ACCEPTABLE USE POLICY
This Acceptable Use Policy specifies the actions prohibited by the Web Enterprise Business Solutions Limited (“W.E.B.S Ltd”) to users of the Network utilised by W.E.B.S services. Users may be defined as “customer or anyone who uses or accesses the Network utilised by W.E.B.S services or Internet service”. W.E.B.S reserves the right to modify this Policy at any time, effective upon posting of the modified Policy to this URL. Any modifications to this Policy will be made when W.E.B.S feels it is appropriate and it is the User’s responsibility to ensure their awareness of any such changes.
The Network utilised by W.E.B.S services may be used only for lawful purposes. Transmission, distribution or storage of any material in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or intellectual property right used without proper authorisation, and material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws.
- The user acknowledges that W.E.B.S is unable to exercise control over the content of the information passing over the Network utilised by W.E.B.S services. Therefore, W.E.B.S is not responsible for the content of any message whether or not the posting was made by a W.E.B.S customer.
- The Network utilised by W.E.B.S services may be used to link into other networks worldwide and the user agrees to conform to the acceptable use policies of these networks.
- In addition the user undertakes to conform to the Internet protocols and standards.
- The user may not circumvent user authentication or security of any host, network, or account (referred to as “cracking” or “hacking”), nor interfere with service to any user, host, or network (referred to as “denial of service attacks”).
- Without prejudice to the foregoing, W.E.B.S considers that any application that overloads the Network utilised by W.E.B.S services by whatever means will be considered as making profligate use of the Network utilised by W.E.B.S services and is as such NOT allowed. Use of IP multicast other than by means provided and co-ordinated by W.E.B.S is likewise prohibited.
- Users who violate systems or network security may incur criminal or civil liability. W.E.B.S will fully co-operate with investigations of suspected criminal violations, violation of systems or network security under the leadership of law enforcement or relevant authorities.
SYSTEM AND NETWORK SECURITY
Violations of system or network security are prohibited, and may result in criminal and civil liability. W.E.B.S will investigate incidents involving such violations and will involve and will co-operate with law enforcement if a criminal violation is suspected. Examples of system or network security violations include, without limitation, the following
- Unauthorised access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorisation of the owner of the system or network;
- Unauthorised monitoring of data or traffic on any network or system without express authorisation of the owner of the system or network;
- Interference with service to any user, host or network including, without limitation, mailbombing, flooding, deliberate attempts to overload a system and broadcast attacks;
- Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting.
- If approached with complaints relating to any of the above violations, W.E.B.S will co-operate and assist the Police and law enforcing bodies with their investigations in order to bring such mis-use and violations to an end.
- It is explicitly prohibited to send unsolicited bulk mail messages (“junk mail” or “spam”) of any kind (commercial advertising, political tracts, announce-ments) etc.
- It is also explicitly prohibited to allow others to send unsolicited bulk mail messages either directly or by relaying through the Users systems. For the avoidance of doubt, users must ensure that their systems cannot be relayed through. Users may not forward or propagate chain letters nor malicious e-mail.
- A user may not solicit mail for any other address other than that of the user, except with full consent of the owner of the referred address.
INTERNET WATCH FOUNDATION
W.E.B.S subscribe to and shall abide by advice given by the independent industry body The Internet Watch Foundation (“IWF”) in relation to content of the Internet. For further information regarding IWF and its policy, please refer to http://www.internetwatch.org.uk.
INDIRECT OR ATTEMPTED VIOLATIONS OF THIS POLICY, AND ACTUAL OR ATTEMPTED VIOLATIONS BY A THIRD PARTY ON BEHALF OF A W.E.B.S CUSTOMER OR A CUSTOMER’S END USER, SHALL BE CONSIDERED VIOLATIONS OF THIS POLICY BY SUCH CUSTOMER OR END USER.