parts of the site they visit most frequently. IFX uses this information to improve its Web-based offerings. This information is gathered automatically and does not require any action on your part.

Cookies

Some pages on this site use "cookies", which are small files that the website places in your hard drive for identification purposes. These files will be used the next time you visit us for registration and personalization purposes. It should be noted that cookies cannot read data outside of your hard drive. Your Web browser can be configured to notify you when you are receiving a cookie, giving you the option of accepting it or not. If you do not accept cookies, some pages may lose functionality and you may not gain access to specific information on the site.

By simply using this site, you expressly agree with the IFX Privacy Policy. We reserve the right, at our sole discretion, to change, modify, add or remove portions of this policy at any time. The use of www.ifxnetworks.com after the changes to these conditions means your acceptance of said changes.

Forward-looking statements

The information on this website contains statements to be understood in accordance with the "Private Securities Litigation Reform Act" of 1995, including statements regarding IFX's business development projects (IFX), IFX's efforts to create strategic alliances and new products, as well as the growth of the customer base and users of IFX services.

These statements reflect current IFX views regarding future financial performance and events. Such statements are subject to certain risks and uncertainties that could result in significant changes in events and results. Potential risks include IFX's limited operational experience in the Internet network area, IFX's ability to attract significant additional financial investment and the possibility of continuing to incur losses and negative operational cash flow, as well as risks associated with international expansion, particularly in Latin America. Additional risk factors that could affect the financial performance of IFX are detailed in the reports and documents regularly recorded and filed with the Securities and Exchange Commission of the United States.

  • PROTECTION OF THE RIGHTS OF SUBSCRIBERS / USERS REGIME
  • PQR PROCEDURE AND PAPERWORK
  • AUTHORITY THAT EXERTS CONTROL AND SURVEILLANCE
  • USER SUPPORT (PQR)

You can contact us at the following telephone numbers:

Barranquilla (5-75) 3610430

Medellin (5-74) 3106730

Cali (5-72) 6082230

Bogotá (5-71) 3693030

Free of charge for other cities: 01-8000-117587.

  • REQUESTS, COMPLAINTS AND CLAIMS

3. ACCEPTABLE USE POLICIES

The IFX Acceptable Use Policy (the "Policy") for Internet Products and Services is designed to protect IFX Corporation and its affiliates (collectively, "IFX"), its customers, and the Internet community in general from irresponsible or, in some cases, illegal activities. The Policy constitutes a list that is not exhaustive or exclusive of actions prohibited by IFX. IFX reserves the right to modify said Policy at any time, without prior notice to its customers.

Prohibited Uses of IFX Systems, Products and Services:

  1. Streaming, distribution or storage of any material that violates any applicable law is prohibited. This includes, without constraints, content protected by reproduction rights, trademark, business secret or other intellectual property right used without proper authorization, and content that is obscene and/or defamatory, constitutes an illegal threat or violates the laws of control of exports.
  2. Sending unsolicited email messages, including sending "junk mail" or other advertising material to people who have not specifically requested such material (e.g., "flood with email messages" or "spam"). The recipient's repeated complaints will make the messages seem as "unsolicited", as well as requests not to continue receiving such material. This includes, without constraints, mass commercial advertising, informational announcements and political communications. It also includes the publication of the same or similar message in one or more newsgroups (excess of cross-publication or multiple publications).

Misrepresentation in the message header in order to hide its true content is strictly prohibited. The Customer is also prohibited from hosting sites that are advertised through unsolicited email messages or sites that generate these types of unsolicited messages, even if they are not generated directly from this site. Hosting, advertising, marketing or making any software, program, product or service designed to violate this Policy in any way available to third parties or that violates the acceptable use policies of another Internet access provider, including, but not limited to, programs designed to send messages with unsolicited advertising ("spamware"), which are prohibited in this document.

The maintenance of any service network that allows, without restrictions, the sending of messages or emails by third parties, including, but not limited to, open mail servers ("open mail relays") and  mailing lists that do not have effective authentication methods (e.g., "confirmed opt-in") is strictly prohibited. IFX accounts or services may not be used to receive replies to messages sent from another Internet Service Provider if said messages violate this Policy or that of another provider. The Customer assumes responsibility for the compliance of this Policy and must hold IFX account less for any penalty or fine associated with sending unsolicited emails, including costs associated with other Internet access providers.

  1. The Customer is prohibited from associating with any activity that has as its object or seeks to interrupt services of other uses or Internet networks. This includes, but is not limited to, Internet Message Control Protocols or other types of attacks and transmissions of malicious electronic message packets ("mail bombing"). Any spam practice that IFX considers to seriously threaten its public image or its relationship with third parties, will cause the immediate interruption of the service until both parties agree on a solution that is acceptable to both.
  2. Resale, release or transfer of Voice Services over IP to third parties (e.g., "leaking"), without the express written authorization of IFX.
  3. Unauthorized use or misrepresentation of mail header information (e.g., "spoofing").
  4. Access without authorization or trying to obtain unauthorized access to any account or computer resource that does not belong to the Customer (e.g. "cracking"), or to the IFX network.
  5. Obtaining or attempting to obtain services by any means or device with the purpose of avoiding payment.
  6. Unauthorized access, alteration or destruction, or any attempt thereof, of information about IFX customers or end users through any means or device.
  7. Voluntary involvement in any activity regarding authentication of users or their security, or that results in a denial of service (e.g., attacks on sequences of synchronized numbers) to any customer or end user of IFX that is in the network of IFX or in the network of another provider. This includes, but is not limited to, accessing information not provided by the Customer, registering on servers or accounts to which the Customer has not been expressly authorized to access; or test the security of other computer systems or networks.
  8. Participation in sending data or information that is contrary to federal, state or municipal laws, applicable to the service.
  9. Use of IFX Products and Services to interfere with the use of the IFX network by another customer or authorized user. Each IFX customer will be responsible for the activities of its customer / representative or end user base and, by accepting the service offered by IFX, is committed to advancing these standards and enforcing them. In the case of violations to the Acceptable Use Policy, IFX reserves the right to cancel the services or take steps to prevent the Customer from committing a violation of the IFX PUA, at its sole discretion and without prior notice.

The Customer shall compensate, defend and keep IFX without injury from claims, lawsuits, actions, damages, liability, trials, expenses and costs (including the reasonable rates of lawyers) arising from the conduct of the Customer. IFX will make reasonable efforts to notify the Customer of any claim seeking compensation of which it has knowledge as soon as possible, granting the Customer the opportunity to participate in its defense from said claim, agreeing that the Customer’s participation in any case may be conducted to the detriment of the interests of IFX, as reasonably determined by IFX. The inability to notify the Customer in a reasonable period of time shall not free or excuse the Customer from its obligation to compensate IFX, its related parties, subsidiaries, members, affiliates, officers and employees.

This Policy is part of the Services Agreement between IFX and you ("the Customer"), incorporated in this Service Agreement for reference. Any modification made to the Policy must be considered as incorporated to this Policy and to the Services Contract. The continued use of the Service by the Customer will imply its tacit acceptance of the modifications made.

Complaints regarding illegal use, network security, abuse or spam, must be sent to abuse@ifxcorp.com


Law 679(2001)


Sentence C-442


Decree #1524(2002)


Data protection act
REGIONAL IFX, LIVISTER, EMERGING

Dear Partner, Customer, Consultant, Provider or others

THE COMPANY informs that in accordance with the regulatory developments at the regional level of Protection of Personal Data, which develops people's right to know, update, rectify or delete personal information that has been collected about them in any database or archive.

THE COMPANY, states that the data that you may provide at the time of signing the contractual or pre-contractual document, or when referring to the links of the commercial proposal or by virtue of promotions, advertising, data update and other marketing activities, statistics are hosted in our information system in a secure manner for the full development of our corporate purpose. These are used to inform you about our services, your status, billing, news, different topics of general interest and also to have constant communication with our partners, customers, known suppliers and other natural or legal entities, national and foreign, through electronic and physical means.

THE COMPANY, allows itself to inform you that it protects the data provided by you, by virtue of the provisions of the current regulations of the country where you are located. Likewise, we allow ourselves to inform you that you, by virtue of the Law, have the following rights, among others: knowing, updating and rectifying your personal data, requesting the deletion of your personal data when you deem it appropriate. These rights can be demanded through our mail contact contactenos@ifxcorp.com

Now, in order to continue treating your data for the purposes mentioned above under the standards of security and quality, if within thirty (30) business days, starting from the knowledge of the communication sent by our company, you have not requested the deletion of the data supplied to THE COMPANY, it will continue to use it for the purposes mentioned above.

In case you do not wish to receive information from THE COMPANY, or wish to be excluded from our databases, you can do so by sending an email to the following address: contactenos@ifxcorp.com

REGULATORY FRAMEWORK FOR EACH COUNTRY:

COLOMBIA: Law 1581 from 2012 and Decree 1377 from 2013
CHILE: Law 19628 from 1999
PANAMA: Law 6 from Access to Information (2002)
ARGENTINA: Law # 25.326 from Protection of Personal Data and its regulations, Decree # 1.558/2001.
USA: Sectorial Laws at federal level, HIPAA
GUATEMALA: Initiative 4090-2009 Law on Protection of Personal Data, Decree # 57-2008
URUGUAY: Law # 18.331 from August 11, 2008

 

Important Notice
August 2018

Information directed to the general public. We would like to inform that we have knowledge of users of cell phones that are receiving text messages with promotions and awards that are not authorized for IFX NETWORKS COLOMBIA. Those messages are false and with criminal intent. This behavior has already been formally reported to the proper authorities and is being investigated to identify suspects.
However, with the purpose of avoiding more complex and undesirable situations, we ask to omit those messages if you are receiving them.
We appreciate your attention and we are available to answer any questions you might have regarding this issue.

IFX NETWORKS COLOMBIA S.A.S
Bogota, Colombia

  • Users’ Rights
  • Contract of Dedicated Link Services
  • Policy and Procedures

IFX NETWORKS Users’ Rights

DEAR CUSTOMER,

YOU, AS AN IFX CUSTOMER, HAVE THE FOLLOWING RIGHTS:

  1. The maximum time limit to make a complaint is sixty (60) working days from the moment occurrence that fueled the complaint happened. In case of rejections to charges, the maximum established payment date will be considered.
  2.  You have the right to make a complaint on our website WWW.IFXNETWORKS.COMYou have the right to make a complaint on our website
  3. Once the complaint is issued, the deadline to provide an answer to the complaint is 5 working days.
  4. In case you do not receive an answer within 5 working days as indicated previously, you can demand immediate solution to the problem.
  5. You can ask for the solution to your complaint at the Ministry of Telecommunications in case you do not agree with the answer you received or in case of no answer within the following 30 working days.
  6. In case you make a partial complaint regarding the charge of the hired service, you can only pay the part of the bill that is not being questioned. In those cases, charges will be suspended until the issue is completely solved.
  7. You have the right to enter into telecommunication services contract which will be sent with all the contract details so you can acquire our services. This contract cannot be altered unilaterally and must be respected by both parties.
  8. You have the right to receive your service without interruptions or alterations
    .
  9. In case of discontinuity of the hired service, IFX will make the necessary compensation and the one you are entitled to.
  10. You have the right to only be charged for the service provided.
  11. You have the right to freely access internet content.
  12. You can use any type of device to use the internet service as long as it is legal and does not affect the quality of service.
  13.  You have the right to know all the conditions of the hired service and to be informed in a truthful, timely, efficiently, transparent, and updated manner.
  14. You have to right to receive the hired service without any type of discrimination.
 

IF YOU ARE A USER OF A LOCAL TELEPHONE SERVICE OR CELL PHONE SERVICE, ADDITIONALLY, FOR THESE SERVICES, YOU WILL HAVE THE FOLLOWING RIGHTS:

  1. You have the right to terminate the contract at any moment without any reason with a 60 day notice. The termination notice for the local telephone service or cell phone service must be provided in writing.
  2. You have the right to communicate from your phone at any moment in an emergency situation without cost to you.
  3. You have the right to change telecommunications company while keeping your hired phone number.
  4. You have the right to block or enable access to national or international long distance services as well as cell phones and complementary services.

Contract of Dedicated Link Services

IN THE PLACE AND TIME INDICATED IN ITEM 4 OF THE OBVERSE OF THIS CONTRACT, BETWEEN IFX NETWORKS CHILE S.A., TAX PAYER NUMBER 96.779.080-K, REPRESENTED BY MRS. LILIANA PINO MARTÍN AND MR. RAMÓN ROJAS VIVANCO, ALL LOCATED AT 92 EL BOSQUE CENTRAL AVENUE, FLOOR 11, LAS CONDES, SANTIAGO, FROM NOW ON “IFX NETWORKS”, ON ONE HAND; AND ON THE OTHER HAND AND FROM NOW ON “THE CUSTOMER” INDIVIDUALIZED IN ITEM 1 OF THE OBVERSE, WHO AGREE WITH THE FOLLOWING CONTRACT OF SERVICES:

1.OBJECT AND RATE

For the present document, IFX Networks will supply the customer the connectivity services to internet, lease of links and/or computing hardware (the “services”), either by own means or by a third party, in the terms and conditions provided in item 2 of the obverse and in the current document. The services will have the rate or monthly charge mentioned in item 2 of the obverse; the rates shown correspond to the net value so a Value Added Tax (VAT) should be added. The rates shown in ‘unidades de fomento’ (UF) will be billed by IFX Networks to the customer, in national currency, the day of payment. In case the UF ceases to have effect, the way to add up the charge  will be modified. Both parties agree that all the previous statements in the contract, will be considered as UF value, the last one to be valid, correctly adjusted to the variation of Consumer Rate Index determined by the National Institute of Statistics or by who replaces it in its functions.

IFX NETWORKS OBLIGATIONS

2.1) Supervise the connection between the networks of both parties remotely.

2.2) Provide service of Secondary Name Server.

2.3) interconnect the customer’s TCP/IP network to its network through permanent synchronous channels that will use TCP/IP protocol.

2.4) Provide the customer with a set of 8 IP addresses for the customer’s exclusive use. If the customer declines service or if the contract is terminated, the IP addresses will remain in IFX Networks possession. At the beginning of the service, IFX Networks is required to provide clean IP addresses, that is to say, addresses that are not registered in blacklists.

2.5) Provide access to Internet, 99,6% of available monthly uptime, except in the case of service suspensions mentioned in 2A.3 and 2A.4 and in the cases of unexpected or random situations mentioned in 4.3, item iv of this document. In the case of service unavailability, what is established in article 27 of the General Law of Communications will be applied.

2.6) IFX Networks guarantees that its software, as well as the computing hardware that will be used for service delivery, are free of computer viruses.

2.7) IFX Networks specifically declares that the service, software and computing hardware comply with all the technical standards both nationally and internationally related to those services.

2A IFX Networks Capabilities

2A.1) Perform all the technical efforts the lead to maintaining service.

2A.2) Make all the necessary changes with providers of national digital links to which the customer connects to IFX Networks.

2A.3) Temporarily suspend all services because of technical maintenance or because of changes in digital links. IFX Networks is required to communicate the customer in a timely manner and by the fastest way possible and at least 24 hours in advance of the suspension of services because of these.

2A.4) Temporarily suspend the services because of customer’s non-compliance or tardiness in the monthly rate payment. Simply being late with the payment due date allows IFX Networks to proceed with suspension. The suspensions originated by reasons mentioned in this document will provide IFX Networks with the right to bill the customer the cost associated to service restoration.

3) CUSTOMER’S DUTIES   

The customer is required to pay the bill or monthly service rate mentioned in item 2 of the obverse within 30 days of receiving the bill. IFX Networks will issue the corresponding bill under the advance month modality, regularly in the bill cycle chosen by the customer. The first bill will be issued once services have been installed. Each bill will be considered to be accepted by the customer if it is not objected in writing, by means of certified letter, within 8 days after having received the bill. In the case of objection, the customer will pay the non-disputed rate within the agreed terms. The objection will be resolved by mutual agreement within 5 days of being communicated. For purposes of installation, connection, and implementation of services, the customer is required to pay for the digital link, bandwidth of internet access and the lease of a router or communication channel whose values and modalities are specified in item 2 of obverse. A delay in payment of more than 1 day  of any of the customer’s obligations allows IFX Networks to demand and charge the conventional maximum interest rate for the whole of the delayed time and with the right to suspend service. Notwithstanding the above, after 60 days of the first unpaid bill, IFX Networks will be able to keep the service suspended or to exercise the right to what it is established in section 6 without the customer having the right to any type of compensation. IFX Networks will be able to suspend or terminate service indefinitely without the customer having any right to compensation for that suspension. The suspensions caused by the reasons mentioned in the current document will provide IFX Networks the right to charge for the cost associated to the restoration of the service.

3.2 Be responsible for the use of the primary name of the server, email, file servers, news servers, etc. Regardless of the customer requesting additional services from IFX Networks.

3.3 Comply with and enforce in those who use service, the Policies of Acceptable Use mentioned in item 4.2 and comply with all the regulations about the responsible use of the network of IFX Networks, specially avoiding purposeful damage to information stored in computers of other institutions in the networks or by any means.

3.4 Adopt the measures related to information security stored in your computers. Obligation that is of the CUSTOMER’S exclusive responsibility.

3.5 Respond for the care of computing hardware delivered by IFX Networks, leased or under any other contract, responding for any type of damage or loss, attributed to fraud or customer’s or subordinate’s fault. The same will be applicable to any computing hardware that other providers delivered to the customer under the current contract. In case of violation, IFX Networks has the right to terminate the contract early according to what it is stated in item 6.

3.6 Facilitate IFX Networks staff access to its premises in office hours and with previous notification for the installation of necessary equipment to provide Services.

3.7. RETURN COMPUTING HARDWARE. If the customer would like to terminate the contract, in advance or after term has expired, the customer will have to return all hardware that belongs to IFX Networks as indicated in item 3 of the obverse, in perfect conditions, accepting only the normal wear and aging of equipment. The hardware must be returned at an IFX Networks location. On the contrary, if the contract is terminated because of customer’s fault or because of any other cause, the customer must have hardware immediately available for IFX Networks or return it where IFX Networks requires within 5 days of notification. Hardware must be in perfect conditions accepting only the normal wear and aging of equipment. If the customer does not return hardware within 5 days, IFX Networks has the right to be compensated for the damages in the computing hardware by applying a penalty against the customer representing the restitution rate of equipment mentioned in item 3 of the obverse.

  1. RESPONSIBILITIES
    4.1 Internet Use: The customer states they know the legal obligations and consequences that the use of internet implies. Therefore, the customer, specifically liberates and exempts IFX Networks and all its network access providers of any direct, indirect or future responsibility that could occur as a consequence of any infringement to current laws, especially to Intellectual Property Law 17,336 and to Industrial Property Law 19,039 and its modifications, as well as to Treaties, international agreements about this or other topics that the country of Chile has entered into and has been recognized as a law of the Republic. The exemption of responsibility of IFX Networks includes any action(s) or omission(s) contrary to law, by the customer or third parties, regarding which IFX Networks and its providers lack any authority or legal faculty to prevent causes of damage or detriment to network users.

4.2 Policy of acceptable use: The customer accepts and is required to comply with the policy of IFX Networks acceptable use which the customers states to know, that it is part of this contract and is available at:

The customer authorizes IFX Networks to, prior communication, modify said policy. Modifications will be approved if customer does not state the contrary within 5 days of communication.

4.3 Exemption of Responsibility of IFX Networks: IFX Networks does not assume any responsibility regarding what the customer received from the network or services provided by it, as well as the use of information that the customer could add or broadcast in the network. Nor does IFX Networks assume responsibility regarding the following situations: i) quality of information that is obtained through the network, ii) damages or detriment that could result from the use of the network, iii) damage that could occur to the customer’s data except the damage or loss of information in magnetic devices and/or backup that customer uses, originated or direct consequence of the service provided by IFX Networks, and iv) Suspension of functioning and/or operation by unexpected reasons (such as earthquakes, blackouts, transmission lines, terrorist attacks, others)

  1. VALIDATION AND SERVICES START DATE

5.1 Validation: This contract will be valid as established in item 4 of the obverse. It will be valid as of service starting date. At the end of the term, the contract will be automatically renewed for an equal period, until one of the parties decides to terminate the agreement in writing. That communication has to be provided at least 60 days in advance of the expiration of the term or any of its extensions.

5.2 Early Cancellation: if the customer requests cancellation of the contract before the validation term mentioned in the previous item, either the initial cancellation or any of its extensions, the customer shall pay IFX Networks 100% of the payment corresponding to the remaining months as penalty.

5.3 Service start date: The service start date will be the one that is stated in the reception form according to the Installation Service or the Installation File which was signed by the customer and is part of the current contract.

5.4 Rescission: The current contract will be rescinded if there is no technical feasibility necessary to start services. Both parties can return to their identical states before they entered into the contract.

  1. Breach of Contract: the refusal to perform any of the obligations stated in the current contract will allow the other party to terminate the contract ipso facto by sending a certified letter within 15 days in advance. If the breach is the customer’s, IFX Networks will have the right to terminate services and the customer will be required to pay 100% of corresponding fees as penalty. If the breach is IFX Networks’, the customer will report this breach the fastest and the most suitable way so IFX Networks can correct the issue as soon as possible. Once services are restored, the customer will have the right to receive a discount on the monthly payment proportionate to the service interruption.
  1. Release.

None of the parties can give up or transfer the current contract agreement in favor of an insolvent person and that does not belong to the same economic group without the previous consent provided by in writing by the other part.

  1. Modifications and Technical annex

Both parties by common agreement will be able to modify the current contract agreement adding the corresponding modifications through annexes. IFX Networks has the right to add technical annexes to the current contract agreement with the purpose of facilitating the operation and functioning of service delivery. Those annexes will try to provide a better service and will not imply additional costs for the customer. They cannot imply, by any means, a decrease of services to be provided according to the current contract. The customer is required to comply with the technical instructions that through pertinent annexes are communicated by IFX Networks. The number and content of technical annexes that can be added to the current contract agreement can be modified by IFX Network when needed for a better service delivery.

  1. COMMUNICATION

All the notifications and communications related to the current contract will be written and sent to the counterpart’s address by certified mail as mentioned in the obverse. For technical and emergency purposes, the customer accepts as their contact the one established in item 6 of the obverse. It will be the customer’s responsibility to maintain all information updated, otherwise IFX Networks will not be responsible for lack of timely communication and will comply with its obligation notifying the established contact. The customer states that all data provided for the current contract is true and guarantees that the information provided obeys the truth. The customer will be responsible under applicable law if false or malicious information is provided.

  1. ELECTRONIC BILLING

In conformity with Res. Ex. 11 of February 14, 2003 from the Internal Revenue Service, the customer can be part of the electronic billing system that allows customers to receive bills electronically according to applicable regulations. If the customer decides not to receive electronic bills, they will have to pay for the monthly manual billing cost that will be unilaterally determined by IFX Networks.

  1. ADDRESS AND SOLUTION OF DISAGREEMENTS

For all the legal effects derived from the current contract, the parts are subject to the jurisdiction of the Local Court and set their address in Santiago.

  1. NUMBER OF COPIES

The current contract is subscribed in two copies of identical transcript, one copy for IFX Networks and the other copy for the customer.

Policy and Procedures

Dear Customer,

According to article 27 of the General Telecommunication Law, we inform that in those cases in which the service hired through IFX Networks Chile SA, for causes not imputable to the user that exceed 6 hours in a day or 12 continuous or discontinuous hours in a month, the difference will be deducted from the monthly rate of your bill in the ratio of 1 day for each 24 hours or fraction higher than 6 hours.

In the case of suspension, interruption or alteration exceeding 48 continuous or discontinuous hours in the same month and is not an unintentional error or a random issue, IFX Networks Chile SA will compensate the customer with the equivalent of the triple of the daily rate for each day of suspension, interruption or alteration of the service. If your service is billed as a fixed charge, discounts will be made by the extension of the validity of the cards used to this effect. In the case compensation is requested, it will be considered according to monthly consumption billing and it will be reflected in the billing period related to the month when the issue happened.

  • Argentina digital Law 27.078
  • Decree 1558/2001
  • Protection of Personal Data Law 25.326

ARGENTINA DIGITAL

Ley 27.078

Law 27.078

Technologies of Information and Communication

Approved: December 16, 2014

Enacted: December 18, 2014

More information

ARGENTINA DIGITAL

Decree 1558/2001 (Official bulletin 29.7897, December 3, 2001

Approval of Law 25,326. General principles related to data protection. Rights of data holders. Users and people in charge of files, registries, and data banks. Control. Sanctions.

Decree Law 1558/01

Protection of Personal Data

Law 25.326

General dispositions: General principles related to data protection. Rights of data holders. Users and people in charge of files, registries, and data banks. Control, Sanctions, Action of protection of personal data.

Approved: October 4, 2000.

Partially enacted: October 30, 2000.

More information.

  • Security Policies
  • Conditions and Legal Restrictions
  • Ethics Code
  • Acceptable use Policy

Implementation of Security Policies

BACKGROUND

It’s obvious that security should come from a carefully developed process from the conception and design of the system, along its implementation, to the necessary policies and practices for its installations and use. It’s essential that security is present in the development of the norms from the beginning and not during its application because vulnerable points appear from the start.
The communications industry has contributed to increase productivity and connect communities all over the world in almost every aspect of the industry, because it has developed at the speed of a commercial environment that is increasingly globalized. A big portion of this success is based on the development of standards by ITU-T
Even though existing standards facilitate the efficiency of current networks and systems and prepare the space for future ones, the increasing use of open interphases and protocols, the variety of new actors, the impressive diversity of applications and platforms, and the implementations that are not always efficiently tested, have caused an increase in the malicious uses in the networks. The number of security violations (for example, virus spreading, violation of confidentiality of stored data) has increased significantly in worldwide networks, frequently generating costly effects.
That is why it is important to ask ourselves how can an open communications infrastructure be supported without having its information exposed to security problems? The answer is found in the efforts of the groups of normalization that fight the threats to security in all areas of the telecommunications infrastructure. They start with details in the specifications of protocols, applications to network management. IFX Networks follows the different recommendations developed by ITU-T to guarantee reliability and quality of its telecommunications infrastructure, services and corresponding applications.
And thus, conforming to article 6 of the resolution 2258 from 2009, we deliver strategy reports for network security:
1. General definitions
For a better understanding of the approaches that IFX Networks presents in the current document, this one has been interpreted according to the following general considerations that are established in article 1.8, resolution CRT 1740 of 2007 and in article 1, resolution CRC 2258 of 2009:
1.1 Access to internet: Physical access that includes all the functionalities and necessary national and/or international connections to allow a user to establish communication with an internet node. A node is a TIER-1 point or a national access point (NAP).
1.2 Commuted Access: Form of Internet access in which the connection between the user terminal and the access equipment of the operator providing the Internet access is done through dialing over a telephone line of the TPBC network.
1.3 Bandwidth: It’s the transmission capacity with enough bandwidth to allow wired or wireless supply of voice, data and video. For marketing purposes, take into account that a "broadband" connection will be considered as such if the effective access speeds meet the following minimum values:
Direction of the Connection, Minimum effective Speed
ISP towards user 512 kbps or downstream
User towards ISP 256 or upstream
1.4. Narrow band: It’s wired or wireless transmission capacity with an effective data transmission speed lower than the one established in bandwidth.
1.5. Quality of service (QoS): It’s the global effect of the quality of a service function that determines the degree of service satisfaction by the user.
1.6. Data transmission Speed: It’s the speed with which data can be transmitted from one device to another. Data rates are often measured in bits per second.
1.7. Authentication: The process of providing the system a way to ensure identification of something.
1.8. Authorization: Process of rights assignment or permit concession to perform determined activities and its relation to determined processes, entities, legal or natural persons.
1.9. Cyberspace: It is the physical as well as virtual environment made from computers, computer systems, computer programs (software), telecommunication networks, data and information used in user’s interactions with each other.
1.10. Cyber security: It is the tool kit, policies, security concepts, guidelines, methods of risk management, actions, best practices, insurance and technology that can be used to protect the computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.
1.11. Data confidentiality: To avoid data from being spread without authorization.
1.12. Availability: Authorized entity access to the information and computer systems whenever this entity needs it.
1.13. Entity: Natural or legal person, organization, element that belongs to computing hardware or a computer program.
1.14. Critical infrastructure: It’s the amount of computers, computer systems, telecommunication networks, data and information whose destruction or interference can weaken or impact the security of the economy, public health or both of a nation.
1.15. Data integrity: Property or characteristic of maintaining the accuracy and completeness of the information.
1.16. Interception: It’s the acquisition, visualization, capture or copy of content, data or part of content of communications transmitted wiredly, wirelessly, optically, magnetically or other ways during transmission utilizing electronic, mechanic, optical or electromagnetic means.
1.17.Interference: It’s the action of blocking, hiding, avoiding or interrupting the confidentiality, integrity of computer programs, computer systems, data or information through the transmission, damage, erasing, destruction, alteration or suppression of data, computer programs or data transfer.
1.18. Interruption: It’s the event caused by a computer program, telecommunications network or computer system that interferes or destroys a computer program, a telecommunications network, data or information which it contains
1.19. Nonrepudiation: Service whose objective is to ensure that a transferred message has been sent and received by the parties claiming to have sent and received the message. Nonrepudiation is a way to guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message.
1.20. Pharming: It’s the action of modifying the Domain Name System (DNS) server, switching the correct IP address for another one. The user then is redirected to a different IP while he believes he’s at the correct website.
1.21. Phishing: It is the act of sending an email to a user, falsely claiming to be an established legitimate business in an attempt to scam the user into surrendering private information that will be used for identity or password theft.
1.22. Malicious software (Malware): It’s a computer program specifically designed to damage or disrupt the confidentiality and integrity of a computer system, telecommunications network, information, and data transfer. It includes any type of malicious code, from spyware to key loggers and computer viruses, worms or Trojan horses that can be distributed through e-mail addresses, websites, shareware or freeware.
1.23. Vulnerability: An unintended flaw in software code or a system that could potentially be exploited
1.4. Guarantee in network security and the integrity of service to avoid interception, interruption and interference of the service.
IFX performs permanent monitoring of each of the services that are offered in order to identify any event or malware in time and appropriately. For this purpose it uses computing hardware located at strategic points in the network monitor the following:
Status of network computing hardware
Logs of activities performed in computing hardware
Monitoring of the traffic behavior in different sectors of the network such as interconnection points, peering and node concatenation.
Detailed reports via Firewall control where you can find specifications and details of the traffic carried out by critical points in the network, signatures of attack, permanent vulnerability analysis in devices and mission-critical servers. Back up of Network devices , backups and absolute redundancy of data bases, protected by structures of minimal public display.
Committees of security evaluation where vulnerabilities and network critical points are detailed and exposed and tools to cover detected failures are established.
1.5. Security models according to the characteristics and needs of the network that contribute to improving security of the access networks according to security frameworks defined by ITU.
IFX NETWORKS COLOMBIA as a provider of telecommunications services and complying with the requirements of surveillance and quality control authorities, has implemented models to protect networks and end users in the terms established by the current law:
1.5.1. Authentication
According to standards ITU X.805 y X.811, authentication consists of proving the veracity of the identity claimed by an entity. In this context, not only people are considered entities, but also mechanisms, services, and applications. With authentication, the goal is to guarantee that an entity is not trying to steal an identity or provide an unauthorized answer to a previous communication.
Messaging and collaboration services offered by IFX to its customers have authentication systems based on LDPA architecture which, on top of being robust and reliable, allow the use of encrypted passwords. That way credentials are known only by the end user, guaranteeing an additional level of information confidentiality.
Additionally IFX offers digital signature services for messaging and collaboration products so customers can guarantee authenticity of the origin of an e-mail to their receptors avoiding identity theft or an unauthorized answer to a previous communication.
For both our shared and dedicated web hosting services, IFX applies the security model at domain level. Understanding the domain as the security environment that encloses the services of each customer. Under this model and after it is authenticated, the subscriber has total access to information including the data bases they own. With this control you will be able to create users with specific privileges under the security domain which is under the responsibility of the customer who owns the domain.
In the service of dedicated hosting, IFX provides customers total control of the hardware system, base operational system and software; that way the management of authentication services is under the customer’s total responsibility.
1.5.2. Access control
The security assessment of access control protects against the use of network resources without authorization. Access control guarantees that only authorized people and devices can access the network elements, stored information, information flow, services and applications. Access control is defined in clauses 6.3/X.810 and ITU-T X.812. Although it deals with authentication, it’s outside its reach.
a) Physical security, IFX Networks has several years of experience in designing, building, and operating the data centers at medium and big sized scale in all our points of direct presence in the United States and Latin America. This experience has been applied to our platform and infrastructure.
IFX Networks data centers are located in facilities with protected physical parameters including surveillance systems with 7x24x365 coverage. For our data centers located in type Tier IV facilities, there are strict security measures with military grade control of the perimeter. Physical access is strictly controlled, both around the perimeter as well as at the access points to the building by security experts supported by video systems, intruder detection systems and other electronic support.
Authorized staff members must comply with at least 2 authentication factors to physically access a data center. All guests and contractors must present ID and sign in, after that they are accompanied by an authorized staff member at all times.
IFX Network only provides access to data centers to employees who have a legitimate business need. Access is immediately revoked when said need ends even if they continue to be IFX network employees. All employees’ physical and electronic access to IFX Network data centers is registered and audited on a regular basis.
b) Logical access security: Logical access Security to the different IFX Network hosting platforms is supplied at multiple levels: operational systems, virtual instances, applications and firewall. Each of these items is built under the capabilities of the others. The goal is to ensure that the data contained inside the different IFX Network hosting platforms cannot be intercepted by unauthorized systems or users, and that the diverse instances of IFX Networks services provide the highest possible security without compromising the flexibility in configuration and functionality that customers’ demand.
• Security at operational system level: IFX Network system administrators with business needs related to hosting services must supply credentials to have access with basic privileges to the different systems. Said access process happens in a centralized security environment through LDAP authentication and using protocols SSH and Kerberos depending on the operational system they access.
This security access protection at operational system level allows the construction of systems that are designed and configured to protect the management plan of the hosting platforms. Once connected to the initial protection, authorized managers can use the commands to increase the privileges with a second level of authentication. Said accesses are registered and audited on a regular basis. When the respective business need disappears, privileges and access to security protection at operational system levels are revoked.
• Virtual instances: they are also known as virtual servers. They are completely controlled by the customer, who has total administrative access over the instance and over the additional accounts, services and applications that run over it. IFX Network system managers do not have access to the customers’ virtual instances and cannot get authenticated to access to them at operational system levels. Because of that, customers must use a mechanism to increase privilege based on authentication to access the operational system of the virtual instance.
Firewall: IFX Networks provides a Firewall solution for all the different platforms of shared hosting like web hosting and systems of messaging and collaboration. This firewall is configured in negative mode for incoming traffic by defect and it is the customer who has to explicitly specify the ports and protocols for which traffic should be allowed as long as it is directly related to the hired service. The customer also has to specify the IP, the set of IP’s or the networks of origin allowed for its service.
For the services of dedicated hosting including virtual instances, the Firewall service is optional for the customer and in case it is not hired, any incidence related to unauthorized meddling of the system from the internet, is the customer’s responsibility.
The administrative access via SSH or RDP for IFX Networks administrative systems is only permitted through VPN connections based on PPTP or L2TP accomplishing a maximum level of information encapsulation and access credentials.
1.5.3. Nonrepudiation system
The ITU X.805, X.813 and X.843 standards refer to the nonrepudiation service as the capacity to prevent the user from future denial of an action. Among them, creation, origin, reception and content delivery are included. For example, message delivery or reception, establishment or reception of calls and others. Thanks to the nonrepudiation requirements, it is possible to collect unfalsifiable proof of delivery and/or reception of data with the purpose of avoiding the sender deny having sent a message or the receiver deny having received it. IFX Networks implements this service in its different platforms of hosting.
In its services of messaging and collaboration, IFX Networks keeps a record of sent and received e-mails at service SMTP level. The period of retention of said records is established by IFX Networks and informed to the customer as part of the process of service offer previous to the contract with the customer. As part of the product portfolio of aggregated value to messaging and collaboration, IFX Networks offers optional services of e-mail back-up and auditing that comply with international regulations even at the required levels by the United States’ financial entities.
For the shared web hosting services, IFX Networks keeps a record of access and activities of content manipulation. The retention period of said records is established by IFX Networks and informed to the customer as part of the service offer process previous to the contract.
IFX Networks records all the tasks performed by the company system administrators on the different hosting platforms and performs a regular audit on them. This record is done by a centralized system of log storage.
Due to the fact that the customer has the total control of the service administration of dedicated hosting including the virtualized services, the recording of logs and tasks related to the nonrepudiation services is the customers’ responsibility.
1.5.4. Principle of data confidentiality
IFX Hosted Services offers a scalable platform of high availability that allows users the management of a wide variety of products. Assuring the privacy and confidentiality of the user’s system and data is of vital importance for IFX.
Standard ITU-T X.805 establishes an explicit difference between data privacy and confidentiality. The first one is about protection of association of users’ identity and their activities. The second one refers to the protections against unauthorized access to the data content.
1.5.5. Privacy
IFX Networks internal policies mention data privacy according to what it is established in standard ITU X.805. It guarantees that the information supplied by users to any of our systems at the moment of recording is not shared with third parties without the users’ previous authorization.
a) Data confidentiality. Encrypted methods, lists of access control, and file access permits are used to guarantee data confidentiality.
The web access to the e-mail services offered to our customers is performed through secure sites that use SSL certificates granted by recognized entities worldwide. Additionally our customers are offered messaging and collaboration systems which access through their customers of traditional e-mails through the RPC protocol over HTTPS guaranteeing the confidentiality of information.
As part of our products of aggregated value, the customer has the option of acquiring encrypted e-mail services which guarantee that only previously authorized recipients have access to the information sent by our users. These services based on asymmetric encryption (public password) which are mentioned in standard ITU X.809 include a pair of passwords, one public and one private. Both passwords are different and although there is a mathematical relation between the two, it is not possible to calculate the private password from the public one.
For our services of shared and dedicated web hosting, IFX Networks applies a security policy based on lists of access control that guarantee access to the information. Its manipulation can only be performed by a valid user and with previously authorized privileges by the customer. All the control panels offered to the customers for the administration of their hosting services are protected with SSL certificates.
1.5.6. Principle of data integrity
According to recommendations ITU X.800 and X.815, the principle of data integrity refers to data that has not been altered by unauthorized processes. Furthermore, data integrity guarantees that information is protected against the following unauthorized operations: modification, suppression, creation, and copy of data. An indicator of unauthorized activities is provided.
In all services of shared hosting, IFX Networks uses a common frame of security that protects the integrity of the customer’s information using ACL’s and profiles with different access levels which ensure information can only be manipulated by the owner user and according to the privileges previously established in the service contract.
IFX Networks performs periodic upgrades on all its shared hosting systems with the purpose of avoiding intentional information manipulation that can be done by an external agent taking advantage of weaknesses at operational system levels, data base engines or e-mail software.
IFX Networks also provides anti-virus software in systems like e-mails and web hosting that can be the target of computer viruses, affecting the integrity of the customer’s information.
Customers of dedicated hosting including virtualized services are responsible for guaranteeing the integrity of the information that is stored in those systems as IFX Networks has no control over the systems at logical level.
1.5.7. Principle of availability
ITU X.805
The security of availability stated in Recommendation ITU X.805 guarantees that a network interruption shall not prevent authorized access to its elements, information stored, information flows, services and applications. This category includes recovery solutions in case of disaster and network restoration.
IFX Networks guarantees the availability levels previously agreed upon with the customer during the hiring process through a designed and implemented infrastructure for each of the services offered at hosting level.
All IFX Networks regional data centers have redundant systems in the electrical feeding systems. Our type Tier IV data centers have redundant schemes n+4 for the electrical feeding systems, temperature and humidity control that allow high availability to the shared hosting systems stored in those facilities.
Depending on the level of criticality each system and according to what was previously agreed in the service levels, the different hosting platforms have server farms that allow high availability in case of failure at operational system levels, hardware or even service levels.
IFX Networks implemented storage computing hardware for the critical mission systems in its different shared hosting platforms have redundant processing options in case of failure of one of the controllers. Likewise all our storage systems are implemented using RAID technologies to minimize the impact in availability caused by physical failure at disc level.
In case of an issue that affects the service availability and that exceeds systems scope and methods of high availability previously described, IFX Networks has a backup system that guarantees the possibility of information recovery in case of a computer contingency for all the shared hosting services.
These backup systems along with the methods and procedures established by the IFX Networks systems administrators team allow the provision of services in case of a computer failure and according to the established times in the availability levels offered to our customers.
1.6. Measures in relation to the networks and provided services to secure confidentiality, integrity, and availability of information principles and to secure authentication, authorization, and non-repudiation security services of information required to guarantee communication protection, the information that is sent through them and the personal data of the subscribers and/or users in relation to the networks and/or provided services by those operators.
The set of activities, actions, and methods are described in the previous steps. It is the set of parameters of authentication, protection, and encryption services directed to the development and securing each of the network’s components. Similarly, the services of diagnostic control and monitoring permanently observe changes in the network structure.
IFX Networks also has exclusively dedicated staff to network management. That staff manages and observes network behavior and each of the provided services on a regular basis allowing a fast observation of threats or problems that interrupt the stability of the services and the network backbone.
1.7. Measures regarding interception, violation or denial of communications provided by networks.
Access controls to the backbone and CPE (computing hardware located in the subscribers’ facilities), additionally, the systems of detection and monitoring of events, especially the network backbone, access network and Customer-Side allow observation over the executed and/or denied actions to users or third parties related to side-to-side communication.
1.8 Formal processes of the treatment of security incidences of the information belonging to the provider’s security management. When the violation comes from a third party and the provider of communications networks and/or services have knowledge of said violations. The provider also has to report the necessary measures for the behavior to stop and inform the competent authority about said violation.
The forensic analysis is a regular channel applied in an imminent disastrous situation. IFX Network has computing hardware available to recover post-disaster information. It can obtain detailed information of origin, type of executed action, indirect effects, potential effects of long, medium and short terms, mechanisms of fast recovery and information tracking, and structures of storage and database in HD modality. For that purpose, it has traffic sensors and mechanisms of traffic observation (origin – destination – service) configured over access interphases, UP-LINKS, NAPs and other interaction and integration points of public multi-operator and multi-access networks.
1.9 Mechanisms that guarantee confidentiality, integrity and availability of the data of the subscriber’s and or users. These mechanisms will be used to prevent and control telecommunications fraud and the compliance with the corresponding regulatory obligations.
Taking into account the tendencies in telecommunication and the globalization of information, it is necessary that government entities constantly regulate through legal tools the users’ information exchange between telecommunications service providers with the purpose of guaranteeing the confidentiality of information and avoiding bad use and mismanagement of said information.

Conditions and Legal Restrictions

IFX Cloud PBX:
1. The customer must have IFX Networks internet services.
2. The service is provided after a feasibility study.

IFX Cloud Call Center:
1. The customer must have IFX Networks internet services
2. The service is provided after a feasibility study.
3. IP devices must be directly connected to the network, and not wirelessly.
4. Risk: In case of fraud or attack where IT security is compromised on the customer's side, IFX has the power to terminate the service as stated in the Acceptable Use Policies (AUP).

IFX MPLS –VPN, EPL, TDM
1. The service is provided after a feasibility study.

IFX PREMIUM IP
1. The service is provided after a feasibility study.
2. Risk: In case of fraud or attack where IT security is compromised on the customer's side, IFX has the power to terminate the service as stated in the acceptable use policies - PUA.

IFX COLLOCATION
1. The service is provided after a feasibility study.
2. The equipment housed in the Datacenter must comply with the technical specifications.
3. It is the customer's responsibility to keep the list of authorized contacts and contact profiles updated through the management center.

IFX DEDICATED SERVER 
1. The service is provided after a feasibility study.
2. It is the customer's responsibility to keep the list of authorized contacts and contact profiles updated through the management center.

WEB HOSTING
1. Risk: In case of fraud or attack where IT security is compromised on the customer's side, or the customer publishes an inappropriate page, IFX Networks has the power to terminate the service as stated in the AUP.

FIREWALL
1. The service is provided after a feasibility study.
2. Security policies are defined by the customer in conjunction with a security expert from IFX Networks.

 

Ethics Code

The Ethics Code is a document that compiles information regarding the ethical principles and rules of conduct by which the actions of all IFX Networks employees in the performance of their daily work duties will be governed; it is based on a set of principles and values, actions and procedures that have the highest respect for others, including the cultures and communities where IFX Networks manages its activities, including the environment.

Its application extends to all IFX Networks employees regardless of their position or status. It is important to clarify that it will also apply in any transaction that IFX Networks makes with suppliers, customers, and all people and companies that IFX Networks has any relationship with; all employees have the obligation to know the code and comply with it, thus achieving a successful implementation. They are also obliged to participate in activities that involve training and application of the code.

Download Ethics Code


Acceptable use Policy
IFX NETWORKS

THE ACCEPTABLE USE POLICY (THE “POLICY”) FOR PRODUCTS AND INTERNET SERVICES IS DESIGNED TO PROTECT IFX CORPORATION AND SUBSIDIARIES (JOINTLY “IFX”), CUSTOMERS AND INTERNET COMMUNITY IN GENERAL FROM IRESPONSIBLE OR, IN SOME CASES, ILLEGAL ACTIVITIES. THE POLICY COMPRISES A LIST OF NON-EXHAUSTIVE AND NON-EXCLUSIVE ACTIONS PROHIBITED BY IFX. IFX RESERVES THE RIGHT TO MODIFY THE POLICY AT ANY TIME WITHOUT PRIOR NOTICE.
Prohibited Uses of IFX Systems, Products and Services:

  1. Streaming, distribution or storage of any material that violates any applicable law is prohibited. This includes, without constraints, content protected by reproduction rights, trademark, business secret or other intellectual property right used without proper authorization, and content that is obscene and/or defamatory, constitutes an illegal threat or violates the laws of control of exports.
  2. Sending unsolicited email messages, including sending "junk mail" or other advertising material to people who have not specifically requested such material (e.g., "flood with email messages" or "spam"). The recipient's repeated complaints will make the messages seem as "unsolicited", as well as requests not to continue receiving such material. This includes, without constraints, mass commercial advertising, informational announcements and political communications. It also includes the publication of the same or similar message in one or more newsgroups (excess of cross-publication or multiple publications).

Misrepresentation in the message header in order to hide its true content is strictly prohibited. The Customer is also prohibited from hosting sites that are advertised through unsolicited email messages or sites that generate these types of unsolicited messages, even if they are not generated directly from this site. Hosting, advertising, marketing or making any software, program, product or service designed to violate this Policy in any way available to third parties or that violates the acceptable use policies of another Internet access provider, including, but not limited to, programs designed to send messages with unsolicited advertising ("spamware"), which are prohibited in this document.

The maintenance of any service network that allows, without restrictions, the sending of messages or emails by third parties, including, but not limited to, open mail servers ("open mail relays") and  mailing lists that do not have effective authentication methods (e.g., "confirmed opt-in") is strictly prohibited. IFX accounts or services may not be used to receive replies to messages sent from another Internet Service Provider if said messages violate this Policy or that of another provider. The Customer assumes responsibility for the compliance of this Policy and must hold IFX account less for any penalty or fine associated with sending unsolicited emails, including costs associated with other Internet access providers.

  1. The Customer is prohibited from associating with any activity that has as its object or seeks to interrupt services of other uses or Internet networks. This includes, but is not limited to, Internet Message Control Protocols or other types of attacks and transmissions of malicious electronic message packets ("mail bombing"). Any spam practice that IFX considers to seriously threaten its public image or its relationship with third parties, will cause the immediate interruption of the service until both parties agree on a solution that is acceptable to both.
  2. Resale, release or transfer of Voice Services over IP to third parties (e.g., "leaking"), without the express written authorization of IFX.
  3. Unauthorized use or misrepresentation of mail header information (e.g., "spoofing").
  4. Access without authorization or trying to obtain unauthorized access to any account or computer resource that does not belong to the Customer (e.g. "cracking"), or to the IFX network.
  5. Obtaining or attempting to obtain services by any means or device with the purpose of avoiding payment.
  6. Unauthorized access, alteration or destruction, or any attempt thereof, of information about IFX customers or end users through any means or device.
  7. Voluntary involvement in any activity regarding authentication of users or their security, or that results in a denial of service (e.g., attacks on sequences of synchronized numbers) to any customer or end user of IFX that is in the network of IFX or in the network of another provider. This includes, but is not limited to, accessing information not provided by the Customer, registering on servers or accounts to which the Customer has not been expressly authorized to access; or test the security of other computer systems or networks.
  8. Participation in sending data or information that is contrary to federal, state or municipal laws, applicable to the service.
  9. Use of IFX Products and Services to interfere with the use of the IFX network by another customer or authorized user. Each IFX customer will be responsible for the activities of its customer / representative or end user base and, by accepting the service offered by IFX, is committed to advancing these standards and enforcing them. In the case of violations to the Acceptable Use Policy, IFX reserves the right to cancel the services or take steps to prevent the Customer from committing a violation of the IFX PUA, at its sole discretion and without prior notice.

The Customer shall compensate, defend and keep IFX without injury from claims, lawsuits, actions, damages, liability, trials, expenses and costs (including the reasonable rates of lawyers) arising from the conduct of the Customer. IFX will make reasonable efforts to notify the Customer of any claim seeking compensation of which it has knowledge as soon as possible, granting the Customer the opportunity to participate in its defense from said claim, agreeing that the Customer’s participation in any case may be conducted to the detriment of the interests of IFX, as reasonably determined by IFX. The inability to notify the Customer in a reasonable period of time shall not free or excuse the Customer from its obligation to compensate IFX, its related parties, subsidiaries, members, affiliates, officers and employees.

This Policy is part of the Services Agreement between IFX and you ("the Customer"), incorporated in this Service Agreement for reference. Any modification made to the Policy must be considered as incorporated to this Policy and to the Services Contract. The continued use of the Service by the Customer will imply its tacit acceptance of the modifications made.

Complaints regarding illegal use, network security, abuse or spam, must be sent to abuse@ifxcorp.com

 

TERMS AND CONDITIONS

USE OF THE WEBSITE
 

Unless otherwise indicated, the information presented on this website is property of IFX Corporation, and is protected by the property rights of IFX Corporation, Copyright © 2001 by IFX Corporation ("IFX"). All rights reserved.

Acceptance of the terms and conditions

When you enter this site, you acknowledge that you have read the terms and conditions described below and agree to be bound by them. If you do not agree with these terms and conditions, you should leave this website now.

 

Intellectual property

IFX hereby authorizes you to see, copy, print and distribute material from this website, provided that such material is used exclusively for information or non-commercial purposes. The use of this information for other purposes is not authorized. In view of this authorization, you agree that any copies you make of these documents will keep all copyright and other proprietary notices that they may contain. IFX Networks and the IFX logo are registered trademarks or service marks of IFX Corporation. You may not use these marks, nor any other IFX trademark, without prior written authorization from IFX Corporation.

Nothing contained in this document may be construed as conferring, whether by implication, rejection or otherwise, any license or right under any patent or trademark of IFX or third parties. Except as expressly stated above, no information contained in this document will be construed as conferring any right or license under any copyright of IFX.

 

Guarantee

Documents published by IFX on the World Wide Web Server are delivered "AS IS" AND WITHOUT GUARANTEES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED GUARANTEES OF MERCHANTABILITY, SUITABILITY FOR A PARTICULAR PURPOSE OR NON-COMPLIANCE. Under no circumstances will IFX have legal responsibility for any special, punitive, exemplary, incidental, indirect or consequential damages, including but not limited to, damages resulting from the use OR TRUST IN the presented information, loss of assets or income or costs for replacement of goods, even with information about such damages in advance.

Every commercially reasonable effort will be made to ensure accuracy in the information presented. However, IFX assumes no responsibility for accuracy in the information. Product information is subject to change without prior notice. The changes, if any, will be incorporated into new editions of these publications. IFX may make improvements and / or changes in the products and / or programs described in these publications, at any time and without prior notice. The mention of products or services that are not owned by IFX is for information purposes only and does not constitute endorsement or recommendation.

 

Links

Although this website may contain links to third-party sites, IFX is not responsible for the content of any of the sites to which such links are directed. IFX provides these links for your convenience and does not endorse the companies or the contents of any of the sites to which such links are directed.

 

Publication of information

You will be prohibited from publishing or transmitting any material that is unlawful, threatening, obscene, insulting or otherwise offensive in any way.

 

Deliveries

Any material, information or idea sent to this website or published on it, will be considered as non-confidential and will not be subject to intellectual property. IFX may share or otherwise use the material sent, for the purposes that IFX deems appropriate. If the information sent is of a personal nature, you accept that IFX may transmit such personal data beyond international borders for commercial purposes that IFX deems appropriate.


Jurisdiction and choice of applicable law

This agreement and all claims or disputes relating to this website will be governed by the laws of the State of Florida. Any legal action related to these Terms and Conditions or to this Website must be brought within one (1) year after the claim or cause of the action arose, and must be done in the State of Florida.

All products and brand names are trademarks or registered trademarks of their respective owners.

The products and services may vary from country to country. Contact your local IFX representative for specific information.

 

IFX DECLARATION OF PRIVACY

For years, we at IFX have acknowledged that the people who we do business with value their privacy. However, in doing business globally in this growing electronic economy, gathering personal information is generally necessary and desirable. IFX is committed to balancing the benefits of electronic commerce with the rights of people, in order to avoid the misuse of their personal information.

 

Gathering domain information

IFX also gathers information regarding domains, as part of its analysis of the use of this site. This data allows us to better understand the type of customers that visit our site, how often they visit it and which parts of the site they visit most frequently. IFX uses this information to improve its Web-based offerings. This information is gathered automatically and does not require any action on your part.

 

Cookies

Some pages on this site use "cookies", which are small files that the website places on your hard drive for identification purposes. These files will be used the next time you visit us for registration and personalization purposes. It should be noted that cookies cannot read data outside of your hard drive. Your Web browser can be configured to notify you when you are receiving a cookie, giving you the option to accept it or not. If you do not accept cookies, some pages may lose functionality and you may not have access to specific information on this site.

By simply using this site, you expressly agree to the IFX Privacy Policy. We reserve the right, at our sole discretion, to change, modify, add or remove portions of this policy at any time. The use of www.ifxnetworks.com after the changes to these conditions will mean you accept said changes.

 

Forward-looking statements

The information on this website contains statements to be construed in accordance with the "Private Securities Litigation Reform Act" from 1995, including statements regarding IFX's business development projects (IFX), IFX's efforts to create strategic alliances and new products, as well as the growth of its customer base and users of IFX services. These statements reflect current IFX views regarding future financial performance and events. Such statements are subject to certain risks and uncertainties that could result in significant changes in events and results. Potential risks include IFX's limited operational experience in the Internet network area, IFX's ability to attract significant additional financial investment and the possibility of having losses and negative operational cash flow, as well as risks associated with international expansion, particularly in Latin America. Additional risk factors that could affect the financial performance of IFX are detailed in the reports and documents regularly registered and filed with the Securities and Exchange Commission of the United States.

Calculate the latency and speed of your bandwidth service from anywhere in the region

Select the country for your information query

Measures in Management, traffic and network administration

Calculate the latency and speed of your bandwidth service from anywhere in the region

Resolution 5161-2017

Resolution 5161-2017

Internet Sano

Internet Sano is the campaign by the Ministry of Information Technologies and Communications so that all Colombians can understand the importance of the prevention of child and youth pornography on the Internet.



‘Internet Sano” is the healthy way to surf the net’

Information about filtering mechanisms that can be installed in the user’s equipment in order to prevent and counteract any content of sexual abuse of children or teenagers (MASI)

Download sites:

web site: qustodio

web site: k9 webprotection

1.Internet Sano – IFX Networks

www.ifxnetworks.com (IFX Networks Colombia S.A.S.) Supports all actions that comply with the measures imposed by law 679 of 2001 and decree 1524 of 2002 for the prevention and detection of child pornography on the internet. For this reason, we are committed to preventing, blocking, fighting, and reporting the exploitation, storage, use, publication and spreading of images, texts, documents, audio-visual files, improper use of global information networks or the establishment of telematic links of any kind, related to pornographic material or allusive to sexual activities of minors.

In compliance with Decree 1078 of 2015 and its complementary and amending regulations, especially with numerals 2.2.10.2.1. Prohibitions Service providers or servers, administrators and users of global information networks will not be able to: 1. Host images, texts, documents or audiovisual files on their own site that directly or indirectly involve sexual activities with minors. 2. Host pornographic material on their own site, especially images or videos, when there are indications that the people photographed or filmed are minors. 3. Host links on their own site, to telematic sites that contain or distribute pornographic material related to minors. ARTICLE2.2.10.2.2.Duties. Notwithstanding the obligation to report this expressed in the law for all residents of Colombia, providers, administrators and users of global information networks must: 1. Report any criminal act against minors which they are aware of to the proper authorities. This includes spreading any pornographic material associated with minors. 2. Fight against, using all the technical means at their disposal, the distribution of pornographic material with minors. Refrain from using global information networks to share illegal material with minors. Establish technical blocking mechanisms by means of which users can protect themselves or their children from illegal, offensive or undesirable material in relation to minors. 2.2.10.3.3. Administrative Sanctions. Providers or servers, administrators and users who do not comply or violate what is expressed in this chapter, will be sanctioned by the Ministry of Information Technology and Communications successively as follows: 1. Fines of up to one hundred (100) minimum wage legal monthly payments, which will be paid to the Fund Against the Sexual Exploitation of Minors, as expressed in article 24 of Law 679 of 2001. 2. Suspension of the corresponding web site. 3. Cancellation of the corresponding web site. For disciplinary sanctioning, the procedure established in the Code of Administrative Procedure and Administrative Litigation will be applied, in compliance with the due process and criteria of suitability, proportionality and recurrence. Paragraph. The Ministry of Information Technologies and Communications will carry out the pertinent administrative investigations and will impose, if applicable, the sanctions provided in this Title, notwithstanding criminal investigations carried out by the proper authorities and the sanctions resulting therefrom.

Report any event that may be classified as child pornography to the Ministry of Communications. You can find more information about this campaign at the following telephone number:

Ministry of Communications telephone number: 01900 09 12667

Internet Sano is a campaign of the Ministry of Communications so that all Colombians can understand the importance of prevention of child and youth pornography on the internet.

www.mintic.gov.co

Other institutions where you can make your report:

Central Management of Judicial Police – DIJIN:

Computer Crimes Investigative Group

Carrera 77A # 45-61 Barrio Modelia

PBX phone numbers: 426 6900 Ext. 6301-6302

Direct telephone number: 4266300

adelinfo@dijin.policia.gov.co

Office of the Attorney General of the Nation:

Telephone: 01800 09 12280

www.fiscalia.gov.co

contact@fiscalia.gov.co

Colombian Institute of Family Welfare:

Bogota Telephones: 01 8000 91 8080 – 6605520 – 6605530 – 6605540

Available from 7am to 9pm from Monday to Sunday

www.bienestarfamiliar.gov.co

  1. TERMS AND CONDITIONS

Terms of Use of the IFX Website

Unless otherwise indicated, the information on this website is property of IFX Corporation and it is protected by the property rights of IFX Corporation, Copyright © 2001 of IFX Corporation (“IFX”). All rights reserved.

Agreement of terms and conditions

When you enter this site, you acknowledge to have read the terms and conditions described below and agree to follow them. If you do not agree with these terms and conditions, you must leave website now.

Intellectual property

IFX hereby authorizes you to see, copy, print, and distribute content from this website, provided that such content is used exclusively for information or non-commercial purposes. The use of information for other purposes is not authorized. Taking this authorization in account, you agree that any copy of these documents will keep all copyright and other proprietary notices that it may contain. IFX Networks and the IFX logo are registered trademarks or service brands of IFX Corporation. You are not to use these marks, or any other brand of IFX, without prior authorization, in writing, from IFX Corporation.

Nothing contained in this document can be understood as granting, whether by implication, dismissal or otherwise, of any license or right under any patent or trademark of IFX or third parties. Apart from what is expressly stated above, no information contained in this document will be understood as granting of any right or license under any copyright of IFX.

Documents published by IFX on the World Wide Web Server are delivered “AS IS” AND WITHOUT WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, SUITABILITY FOR A PARTICULAR PURPOSE OR INFRINGEMENT. Under no circumstances will IFX have legal responsibility for any special, punitive, exemplary, incidental, indirect or consequential damages, including but not limited to, damages resulting from the use OR TRUST IN the presented information, loss of assets or income or costs due to the replacement of goods, even if there is information about such damage in advance.

Every commercially reasonable effort will be made to ensure the accuracy of the information presented. However, IFX assumes no responsibility for the accuracy of the information. Product information is subject to change without prior notice. The changes, if any, will be incorporated into new editions of these publications. IFX may make improvements and / or changes in the products and / or programs described in these publications, at any time and without prior notice. Any mention of products or services not owned by IFX is for information purposes only and does not constitute endorsement or recommendation.

Links

While this website may contain links to third-party sites, IFX is not responsible for the content of any of the sites to which such links are directed. IFX provides these links for your convenience and does not endorse the companies or the contents of any of the sites to which such links are directed.

Publication of information

Publishing or transmitting any content that is unlawful, threatening, obscene, insulting or otherwise offensive is strictly prohibited.

Deliveries

Any content, information or idea sent to this website or published on it, will be considered as non-confidential and will not be subject to intellectual property. IFX may share or otherwise use the content sent, for the purposes that IFX deems appropriate. If the information sent is of personal nature, you accept that IFX may use such personal data beyond international borders for commercial purposes that IFX deems appropriate.

Jurisdiction and choice of applicable law

This agreement and all claims or disputes relating to this website will be governed by the laws of the State of Florida. Any legal action related to these Terms and Conditions or to this website must be filed within one (1) year after the claim or cause of the action arises, and it must be done in the State of Florida.

All products and brand names are trademarks or registered trademarks of their respective owners.

The products and services may vary from country to country. Contact your local IFX representative for specific information.

IFX Privacy Statement

For a long time we at IFX have acknowledged that the people who we do business with value their privacy. However, in order to carry out global business in this growing electronic economy, the gathering of personal information is generally necessary and desirable. IFX is committed to balancing the benefits of electronic commerce with the rights of individuals, with the aim of avoiding the misuse of your personal information.

Gathering of information from domains

IFX also gathers information regarding domains, as part of its analysis of the use of this site. This data allows a better understanding of the type of customer that visits our site, how often they visit it and which parts of the site they visit most frequently. IFX uses this information to improve its Web-based offerings. This information is gathered automatically and does not require any action on your part.

Cookies

Some pages on this site use “cookies”, which are small files that the website places in your hard drive for identification purposes. These files will be used the next time you visit us for registration and personalization purposes. It should be noted that cookies cannot read data outside of your hard drive. Your Web browser can be configured to notify you when you are receiving a cookie, giving you the option of accepting it or not. If you do not accept cookies, some pages may lose functionality and you may not gain access to specific information on the site.

By simply using this site, you expressly agree with the IFX Privacy Policy. We reserve the right, at our sole discretion, to change, modify, add or remove portions of this policy at any time. The use of www.ifxnetworks.com after the changes to these conditions means your acceptance of said changes.

Forward-looking statements

The information on this website contains statements to be understood in accordance with the “Private Securities Litigation Reform Act” of 1995, including statements regarding IFX’s business development projects (IFX), IFX’s efforts to create strategic alliances and new products, as well as the growth of the customer base and users of IFX services.

These statements reflect current IFX views regarding future financial performance and events. Such statements are subject to certain risks and uncertainties that could result in significant changes in events and results. Potential risks include IFX’s limited operational experience in the Internet network area, IFX’s ability to attract significant additional financial investment and the possibility of continuing to incur losses and negative operational cash flow, as well as risks associated with international expansion, particularly in Latin America. Additional risk factors that could affect the financial performance of IFX are detailed in the reports and documents regularly recorded and filed with the Securities and Exchange Commission of the United States.

  • PROTECTION OF THE RIGHTS OF SUBSCRIBERS / USERS REGIME
  • PQR PROCEDURE AND PAPERWORK
  • AUTHORITY THAT EXERTS CONTROL AND SURVEILLANCE
  • USER SUPPORT (PQR)

You can contact us at the following telephone numbers:

Barranquilla (5-75) 3610430

Medellin (5-74) 3106730

Cali (5-72) 6082230

Bogotá (5-71) 3693030

Free of charge for other cities: 01-8000-117587.

  • REQUESTS, COMPLAINTS AND CLAIMS

3. ACCEPTABLE USE POLICIES

The IFX Acceptable Use Policy (the “Policy”) for Internet Products and Services is designed to protect IFX Corporation and its affiliates (collectively, “IFX”), its customers, and the Internet community in general from irresponsible or, in some cases, illegal activities. The Policy constitutes a list that is not exhaustive or exclusive of actions prohibited by IFX. IFX reserves the right to modify said Policy at any time, without prior notice to its customers.

Prohibited Uses of IFX Systems, Products and Services:

  1. Streaming, distribution or storage of any material that violates any applicable law is prohibited. This includes, without constraints, content protected by reproduction rights, trademark, business secret or other intellectual property right used without proper authorization, and content that is obscene and/or defamatory, constitutes an illegal threat or violates the laws of control of exports.
  2. Sending unsolicited email messages, including sending “junk mail” or other advertising material to people who have not specifically requested such material (e.g., “flood with email messages” or “spam”). The recipient’s repeated complaints will make the messages seem as “unsolicited”, as well as requests not to continue receiving such material. This includes, without constraints, mass commercial advertising, informational announcements and political communications. It also includes the publication of the same or similar message in one or more newsgroups (excess of cross-publication or multiple publications).

Misrepresentation in the message header in order to hide its true content is strictly prohibited. The Customer is also prohibited from hosting sites that are advertised through unsolicited email messages or sites that generate these types of unsolicited messages, even if they are not generated directly from this site. Hosting, advertising, marketing or making any software, program, product or service designed to violate this Policy in any way available to third parties or that violates the acceptable use policies of another Internet access provider, including, but not limited to, programs designed to send messages with unsolicited advertising (“spamware”), which are prohibited in this document.

The maintenance of any service network that allows, without restrictions, the sending of messages or emails by third parties, including, but not limited to, open mail servers (“open mail relays”) and mailing lists that do not have effective authentication methods (e.g., “confirmed opt-in”) is strictly prohibited. IFX accounts or services may not be used to receive replies to messages sent from another Internet Service Provider if said messages violate this Policy or that of another provider. The Customer assumes responsibility for the compliance of this Policy and must hold IFX account less for any penalty or fine associated with sending unsolicited emails, including costs associated with other Internet access providers.

  1. The Customer is prohibited from associating with any activity that has as its object or seeks to interrupt services of other uses or Internet networks. This includes, but is not limited to, Internet Message Control Protocols or other types of attacks and transmissions of malicious electronic message packets (“mail bombing”). Any spam practice that IFX considers to seriously threaten its public image or its relationship with third parties, will cause the immediate interruption of the service until both parties agree on a solution that is acceptable to both.
  2. Resale, release or transfer of Voice Services over IP to third parties (e.g., “leaking”), without the express written authorization of IFX.
  3. Unauthorized use or misrepresentation of mail header information (e.g., “spoofing”).
  4. Access without authorization or trying to obtain unauthorized access to any account or computer resource that does not belong to the Customer (e.g. “cracking”), or to the IFX network.
  5. Obtaining or attempting to obtain services by any means or device with the purpose of avoiding payment.
  6. Unauthorized access, alteration or destruction, or any attempt thereof, of information about IFX customers or end users through any means or device.
  7. Voluntary involvement in any activity regarding authentication of users or their security, or that results in a denial of service (e.g., attacks on sequences of synchronized numbers) to any customer or end user of IFX that is in the network of IFX or in the network of another provider. This includes, but is not limited to, accessing information not provided by the Customer, registering on servers or accounts to which the Customer has not been expressly authorized to access; or test the security of other computer systems or networks.
  8. Participation in sending data or information that is contrary to federal, state or municipal laws, applicable to the service.
  9. Use of IFX Products and Services to interfere with the use of the IFX network by another customer or authorized user. Each IFX customer will be responsible for the activities of its customer / representative or end user base and, by accepting the service offered by IFX, is committed to advancing these standards and enforcing them. In the case of violations to the Acceptable Use Policy, IFX reserves the right to cancel the services or take steps to prevent the Customer from committing a violation of the IFX PUA, at its sole discretion and without prior notice.

The Customer shall compensate, defend and keep IFX without injury from claims, lawsuits, actions, damages, liability, trials, expenses and costs (including the reasonable rates of lawyers) arising from the conduct of the Customer. IFX will make reasonable efforts to notify the Customer of any claim seeking compensation of which it has knowledge as soon as possible, granting the Customer the opportunity to participate in its defense from said claim, agreeing that the Customer’s participation in any case may be conducted to the detriment of the interests of IFX, as reasonably determined by IFX. The inability to notify the Customer in a reasonable period of time shall not free or excuse the Customer from its obligation to compensate IFX, its related parties, subsidiaries, members, affiliates, officers and employees.

This Policy is part of the Services Agreement between IFX and you (“the Customer”), incorporated in this Service Agreement for reference. Any modification made to the Policy must be considered as incorporated to this Policy and to the Services Contract. The continued use of the Service by the Customer will imply its tacit acceptance of the modifications made.

Complaints regarding illegal use, network security, abuse or spam, must be sent to abuse@ifxcorp.com


Law 679(2001)


Sentence C-442


Decree #1524(2002)


Data protection act

Dear Partner, Customer, Consultant, Provider or others

THE COMPANY informs that in accordance with the regulatory developments at the regional level of Protection of Personal Data, which develops people’s right to know, update, rectify or delete personal information that has been collected about them in any database or archive.

THE COMPANY, states that the data that you may provide at the time of signing the contractual or pre-contractual document, or when referring to the links of the commercial proposal or by virtue of promotions, advertising, data update and other marketing activities, statistics are hosted in our information system in a secure manner for the full development of our corporate purpose. These are used to inform you about our services, your status, billing, news, different topics of general interest and also to have constant communication with our partners, customers, known suppliers and other natural or legal entities, national and foreign, through electronic and physical means.

THE COMPANY, allows itself to inform you that it protects the data provided by you, by virtue of the provisions of the current regulations of the country where you are located. Likewise, we allow ourselves to inform you that you, by virtue of the Law, have the following rights, among others: knowing, updating and rectifying your personal data, requesting the deletion of your personal data when you deem it appropriate. These rights can be demanded through our mail contact contactenos@ifxcorp.com

Now, in order to continue treating your data for the purposes mentioned above under the standards of security and quality, if within thirty (30) business days, starting from the knowledge of the communication sent by our company, you have not requested the deletion of the data supplied to THE COMPANY, it will continue to use it for the purposes mentioned above.

In case you do not wish to receive information from THE COMPANY, or wish to be excluded from our databases, you can do so by sending an email to the following address: contactenos@ifxcorp.com

REGULATORY FRAMEWORK FOR EACH COUNTRY:

COLOMBIA: Law 1581 from 2012 and Decree 1377 from 2013
CHILE: Law 19628 from 1999
PANAMA: Law 6 from Access to Information (2002)
ARGENTINA: Law # 25.326 from Protection of Personal Data and its regulations, Decree # 1.558/2001.
USA: Sectorial Laws at federal level, HIPAA
GUATEMALA: Initiative 4090-2009 Law on Protection of Personal Data, Decree # 57-2008
URUGUAY: Law # 18.331 from August 11, 2008

Important Notice

Important Notice August 2018

Information directed to the general public. We would like to inform that we have knowledge of users of cell phones that are receiving text messages with promotions and awards that are not authorized for IFX NETWORKS COLOMBIA. Those messages are false and with criminal intent. This behavior has already been formally reported to the proper authorities and is being investigated to identify suspects. However, with the purpose of avoiding more complex and undesirable situations, we ask to omit those messages if you are receiving them. We appreciate your attention and we are available to answer any questions you might have regarding this issue. IFX NETWORKS COLOMBIA S.A.S Bogota, Colombia

Users’ Rights

DEAR CUSTOMER,

YOU, AS AN IFX CUSTOMER, HAVE THE FOLLOWING RIGHTS:

  1. The maximum time limit to make a complaint is sixty (60) working days from the moment occurrence that fueled the complaint happened. In case of rejections to charges, the maximum established payment date will be considered.
  2. You have the right to make a complaint on our website WWW.IFXNETWORKS.COMYou have the right to make a complaint on our website
  3. Once the complaint is issued, the deadline to provide an answer to the complaint is 5 working days.
  4. In case you do not receive an answer within 5 working days as indicated previously, you can demand immediate solution to the problem.
  5. You can ask for the solution to your complaint at the Ministry of Telecommunications in case you do not agree with the answer you received or in case of no answer within the following 30 working days.
  6. In case you make a partial complaint regarding the charge of the hired service, you can only pay the part of the bill that is not being questioned. In those cases, charges will be suspended until the issue is completely solved.
  7. You have the right to enter into telecommunication services contract which will be sent with all the contract details so you can acquire our services. This contract cannot be altered unilaterally and must be respected by both parties.
  8. You have the right to receive your service without interruptions or alterations
    .
  9. In case of discontinuity of the hired service, IFX will make the necessary compensation and the one you are entitled to.
  10. You have the right to only be charged for the service provided.
  11. You have the right to freely access internet content.
  12. You can use any type of device to use the internet service as long as it is legal and does not affect the quality of service.
  13. You have the right to know all the conditions of the hired service and to be informed in a truthful, timely, efficiently, transparent, and updated manner.
  14. You have to right to receive the hired service without any type of discrimination.
 

IF YOU ARE A USER OF A LOCAL TELEPHONE SERVICE OR CELL PHONE SERVICE, ADDITIONALLY, FOR THESE SERVICES, YOU WILL HAVE THE FOLLOWING RIGHTS:

  1. You have the right to terminate the contract at any moment without any reason with a 60 day notice. The termination notice for the local telephone service or cell phone service must be provided in writing.
  2. You have the right to communicate from your phone at any moment in an emergency situation without cost to you.
  3. You have the right to change telecommunications company while keeping your hired phone number.
  4. You have the right to block or enable access to national or international long distance services as well as cell phones and complementary services.

Contract of Dedicated Link Services

IN THE PLACE AND TIME INDICATED IN ITEM 4 OF THE OBVERSE OF THIS CONTRACT, BETWEEN IFX NETWORKS CHILE S.A., TAX PAYER NUMBER 96.779.080-K, REPRESENTED BY MRS. LILIANA PINO MARTÍN AND MR. RAMÓN ROJAS VIVANCO, ALL LOCATED AT 92 EL BOSQUE CENTRAL AVENUE, FLOOR 11, LAS CONDES, SANTIAGO, FROM NOW ON “IFX NETWORKS”, ON ONE HAND; AND ON THE OTHER HAND AND FROM NOW ON “THE CUSTOMER” INDIVIDUALIZED IN ITEM 1 OF THE OBVERSE, WHO AGREE WITH THE FOLLOWING CONTRACT OF SERVICES:

1.OBJECT AND RATE

For the present document, IFX Networks will supply the customer the connectivity services to internet, lease of links and/or computing hardware (the “services”), either by own means or by a third party, in the terms and conditions provided in item 2 of the obverse and in the current document. The services will have the rate or monthly charge mentioned in item 2 of the obverse; the rates shown correspond to the net value so a Value Added Tax (VAT) should be added. The rates shown in ‘unidades de fomento’ (UF) will be billed by IFX Networks to the customer, in national currency, the day of payment. In case the UF ceases to have effect, the way to add up the charge will be modified. Both parties agree that all the previous statements in the contract, will be considered as UF value, the last one to be valid, correctly adjusted to the variation of Consumer Rate Index determined by the National Institute of Statistics or by who replaces it in its functions.

IFX NETWORKS OBLIGATIONS

2.1) Supervise the connection between the networks of both parties remotely.

2.2) Provide service of Secondary Name Server.

2.3) interconnect the customer’s TCP/IP network to its network through permanent synchronous channels that will use TCP/IP protocol.

2.4) Provide the customer with a set of 8 IP addresses for the customer’s exclusive use. If the customer declines service or if the contract is terminated, the IP addresses will remain in IFX Networks possession. At the beginning of the service, IFX Networks is required to provide clean IP addresses, that is to say, addresses that are not registered in blacklists.

2.5) Provide access to Internet, 99,6% of available monthly uptime, except in the case of service suspensions mentioned in 2A.3 and 2A.4 and in the cases of unexpected or random situations mentioned in 4.3, item iv of this document. In the case of service unavailability, what is established in article 27 of the General Law of Communications will be applied.

2.6) IFX Networks guarantees that its software, as well as the computing hardware that will be used for service delivery, are free of computer viruses.

2.7) IFX Networks specifically declares that the service, software and computing hardware comply with all the technical standards both nationally and internationally related to those services.

2A IFX Networks Capabilities

2A.1) Perform all the technical efforts the lead to maintaining service.

2A.2) Make all the necessary changes with providers of national digital links to which the customer connects to IFX Networks.

2A.3) Temporarily suspend all services because of technical maintenance or because of changes in digital links. IFX Networks is required to communicate the customer in a timely manner and by the fastest way possible and at least 24 hours in advance of the suspension of services because of these.

2A.4) Temporarily suspend the services because of customer’s non-compliance or tardiness in the monthly rate payment. Simply being late with the payment due date allows IFX Networks to proceed with suspension. The suspensions originated by reasons mentioned in this document will provide IFX Networks with the right to bill the customer the cost associated to service restoration.

3) CUSTOMER’S DUTIES

The customer is required to pay the bill or monthly service rate mentioned in item 2 of the obverse within 30 days of receiving the bill. IFX Networks will issue the corresponding bill under the advance month modality, regularly in the bill cycle chosen by the customer. The first bill will be issued once services have been installed. Each bill will be considered to be accepted by the customer if it is not objected in writing, by means of certified letter, within 8 days after having received the bill. In the case of objection, the customer will pay the non-disputed rate within the agreed terms. The objection will be resolved by mutual agreement within 5 days of being communicated. For purposes of installation, connection, and implementation of services, the customer is required to pay for the digital link, bandwidth of internet access and the lease of a router or communication channel whose values and modalities are specified in item 2 of obverse. A delay in payment of more than 1 day of any of the customer’s obligations allows IFX Networks to demand and charge the conventional maximum interest rate for the whole of the delayed time and with the right to suspend service. Notwithstanding the above, after 60 days of the first unpaid bill, IFX Networks will be able to keep the service suspended or to exercise the right to what it is established in section 6 without the customer having the right to any type of compensation. IFX Networks will be able to suspend or terminate service indefinitely without the customer having any right to compensation for that suspension. The suspensions caused by the reasons mentioned in the current document will provide IFX Networks the right to charge for the cost associated to the restoration of the service.

3.2 Be responsible for the use of the primary name of the server, email, file servers, news servers, etc. Regardless of the customer requesting additional services from IFX Networks.

3.3 Comply with and enforce in those who use service, the Policies of Acceptable Use mentioned in item 4.2 and comply with all the regulations about the responsible use of the network of IFX Networks, specially avoiding purposeful damage to information stored in computers of other institutions in the networks or by any means.

3.4 Adopt the measures related to information security stored in your computers. Obligation that is of the CUSTOMER’S exclusive responsibility.

3.5 Respond for the care of computing hardware delivered by IFX Networks, leased or under any other contract, responding for any type of damage or loss, attributed to fraud or customer’s or subordinate’s fault. The same will be applicable to any computing hardware that other providers delivered to the customer under the current contract. In case of violation, IFX Networks has the right to terminate the contract early according to what it is stated in item 6.

3.6 Facilitate IFX Networks staff access to its premises in office hours and with previous notification for the installation of necessary equipment to provide Services.

3.7. RETURN COMPUTING HARDWARE. If the customer would like to terminate the contract, in advance or after term has expired, the customer will have to return all hardware that belongs to IFX Networks as indicated in item 3 of the obverse, in perfect conditions, accepting only the normal wear and aging of equipment. The hardware must be returned at an IFX Networks location. On the contrary, if the contract is terminated because of customer’s fault or because of any other cause, the customer must have hardware immediately available for IFX Networks or return it where IFX Networks requires within 5 days of notification. Hardware must be in perfect conditions accepting only the normal wear and aging of equipment. If the customer does not return hardware within 5 days, IFX Networks has the right to be compensated for the damages in the computing hardware by applying a penalty against the customer representing the restitution rate of equipment mentioned in item 3 of the obverse.

  1. RESPONSIBILITIES
    4.1 Internet Use: The customer states they know the legal obligations and consequences that the use of internet implies. Therefore, the customer, specifically liberates and exempts IFX Networks and all its network access providers of any direct, indirect or future responsibility that could occur as a consequence of any infringement to current laws, especially to Intellectual Property Law 17,336 and to Industrial Property Law 19,039 and its modifications, as well as to Treaties, international agreements about this or other topics that the country of Chile has entered into and has been recognized as a law of the Republic. The exemption of responsibility of IFX Networks includes any action(s) or omission(s) contrary to law, by the customer or third parties, regarding which IFX Networks and its providers lack any authority or legal faculty to prevent causes of damage or detriment to network users.

4.2 Policy of acceptable use: The customer accepts and is required to comply with the policy of IFX Networks acceptable use which the customers states to know, that it is part of this contract and is available at:

The customer authorizes IFX Networks to, prior communication, modify said policy. Modifications will be approved if customer does not state the contrary within 5 days of communication.

4.3 Exemption of Responsibility of IFX Networks: IFX Networks does not assume any responsibility regarding what the customer received from the network or services provided by it, as well as the use of information that the customer could add or broadcast in the network. Nor does IFX Networks assume responsibility regarding the following situations: i) quality of information that is obtained through the network, ii) damages or detriment that could result from the use of the network, iii) damage that could occur to the customer’s data except the damage or loss of information in magnetic devices and/or backup that customer uses, originated or direct consequence of the service provided by IFX Networks, and iv) Suspension of functioning and/or operation by unexpected reasons (such as earthquakes, blackouts, transmission lines, terrorist attacks, others)

  1. VALIDATION AND SERVICES START DATE

5.1 Validation: This contract will be valid as established in item 4 of the obverse. It will be valid as of service starting date. At the end of the term, the contract will be automatically renewed for an equal period, until one of the parties decides to terminate the agreement in writing. That communication has to be provided at least 60 days in advance of the expiration of the term or any of its extensions.

5.2 Early Cancellation: if the customer requests cancellation of the contract before the validation term mentioned in the previous item, either the initial cancellation or any of its extensions, the customer shall pay IFX Networks 100% of the payment corresponding to the remaining months as penalty.

5.3 Service start date: The service start date will be the one that is stated in the reception form according to the Installation Service or the Installation File which was signed by the customer and is part of the current contract.

5.4 Rescission: The current contract will be rescinded if there is no technical feasibility necessary to start services. Both parties can return to their identical states before they entered into the contract.

  1. Breach of Contract: the refusal to perform any of the obligations stated in the current contract will allow the other party to terminate the contract ipso facto by sending a certified letter within 15 days in advance. If the breach is the customer’s, IFX Networks will have the right to terminate services and the customer will be required to pay 100% of corresponding fees as penalty. If the breach is IFX Networks’, the customer will report this breach the fastest and the most suitable way so IFX Networks can correct the issue as soon as possible. Once services are restored, the customer will have the right to receive a discount on the monthly payment proportionate to the service interruption.
  1. Release.

None of the parties can give up or transfer the current contract agreement in favor of an insolvent person and that does not belong to the same economic group without the previous consent provided by in writing by the other part.

  1. Modifications and Technical annex

Both parties by common agreement will be able to modify the current contract agreement adding the corresponding modifications through annexes. IFX Networks has the right to add technical annexes to the current contract agreement with the purpose of facilitating the operation and functioning of service delivery. Those annexes will try to provide a better service and will not imply additional costs for the customer. They cannot imply, by any means, a decrease of services to be provided according to the current contract. The customer is required to comply with the technical instructions that through pertinent annexes are communicated by IFX Networks. The number and content of technical annexes that can be added to the current contract agreement can be modified by IFX Network when needed for a better service delivery.

  1. COMMUNICATION

All the notifications and communications related to the current contract will be written and sent to the counterpart’s address by certified mail as mentioned in the obverse. For technical and emergency purposes, the customer accepts as their contact the one established in item 6 of the obverse. It will be the customer’s responsibility to maintain all information updated, otherwise IFX Networks will not be responsible for lack of timely communication and will comply with its obligation notifying the established contact. The customer states that all data provided for the current contract is true and guarantees that the information provided obeys the truth. The customer will be responsible under applicable law if false or malicious information is provided.

  1. ELECTRONIC BILLING

In conformity with Res. Ex. 11 of February 14, 2003 from the Internal Revenue Service, the customer can be part of the electronic billing system that allows customers to receive bills electronically according to applicable regulations. If the customer decides not to receive electronic bills, they will have to pay for the monthly manual billing cost that will be unilaterally determined by IFX Networks.

  1. ADDRESS AND SOLUTION OF DISAGREEMENTS

For all the legal effects derived from the current contract, the parts are subject to the jurisdiction of the Local Court and set their address in Santiago.

  1. NUMBER OF COPIES

The current contract is subscribed in two copies of identical transcript, one copy for IFX Networks and the other copy for the customer.

Policy and Procedures

Dear Customer,

According to article 27 of the General Telecommunication Law, we inform that in those cases in which the service hired through IFX Networks Chile SA, for causes not imputable to the user that exceed 6 hours in a day or 12 continuous or discontinuous hours in a month, the difference will be deducted from the monthly rate of your bill in the ratio of 1 day for each 24 hours or fraction higher than 6 hours.

In the case of suspension, interruption or alteration exceeding 48 continuous or discontinuous hours in the same month and is not an unintentional error or a random issue, IFX Networks Chile SA will compensate the customer with the equivalent of the triple of the daily rate for each day of suspension, interruption or alteration of the service. If your service is billed as a fixed charge, discounts will be made by the extension of the validity of the cards used to this effect. In the case compensation is requested, it will be considered according to monthly consumption billing and it will be reflected in the billing period related to the month when the issue happened.

Argentina digital Law 27.078

Ley 27.078

Law 27.078

Technologies of Information and Communication

Approved: December 16, 2014

Enacted: December 18, 2014

More information

Decree 1558/2001

Decree 1558/2001 (Official bulletin 29.7897, December 3, 2001

Approval of Law 25,326. General principles related to data protection. Rights of data holders. Users and people in charge of files, registries, and data banks. Control. Sanctions.

Decree Law 1558/01

Protection of Personal Data Law 25.326

Law 25.326

General dispositions: General principles related to data protection. Rights of data holders. Users and people in charge of files, registries, and data banks. Control, Sanctions, Action of protection of personal data.

Approved: October 4, 2000.

Partially enacted: October 30, 2000.

More information.

Implementation of Security Policies

BACKGROUND

It’s obvious that security should come from a carefully developed process from the conception and design of the system, along its implementation, to the necessary policies and practices for its installations and use. It’s essential that security is present in the development of the norms from the beginning and not during its application because vulnerable points appear from the start.
The communications industry has contributed to increase productivity and connect communities all over the world in almost every aspect of the industry, because it has developed at the speed of a commercial environment that is increasingly globalized. A big portion of this success is based on the development of standards by ITU-T
Even though existing standards facilitate the efficiency of current networks and systems and prepare the space for future ones, the increasing use of open interphases and protocols, the variety of new actors, the impressive diversity of applications and platforms, and the implementations that are not always efficiently tested, have caused an increase in the malicious uses in the networks. The number of security violations (for example, virus spreading, violation of confidentiality of stored data) has increased significantly in worldwide networks, frequently generating costly effects.
That is why it is important to ask ourselves how can an open communications infrastructure be supported without having its information exposed to security problems? The answer is found in the efforts of the groups of normalization that fight the threats to security in all areas of the telecommunications infrastructure. They start with details in the specifications of protocols, applications to network management. IFX Networks follows the different recommendations developed by ITU-T to guarantee reliability and quality of its telecommunications infrastructure, services and corresponding applications.
And thus, conforming to article 6 of the resolution 2258 from 2009, we deliver strategy reports for network security:
1. General definitions
For a better understanding of the approaches that IFX Networks presents in the current document, this one has been interpreted according to the following general considerations that are established in article 1.8, resolution CRT 1740 of 2007 and in article 1, resolution CRC 2258 of 2009:
1.1 Access to internet: Physical access that includes all the functionalities and necessary national and/or international connections to allow a user to establish communication with an internet node. A node is a TIER-1 point or a national access point (NAP).
1.2 Commuted Access: Form of Internet access in which the connection between the user terminal and the access equipment of the operator providing the Internet access is done through dialing over a telephone line of the TPBC network.
1.3 Bandwidth: It’s the transmission capacity with enough bandwidth to allow wired or wireless supply of voice, data and video. For marketing purposes, take into account that a “broadband” connection will be considered as such if the effective access speeds meet the following minimum values:
Direction of the Connection, Minimum effective Speed
ISP towards user 512 kbps or downstream
User towards ISP 256 or upstream
1.4. Narrow band: It’s wired or wireless transmission capacity with an effective data transmission speed lower than the one established in bandwidth.
1.5. Quality of service (QoS): It’s the global effect of the quality of a service function that determines the degree of service satisfaction by the user.
1.6. Data transmission Speed: It’s the speed with which data can be transmitted from one device to another. Data rates are often measured in bits per second.
1.7. Authentication: The process of providing the system a way to ensure identification of something.
1.8. Authorization: Process of rights assignment or permit concession to perform determined activities and its relation to determined processes, entities, legal or natural persons.
1.9. Cyberspace: It is the physical as well as virtual environment made from computers, computer systems, computer programs (software), telecommunication networks, data and information used in user’s interactions with each other.
1.10. Cyber security: It is the tool kit, policies, security concepts, guidelines, methods of risk management, actions, best practices, insurance and technology that can be used to protect the computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.
1.11. Data confidentiality: To avoid data from being spread without authorization.
1.12. Availability: Authorized entity access to the information and computer systems whenever this entity needs it.
1.13. Entity: Natural or legal person, organization, element that belongs to computing hardware or a computer program.
1.14. Critical infrastructure: It’s the amount of computers, computer systems, telecommunication networks, data and information whose destruction or interference can weaken or impact the security of the economy, public health or both of a nation.
1.15. Data integrity: Property or characteristic of maintaining the accuracy and completeness of the information.
1.16. Interception: It’s the acquisition, visualization, capture or copy of content, data or part of content of communications transmitted wiredly, wirelessly, optically, magnetically or other ways during transmission utilizing electronic, mechanic, optical or electromagnetic means.
1.17.Interference: It’s the action of blocking, hiding, avoiding or interrupting the confidentiality, integrity of computer programs, computer systems, data or information through the transmission, damage, erasing, destruction, alteration or suppression of data, computer programs or data transfer.
1.18. Interruption: It’s the event caused by a computer program, telecommunications network or computer system that interferes or destroys a computer program, a telecommunications network, data or information which it contains
1.19. Nonrepudiation: Service whose objective is to ensure that a transferred message has been sent and received by the parties claiming to have sent and received the message. Nonrepudiation is a way to guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message.
1.20. Pharming: It’s the action of modifying the Domain Name System (DNS) server, switching the correct IP address for another one. The user then is redirected to a different IP while he believes he’s at the correct website.
1.21. Phishing: It is the act of sending an email to a user, falsely claiming to be an established legitimate business in an attempt to scam the user into surrendering private information that will be used for identity or password theft.
1.22. Malicious software (Malware): It’s a computer program specifically designed to damage or disrupt the confidentiality and integrity of a computer system, telecommunications network, information, and data transfer. It includes any type of malicious code, from spyware to key loggers and computer viruses, worms or Trojan horses that can be distributed through e-mail addresses, websites, shareware or freeware.
1.23. Vulnerability: An unintended flaw in software code or a system that could potentially be exploited
1.4. Guarantee in network security and the integrity of service to avoid interception, interruption and interference of the service.
IFX performs permanent monitoring of each of the services that are offered in order to identify any event or malware in time and appropriately. For this purpose it uses computing hardware located at strategic points in the network monitor the following:
Status of network computing hardware
Logs of activities performed in computing hardware
Monitoring of the traffic behavior in different sectors of the network such as interconnection points, peering and node concatenation.
Detailed reports via Firewall control where you can find specifications and details of the traffic carried out by critical points in the network, signatures of attack, permanent vulnerability analysis in devices and mission-critical servers. Back up of Network devices , backups and absolute redundancy of data bases, protected by structures of minimal public display.
Committees of security evaluation where vulnerabilities and network critical points are detailed and exposed and tools to cover detected failures are established.
1.5. Security models according to the characteristics and needs of the network that contribute to improving security of the access networks according to security frameworks defined by ITU.
IFX NETWORKS COLOMBIA as a provider of telecommunications services and complying with the requirements of surveillance and quality control authorities, has implemented models to protect networks and end users in the terms established by the current law:
1.5.1. Authentication
According to standards ITU X.805 y X.811, authentication consists of proving the veracity of the identity claimed by an entity. In this context, not only people are considered entities, but also mechanisms, services, and applications. With authentication, the goal is to guarantee that an entity is not trying to steal an identity or provide an unauthorized answer to a previous communication.
Messaging and collaboration services offered by IFX to its customers have authentication systems based on LDPA architecture which, on top of being robust and reliable, allow the use of encrypted passwords. That way credentials are known only by the end user, guaranteeing an additional level of information confidentiality.
Additionally IFX offers digital signature services for messaging and collaboration products so customers can guarantee authenticity of the origin of an e-mail to their receptors avoiding identity theft or an unauthorized answer to a previous communication.
For both our shared and dedicated web hosting services, IFX applies the security model at domain level. Understanding the domain as the security environment that encloses the services of each customer. Under this model and after it is authenticated, the subscriber has total access to information including the data bases they own. With this control you will be able to create users with specific privileges under the security domain which is under the responsibility of the customer who owns the domain.
In the service of dedicated hosting, IFX provides customers total control of the hardware system, base operational system and software; that way the management of authentication services is under the customer’s total responsibility.
1.5.2. Access control
The security assessment of access control protects against the use of network resources without authorization. Access control guarantees that only authorized people and devices can access the network elements, stored information, information flow, services and applications. Access control is defined in clauses 6.3/X.810 and ITU-T X.812. Although it deals with authentication, it’s outside its reach.
a) Physical security, IFX Networks has several years of experience in designing, building, and operating the data centers at medium and big sized scale in all our points of direct presence in the United States and Latin America. This experience has been applied to our platform and infrastructure.
IFX Networks data centers are located in facilities with protected physical parameters including surveillance systems with 7x24x365 coverage. For our data centers located in type Tier IV facilities, there are strict security measures with military grade control of the perimeter. Physical access is strictly controlled, both around the perimeter as well as at the access points to the building by security experts supported by video systems, intruder detection systems and other electronic support.
Authorized staff members must comply with at least 2 authentication factors to physically access a data center. All guests and contractors must present ID and sign in, after that they are accompanied by an authorized staff member at all times.
IFX Network only provides access to data centers to employees who have a legitimate business need. Access is immediately revoked when said need ends even if they continue to be IFX network employees. All employees’ physical and electronic access to IFX Network data centers is registered and audited on a regular basis.
b) Logical access security: Logical access Security to the different IFX Network hosting platforms is supplied at multiple levels: operational systems, virtual instances, applications and firewall. Each of these items is built under the capabilities of the others. The goal is to ensure that the data contained inside the different IFX Network hosting platforms cannot be intercepted by unauthorized systems or users, and that the diverse instances of IFX Networks services provide the highest possible security without compromising the flexibility in configuration and functionality that customers’ demand.
• Security at operational system level: IFX Network system administrators with business needs related to hosting services must supply credentials to have access with basic privileges to the different systems. Said access process happens in a centralized security environment through LDAP authentication and using protocols SSH and Kerberos depending on the operational system they access.
This security access protection at operational system level allows the construction of systems that are designed and configured to protect the management plan of the hosting platforms. Once connected to the initial protection, authorized managers can use the commands to increase the privileges with a second level of authentication. Said accesses are registered and audited on a regular basis. When the respective business need disappears, privileges and access to security protection at operational system levels are revoked.
• Virtual instances: they are also known as virtual servers. They are completely controlled by the customer, who has total administrative access over the instance and over the additional accounts, services and applications that run over it. IFX Network system managers do not have access to the customers’ virtual instances and cannot get authenticated to access to them at operational system levels. Because of that, customers must use a mechanism to increase privilege based on authentication to access the operational system of the virtual instance.
Firewall: IFX Networks provides a Firewall solution for all the different platforms of shared hosting like web hosting and systems of messaging and collaboration. This firewall is configured in negative mode for incoming traffic by defect and it is the customer who has to explicitly specify the ports and protocols for which traffic should be allowed as long as it is directly related to the hired service. The customer also has to specify the IP, the set of IP’s or the networks of origin allowed for its service.
For the services of dedicated hosting including virtual instances, the Firewall service is optional for the customer and in case it is not hired, any incidence related to unauthorized meddling of the system from the internet, is the customer’s responsibility.
The administrative access via SSH or RDP for IFX Networks administrative systems is only permitted through VPN connections based on PPTP or L2TP accomplishing a maximum level of information encapsulation and access credentials.
1.5.3. Nonrepudiation system
The ITU X.805, X.813 and X.843 standards refer to the nonrepudiation service as the capacity to prevent the user from future denial of an action. Among them, creation, origin, reception and content delivery are included. For example, message delivery or reception, establishment or reception of calls and others. Thanks to the nonrepudiation requirements, it is possible to collect unfalsifiable proof of delivery and/or reception of data with the purpose of avoiding the sender deny having sent a message or the receiver deny having received it. IFX Networks implements this service in its different platforms of hosting.
In its services of messaging and collaboration, IFX Networks keeps a record of sent and received e-mails at service SMTP level. The period of retention of said records is established by IFX Networks and informed to the customer as part of the process of service offer previous to the contract with the customer. As part of the product portfolio of aggregated value to messaging and collaboration, IFX Networks offers optional services of e-mail back-up and auditing that comply with international regulations even at the required levels by the United States’ financial entities.
For the shared web hosting services, IFX Networks keeps a record of access and activities of content manipulation. The retention period of said records is established by IFX Networks and informed to the customer as part of the service offer process previous to the contract.
IFX Networks records all the tasks performed by the company system administrators on the different hosting platforms and performs a regular audit on them. This record is done by a centralized system of log storage.
Due to the fact that the customer has the total control of the service administration of dedicated hosting including the virtualized services, the recording of logs and tasks related to the nonrepudiation services is the customers’ responsibility.
1.5.4. Principle of data confidentiality
IFX Hosted Services offers a scalable platform of high availability that allows users the management of a wide variety of products. Assuring the privacy and confidentiality of the user’s system and data is of vital importance for IFX.
Standard ITU-T X.805 establishes an explicit difference between data privacy and confidentiality. The first one is about protection of association of users’ identity and their activities. The second one refers to the protections against unauthorized access to the data content.
1.5.5. Privacy
IFX Networks internal policies mention data privacy according to what it is established in standard ITU X.805. It guarantees that the information supplied by users to any of our systems at the moment of recording is not shared with third parties without the users’ previous authorization.
a) Data confidentiality. Encrypted methods, lists of access control, and file access permits are used to guarantee data confidentiality.
The web access to the e-mail services offered to our customers is performed through secure sites that use SSL certificates granted by recognized entities worldwide. Additionally our customers are offered messaging and collaboration systems which access through their customers of traditional e-mails through the RPC protocol over HTTPS guaranteeing the confidentiality of information.
As part of our products of aggregated value, the customer has the option of acquiring encrypted e-mail services which guarantee that only previously authorized recipients have access to the information sent by our users. These services based on asymmetric encryption (public password) which are mentioned in standard ITU X.809 include a pair of passwords, one public and one private. Both passwords are different and although there is a mathematical relation between the two, it is not possible to calculate the private password from the public one.
For our services of shared and dedicated web hosting, IFX Networks applies a security policy based on lists of access control that guarantee access to the information. Its manipulation can only be performed by a valid user and with previously authorized privileges by the customer. All the control panels offered to the customers for the administration of their hosting services are protected with SSL certificates.
1.5.6. Principle of data integrity
According to recommendations ITU X.800 and X.815, the principle of data integrity refers to data that has not been altered by unauthorized processes. Furthermore, data integrity guarantees that information is protected against the following unauthorized operations: modification, suppression, creation, and copy of data. An indicator of unauthorized activities is provided.
In all services of shared hosting, IFX Networks uses a common frame of security that protects the integrity of the customer’s information using ACL’s and profiles with different access levels which ensure information can only be manipulated by the owner user and according to the privileges previously established in the service contract.
IFX Networks performs periodic upgrades on all its shared hosting systems with the purpose of avoiding intentional information manipulation that can be done by an external agent taking advantage of weaknesses at operational system levels, data base engines or e-mail software.
IFX Networks also provides anti-virus software in systems like e-mails and web hosting that can be the target of computer viruses, affecting the integrity of the customer’s information.
Customers of dedicated hosting including virtualized services are responsible for guaranteeing the integrity of the information that is stored in those systems as IFX Networks has no control over the systems at logical level.
1.5.7. Principle of availability
ITU X.805
The security of availability stated in Recommendation ITU X.805 guarantees that a network interruption shall not prevent authorized access to its elements, information stored, information flows, services and applications. This category includes recovery solutions in case of disaster and network restoration.
IFX Networks guarantees the availability levels previously agreed upon with the customer during the hiring process through a designed and implemented infrastructure for each of the services offered at hosting level.
All IFX Networks regional data centers have redundant systems in the electrical feeding systems. Our type Tier IV data centers have redundant schemes n+4 for the electrical feeding systems, temperature and humidity control that allow high availability to the shared hosting systems stored in those facilities.
Depending on the level of criticality each system and according to what was previously agreed in the service levels, the different hosting platforms have server farms that allow high availability in case of failure at operational system levels, hardware or even service levels.
IFX Networks implemented storage computing hardware for the critical mission systems in its different shared hosting platforms have redundant processing options in case of failure of one of the controllers. Likewise all our storage systems are implemented using RAID technologies to minimize the impact in availability caused by physical failure at disc level.
In case of an issue that affects the service availability and that exceeds systems scope and methods of high availability previously described, IFX Networks has a backup system that guarantees the possibility of information recovery in case of a computer contingency for all the shared hosting services.
These backup systems along with the methods and procedures established by the IFX Networks systems administrators team allow the provision of services in case of a computer failure and according to the established times in the availability levels offered to our customers.
1.6. Measures in relation to the networks and provided services to secure confidentiality, integrity, and availability of information principles and to secure authentication, authorization, and non-repudiation security services of information required to guarantee communication protection, the information that is sent through them and the personal data of the subscribers and/or users in relation to the networks and/or provided services by those operators.
The set of activities, actions, and methods are described in the previous steps. It is the set of parameters of authentication, protection, and encryption services directed to the development and securing each of the network’s components. Similarly, the services of diagnostic control and monitoring permanently observe changes in the network structure.
IFX Networks also has exclusively dedicated staff to network management. That staff manages and observes network behavior and each of the provided services on a regular basis allowing a fast observation of threats or problems that interrupt the stability of the services and the network backbone.
1.7. Measures regarding interception, violation or denial of communications provided by networks.
Access controls to the backbone and CPE (computing hardware located in the subscribers’ facilities), additionally, the systems of detection and monitoring of events, especially the network backbone, access network and Customer-Side allow observation over the executed and/or denied actions to users or third parties related to side-to-side communication.
1.8 Formal processes of the treatment of security incidences of the information belonging to the provider’s security management. When the violation comes from a third party and the provider of communications networks and/or services have knowledge of said violations. The provider also has to report the necessary measures for the behavior to stop and inform the competent authority about said violation.
The forensic analysis is a regular channel applied in an imminent disastrous situation. IFX Network has computing hardware available to recover post-disaster information. It can obtain detailed information of origin, type of executed action, indirect effects, potential effects of long, medium and short terms, mechanisms of fast recovery and information tracking, and structures of storage and database in HD modality. For that purpose, it has traffic sensors and mechanisms of traffic observation (origin – destination – service) configured over access interphases, UP-LINKS, NAPs and other interaction and integration points of public multi-operator and multi-access networks.
1.9 Mechanisms that guarantee confidentiality, integrity and availability of the data of the subscriber’s and or users. These mechanisms will be used to prevent and control telecommunications fraud and the compliance with the corresponding regulatory obligations.
Taking into account the tendencies in telecommunication and the globalization of information, it is necessary that government entities constantly regulate through legal tools the users’ information exchange between telecommunications service providers with the purpose of guaranteeing the confidentiality of information and avoiding bad use and mismanagement of said information.

Conditions and Legal Restrictions

IFX Cloud PBX: 1. The customer must have IFX Networks internet services. 2. The service is provided after a feasibility study. IFX Cloud Call Center: 1. The customer must have IFX Networks internet services 2. The service is provided after a feasibility study. 3. IP devices must be directly connected to the network, and not wirelessly. 4. Risk: In case of fraud or attack where IT security is compromised on the customer’s side, IFX has the power to terminate the service as stated in the Acceptable Use Policies (AUP). IFX MPLS –VPN, EPL, TDM 1. The service is provided after a feasibility study. IFX PREMIUM IP 1. The service is provided after a feasibility study. 2. Risk: In case of fraud or attack where IT security is compromised on the customer’s side, IFX has the power to terminate the service as stated in the acceptable use policies – PUA. IFX COLLOCATION 1. The service is provided after a feasibility study. 2. The equipment housed in the Datacenter must comply with the technical specifications. 3. It is the customer’s responsibility to keep the list of authorized contacts and contact profiles updated through the management center. IFX DEDICATED SERVER 1. The service is provided after a feasibility study. 2. It is the customer’s responsibility to keep the list of authorized contacts and contact profiles updated through the management center. WEB HOSTING 1. Risk: In case of fraud or attack where IT security is compromised on the customer’s side, or the customer publishes an inappropriate page, IFX Networks has the power to terminate the service as stated in the AUP. FIREWALL 1. The service is provided after a feasibility study. 2. Security policies are defined by the customer in conjunction with a security expert from IFX Networks.

Ethics Code

The Ethics Code is a document that compiles information regarding the ethical principles and rules of conduct by which the actions of all IFX Networks employees in the performance of their daily work duties will be governed; it is based on a set of principles and values, actions and procedures that have the highest respect for others, including the cultures and communities where IFX Networks manages its activities, including the environment. Its application extends to all IFX Networks employees regardless of their position or status. It is important to clarify that it will also apply in any transaction that IFX Networks makes with suppliers, customers, and all people and companies that IFX Networks has any relationship with; all employees have the obligation to know the code and comply with it, thus achieving a successful implementation. They are also obliged to participate in activities that involve training and application of the code.
Download Ethics Code

Acceptable use Policy

THE ACCEPTABLE USE POLICY (THE “POLICY”) FOR PRODUCTS AND INTERNET SERVICES IS DESIGNED TO PROTECT IFX CORPORATION AND SUBSIDIARIES (JOINTLY “IFX”), CUSTOMERS AND INTERNET COMMUNITY IN GENERAL FROM IRESPONSIBLE OR, IN SOME CASES, ILLEGAL ACTIVITIES. THE POLICY COMPRISES A LIST OF NON-EXHAUSTIVE AND NON-EXCLUSIVE ACTIONS PROHIBITED BY IFX. IFX RESERVES THE RIGHT TO MODIFY THE POLICY AT ANY TIME WITHOUT PRIOR NOTICE. Prohibited Uses of IFX Systems, Products and Services:
  1. Streaming, distribution or storage of any material that violates any applicable law is prohibited. This includes, without constraints, content protected by reproduction rights, trademark, business secret or other intellectual property right used without proper authorization, and content that is obscene and/or defamatory, constitutes an illegal threat or violates the laws of control of exports.
  2. Sending unsolicited email messages, including sending “junk mail” or other advertising material to people who have not specifically requested such material (e.g., “flood with email messages” or “spam”). The recipient’s repeated complaints will make the messages seem as “unsolicited”, as well as requests not to continue receiving such material. This includes, without constraints, mass commercial advertising, informational announcements and political communications. It also includes the publication of the same or similar message in one or more newsgroups (excess of cross-publication or multiple publications).
Misrepresentation in the message header in order to hide its true content is strictly prohibited. The Customer is also prohibited from hosting sites that are advertised through unsolicited email messages or sites that generate these types of unsolicited messages, even if they are not generated directly from this site. Hosting, advertising, marketing or making any software, program, product or service designed to violate this Policy in any way available to third parties or that violates the acceptable use policies of another Internet access provider, including, but not limited to, programs designed to send messages with unsolicited advertising (“spamware”), which are prohibited in this document. The maintenance of any service network that allows, without restrictions, the sending of messages or emails by third parties, including, but not limited to, open mail servers (“open mail relays”) and mailing lists that do not have effective authentication methods (e.g., “confirmed opt-in”) is strictly prohibited. IFX accounts or services may not be used to receive replies to messages sent from another Internet Service Provider if said messages violate this Policy or that of another provider. The Customer assumes responsibility for the compliance of this Policy and must hold IFX account less for any penalty or fine associated with sending unsolicited emails, including costs associated with other Internet access providers.
  1. The Customer is prohibited from associating with any activity that has as its object or seeks to interrupt services of other uses or Internet networks. This includes, but is not limited to, Internet Message Control Protocols or other types of attacks and transmissions of malicious electronic message packets (“mail bombing”). Any spam practice that IFX considers to seriously threaten its public image or its relationship with third parties, will cause the immediate interruption of the service until both parties agree on a solution that is acceptable to both.
  2. Resale, release or transfer of Voice Services over IP to third parties (e.g., “leaking”), without the express written authorization of IFX.
  3. Unauthorized use or misrepresentation of mail header information (e.g., “spoofing”).
  4. Access without authorization or trying to obtain unauthorized access to any account or computer resource that does not belong to the Customer (e.g. “cracking”), or to the IFX network.
  5. Obtaining or attempting to obtain services by any means or device with the purpose of avoiding payment.
  6. Unauthorized access, alteration or destruction, or any attempt thereof, of information about IFX customers or end users through any means or device.
  7. Voluntary involvement in any activity regarding authentication of users or their security, or that results in a denial of service (e.g., attacks on sequences of synchronized numbers) to any customer or end user of IFX that is in the network of IFX or in the network of another provider. This includes, but is not limited to, accessing information not provided by the Customer, registering on servers or accounts to which the Customer has not been expressly authorized to access; or test the security of other computer systems or networks.
  8. Participation in sending data or information that is contrary to federal, state or municipal laws, applicable to the service.
  9. Use of IFX Products and Services to interfere with the use of the IFX network by another customer or authorized user. Each IFX customer will be responsible for the activities of its customer / representative or end user base and, by accepting the service offered by IFX, is committed to advancing these standards and enforcing them. In the case of violations to the Acceptable Use Policy, IFX reserves the right to cancel the services or take steps to prevent the Customer from committing a violation of the IFX PUA, at its sole discretion and without prior notice.
The Customer shall compensate, defend and keep IFX without injury from claims, lawsuits, actions, damages, liability, trials, expenses and costs (including the reasonable rates of lawyers) arising from the conduct of the Customer. IFX will make reasonable efforts to notify the Customer of any claim seeking compensation of which it has knowledge as soon as possible, granting the Customer the opportunity to participate in its defense from said claim, agreeing that the Customer’s participation in any case may be conducted to the detriment of the interests of IFX, as reasonably determined by IFX. The inability to notify the Customer in a reasonable period of time shall not free or excuse the Customer from its obligation to compensate IFX, its related parties, subsidiaries, members, affiliates, officers and employees. This Policy is part of the Services Agreement between IFX and you (“the Customer”), incorporated in this Service Agreement for reference. Any modification made to the Policy must be considered as incorporated to this Policy and to the Services Contract. The continued use of the Service by the Customer will imply its tacit acceptance of the modifications made. Complaints regarding illegal use, network security, abuse or spam, must be sent to abuse@ifxcorp.com  

Which area do you want to contact?