This Acceptable Use Policy outlines the prohibited actions for users of the network services provided by Web Enterprise Business Solutions Limited (“W.E.B.S Ltd”). Users include customers and anyone accessing or using the network services provided by W.E.B.S. W.E.B.S reserves the right to modify this Policy at any time, with updates effective immediately upon posting to this URL. It is the user’s responsibility to stay informed of any such changes.
ILLEGAL USE
The network provided by W.E.B.S may only be used for lawful purposes. Prohibited actions include, but are not limited to, transmitting, distributing, or storing material that violates any applicable law or regulation. This includes material protected by copyright, trademark, or other intellectual property rights used without authorization, as well as material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws.
THE NETWORK
- W.E.B.S does not exercise control over the content transmitted through its network, and is not responsible for content posted by users.
- Users agree to comply with the acceptable use policies of any other networks they access through the W.E.B.S network.
- Users must adhere to Internet protocols and standards.
- Users are prohibited from circumventing user authentication or security measures on any host, network, or account, including but not limited to activities commonly known as “cracking” or “hacking,” or interfering with service to any user, host, or network, such as through denial-of-service attacks.
- Any activity that overloads the network services provided by W.E.B.S is strictly prohibited. This includes, but is not limited to, profligate use of IP multicast other than through means provided and coordinated by W.E.B.S.
- Violations of system or network security may result in criminal or civil liability. W.E.B.S will cooperate fully with law enforcement investigations into violations of system or network security.
SYSTEM AND NETWORK SECURITY
Violations of system or network security are strictly prohibited and may result in legal consequences. W.E.B.S will investigate and cooperate with law enforcement regarding any incidents involving violations of system or network security, including but not limited to:
- Unauthorized access to data, systems, or networks, including attempts to probe, scan, or test vulnerabilities or to breach security or authentication measures without permission.
- Unauthorized monitoring of data or network traffic without the owner’s consent.
- Interference with the service of any user, host, or network, including, but not limited to, mail bombing, flooding, and deliberate attempts to overload a system.
- Forgery of any TCP/IP packet header or any part of the header information in emails or newsgroup postings.
- W.E.B.S will cooperate with law enforcement to investigate and stop any misuse or violations of network security.
- Sending unsolicited bulk email messages (spam), including commercial advertising, political campaigns, or announcements, is explicitly prohibited.
- Users must ensure that their systems cannot be used to relay unsolicited emails. It is prohibited to send or facilitate the sending of unsolicited bulk emails either directly or indirectly.
- Users may not solicit mail for addresses that are not their own without the express consent of the address owner.
INTERNET WATCH FOUNDATION
W.E.B.S subscribes to and abides by the advice and recommendations of the Internet Watch Foundation (IWF) regarding internet content. For further details about the IWF and its policies, please visit http://www.internetwatch.org.uk.
INDIRECT OR ATTEMPTED VIOLATIONS OF THIS POLICY, AS WELL AS ACTUAL OR ATTEMPTED VIOLATIONS BY A THIRD PARTY ON BEHALF OF A W.E.B.S CUSTOMER OR END USER, WILL BE CONSIDERED VIOLATIONS BY THE CUSTOMER OR END USER THEMSELVES.