Acceptable Use Policy
Effective July 1, 2020
This Acceptable Use Policy sets out the rules applicable to how the Providers services, can be used.
The Acceptable Use Policy is an integrated part of the Agreement consisting of the following documents:
Terms and Conditions
Service Level Agreement
Data Processing Agreement
Acceptable Use Policy
This Policy should be read in conjunction with the Terms and Conditions. We may suspend, terminate or take other interim action regarding your use of the Services, if, in our sole judgment, we believe you, directly or indirectly, violated this Policy or authorize or help others to do so.
We may modify this Policy from time to time by posting a revised version on our website. By using the Services, you agree to the latest version of this Policy.
Prohibited Content. You agree that you will not use the Services, or encourage, promote, facilitate or instruct others, to print, upload, offer, promote, reference or link to any information or content related to the following:
Solicitations or Advertising. Any unsolicited messages, promotions, advertising, or solicitations (like “spam”), including commercial advertising and informational announcements or otherwise.
Illegal, Harmful or Fraudulent Activities. Any illegal activities that violate the rights of others, or that may be harmful to others, our operations or reputation, including disseminating, promoting or facilitating child pornography, offering or disseminating fraudulent goods, services, schemes, or promotions, make-money-fast schemes, pyramid schemes, phishing, or pharming.
Infringing Content. Content that infringes or misappropriates the intellectual property or proprietary rights of others.
Offensive Content. Content that is harassing, defamatory, obscene, abusive, invasive of privacy, or otherwise objectionable.
Harmful Content. Content or other computer technology that may damage, interfere with, surreptitiously intercept, or expropriate any system, program, or data, or otherwise affect a security breach, including viruses, Trojan horses, worms, time bombs, or cancelbots.
Security and privacy
Login names and passwords must be kept secret and must not be communicated to any third party. The Provider must be notified immediately if they are compromised. If a customer forgets or loses their password, they will need to contact our support team to have it changed.
Customers are responsible for all traffic that is sent/printed from their account. It is, therefore, the Customer’s responsibility to ensure that all software is virus-free and up-to-date with all relevant security patches. In particular, server software running on public-facing ports, such as mail servers and proxy servers, must not be remotely exploitable.
If the Provider finds malicious traffic emanating from a customer environment, the Provider has an obligation to our other customers and peering networks to take urgent measures to block that traffic. In many cases, this can be achieved by selective port blocking, but in other cases, this will involve disconnecting and suspending the account until the issue has been resolved. The Provider understands that in many cases, a customer may not be responsible for or aware of the problem. Therefore the Provider will work with the Customer to resolve the issue as efficiently as possible to restore regular service.
Our Monitoring and Enforcement.
We reserve the right but do not assume the obligation, to monitor content sent through the Services and to investigate any violation of this Policy or misuse of the Services. We may remove or disable access to any user, content or resource that violates this Policy or any other Agreement we have with you for the use of the Services. We may report any activity that we suspect violates any law or regulation to appropriate law enforcement officials, regulators, or other relevant third parties. Our reporting may include disclosing relevant customer information. We may also cooperate with appropriate law enforcement agencies, regulators, or other appropriate third parties to help with the investigation and prosecution of illegal conduct by providing network and systems information related to alleged violations of this Policy.
Reporting Violations. If you become aware of any violation of this Policy, you will immediately notify the Provider and provide us with assistance, as requested, to stop or remedy the violation.