Acceptable Usage Policy

Version 1.0 | Effective Date: 01/12/2015

1. The following definitions apply in this policy:

“Data” information, documents, text, software, music, sound, photographs, graphics, video, messages and other materials of any kind and in any form;

“Transmit” use, facilitate, generate, link to, upload, post, publish, download, store, disseminate, email, send or receive via or in any way connected with our Services

 

2. You must not Transmit any Data which, or otherwise use our Services or carry out any acts or omissions in any way connected with our Services, in a manner which, we consider in any way involves or includes or relates to:

a)  conduct that is unlawful (including breach of any applicable laws, statutes, regulations, standards or codes of conduct whether or not compulsory), tortious, harmful, threatening, a nuisance, abusive, harassing, tortious, defamatory, vulgar, obscene, indecent, invasive of another’s privacy, hateful, inflammatory, racially, ethnically or otherwise objectionable;

b)  the infringement of third party intellectual property, privacy or other rights;

c)  viruses, Trojan horses, worms, time bombs, cancelbots or any other computer code, files or programs designed to interrupt, damage, destroy or limit the functionality of any software, hardware or Data;

d)  sending emails that might cause annoyance, inconvenience or anxiety to a recipient;

e)  unsolicited bulk emails, mail bombing, open relay, spam, chain letters, pyramid schemes or any similar activity, or any fraudulent schemes, or any inappropriate form of solicitation; or collection of the responses to any such schemes or solicitation;

f)  the forging of headers, manipulation of identifiers or otherwise disguising the origin of any Data;

g)  the provision of false or misleading information;

h)  denial of service attacks including (without limit) mailbombing, news bombing, ping storms, trolling, (posting outrageous messages to generate numerous responses), other flooding techniques, deliberate attempts to overload a system, broadcast attacks and any activity designed to cause a computer crash;

i)  attempting to or gaining unauthorized access to, or interfering with or damaging, any third party’s computer or Data including any attempt to breach authentication or security measures or any attempt to probe, scan or test the vulnerability of a computer system;

j)  ‘port scanning’ or other software intended to probe, scan, test the vulnerability of or access remote systems or networks;

k)  open proxy servers;

l)  unauthorized monitoring or interception of Data;

m)  potential or actual interference with or disruption to our computers or services to other customers including excessive use of our network resources (meaning use of more than 10% of server resources in the case of shared hosting) or other services;

n)  damage to our commercial reputation;

o)  any form of abuse towards staff, including harassment, swearing, rudeness or threats; or

p)  breach of generally accepted standards of “netiquette” or norms of the internet community.