Acceptable Use Policy

Last revised: 25/10/2010

1. Introduction

  1. 1.1 In this policy:
  2. "Data" means information, documents, text, software, music, sound, photographs, graphics, video, messages and other materials of any kind and in any form;
    "Transmit" means use, facilitate, generate, link to, upload, post, publish, download, store, disseminate, e-mail, send or receive via or in any way connected with our Services
  3. 1.2. We do not actively monitor, censor or directly control any Data Transmitted in connection with our Services including content displayed on websites or material sent by e-mail. It is your responsibility to comply with this policy. If, however, it comes to our attention that this policy has been or may be breached, we may act in accordance with our Terms & Conditions.

2. Policy

  1. 2.1. You must not Transmit any Data which, or otherwise use our Services or carry out any acts or omissions in any way connected with our Services) in a manner which, we consider in our discretion in any way involves or includes or relates to:
    1. conduct that is unlawful (including breach of any applicable laws, statutes, regulations, standards or codes of conduct whether or not compulsory), tortious, harmful, threatening, a nuisance, abusive, harassing, tortious, defamatory, vulgar, obscene, indecent, invasive of another's privacy, hateful, inflammatory, racially, ethnically or otherwise objectionable;
    2. the infringement of third party intellectual property or other rights;
    3. viruses, Trojan horses, worms, time bombs, cancelbots or any other computer code, files or programs designed to interrupt, damage, destroy or limit the functionality of any software, hardware or Data;
    4. unsolicited bulk e-mails, spam, chain letters, pyramid schemes or any similar or fraudulent schemes or any inappropriate form of solicitation; or collection of the responses to any such schemes or solicitation;
    5. the forging of headers, manipulation of identifiers or otherwise disguising the origin of any Data;
    6. the provision of false or misleading information;
    7. denial of service attacks including (without limit) mailbombing, news bombing, trolling, (posting outrageous messages to generate numerous responses), other flooding techniques, deliberate attempts to overload a system, broadcast attacks and any activity designed to cause a computer crash;
    8. attempting to or gaining unauthorised access to, or interfering with or damaging, any third party's computer or Data including any attempt to breach authentication or security measures or any attempt to probe, scan or test the vulnerability of a computer system;
    9. unauthorized monitoring or interception of Data;
    10. potential or actual interference with or disruption to our computers or services to other customers including excessive use of our network resources (meaning use of more than 10% of server resources in the case of shared hosting) or other services;
    11. damage to our commercial reputation; or
    12. breach of generally accepted standards of “netiquette” or norms of the internet community.