Acceptable Use Policy
KCOM Group PLC and its subsidiaries ("Us", "We" or "Our") have formulated this acceptable use policy in order to encourage the responsible use of Our networks, systems, services, web sites and products (collectively "Our Network and Services") by our customers ("You" or "Your") and other users ("Users"), and to enable us to provide You with secure, reliable and productive services.
1.1 This acceptable use policy ("Policy") sets out:
1.1.1 The minimum standards of behaviour required from You when You use our network and the internet via our network;
1.1.2 Certain actions which are prohibited; and
1.1.3 What we may do if You fail to meet those minimum standards.
1.2 The Policy is designed to protect both You and Us from any claims from third parties that Your use of Our services is inappropriate or damaging to such third parties.
1.3 The actions prohibited and the minimum standards set out in the Policy are not a complete list. Generally, conduct that violates law or regulation whether or not expressly mentioned in this Policy, is prohibited. We reserve the right at all times to prohibit activities that damage Our commercial reputation or interests .If You are unsure about any contemplated action or use please contact email@example.com.
1.4 By using the Services You agree to be bound by our Policy.
2 General Conduct
Our Network and Services must be used in a manner that is consistent with their intended purposes and may be used only for lawful purposes. Users may not use Our Network and Services in order to transmit, distribute or store material
2.1 in violation of any applicable law or regulation;
2.2 in a manner that will infringe the copyright, trademark, trade secret or other intellectual property rights of others or the privacy, publicity or other personal rights of others;
2.3 that is fraudulent, obscene, defamatory, libellous, threatening, abusive or hateful or contains a virus, worm, Trojan horse, or other harmful component;
2.4 containing fraudulent offers for goods or services or any promotional materials that contain false, deceptive or misleading statements, claims or representations; or
2.5 generally, in a manner that may expose Us or any of Our personnel to criminal or civil liability.
3 Lawful Use Of Resources
We require You to comply with Our instructions and all legal and regulatory requirements relevant to Your system, network and any services You may provide within the countries in which You operate. Where You fail to meet such legal and regulatory requirements You agree to indemnify Us against all losses, expenses, costs (including legal costs) or damages which may be suffered or incurred by Us in relation thereto.
3.1 It is Our policy to assist police and law enforcement bodies in any practicable way when required by applicable law. We reserve the right to disclose information to such bodies or highlight any concern of potential illegal activities being carried out via Our networks or systems.
4 Sending Of Electronic Mail
4.1 Under no circumstance will You transmit unsolicited bulk email of any kind, permit the usage of unsolicited bulk email to advertise any site located on Our network or to use any Your account to collect the responses from unsolicited e-mail.
4.2 Any mail server connected to Our network must not be configured as an open relay. Such a server could be used for the unauthorised transmission of bulk email, should this occur the transmission would be considered to have originated from You.
4.3 You must not use Our network or systems to transmit email with modified, false, inaccurate or purposefully erroneous headers or other information so that the origin of the e-mail is unclear or deceptive.
5 Disruption Of Service And Network Security Breaches
You agree to the following:
5.1 Under no circumstances should You use Our network or systems to gain or attempt to gain unauthorised access to any system. Actions considered unacceptable without prior authorisation from the system or network owner or operator include, but are not limited to, network probing, network mapping, vulnerability scanning or the exploitation of vulnerabilities or misconfigurations in systems or networks, with the intention of gaining unauthorised access or for any other purpose.
5.2 Any packets transmitted onto or across Our network by You should contain the correct source address of the emanating system. Any packets for which this is not the case may be prevented from traversing Our network without additional notice.
5.3 Networks must be configured so as not to accept external broadcast traffic.
5.4 You must not use any protocol or service with the intent of disrupting or preventing the legitimate use of any service by others.
5.5 You must not use Our networks or systems to transmit viruses.
5.6 You must not use Our networks or systems to install directly or indirectly any unauthorised software or other system modification on any system without prior authorisation of the system owner.
5.7 You must not attempt to intercept or modify any traffic traversing Our network.
5.8 You will not collect any personal information about other users of the Services without the consent of those users.
5.9 We do not make any guarantee about the security of data travelling over Our networks. While We take every practical step to protect such data it remains the responsibility of the communicating parties to ensure the security and integrity of their data.
5.10 You must not share your Internet connection with any 3rd parties You are unable to identify. Where Your connection is shared, You may be deemed responsible for the actions of any 3rd party using it.
5.11 We can not provide any guarantee that the Services will be suitable for real-time or time sensitive applications or services.
5.12 We reserve the right to throttle or block any service which We deem detrimental to Our business, network or the Services.
5.13 We accept no responsibility for the security of Your systems connected to Our network. Such security remains Your responsibility.
5.14 Where You feel that Your security / privacy may have been compromised via a system connected to Our network it is entirely Your responsibility to seek redress from any third parties. We will take all lawful and practicable steps to assist in any such investigation which maybe required, subject to the rights of such third parties.
6 Use Of Material
6.1 You accept that We cannot control and are not responsible for the content of the Internet. Any concerns regarding the content of systems or networks not located on Our network should be directed at the relevant system or network owners and not at Us.
6.2 You agree to conform to Internet protocols and standards.
6.3 You may not use Our networks or systems to distribute copyright material unless they are authorised to do so by the copyright owner.
6.4 You must not use Our networks or systems for improper or unlawful purposes or to receive, publish, transmit or send material or messages which, in reasonable opinion:
Are offensive, indecent, obscene, menacing, malicious or defamatory,
Encourage, induce, glorify, endorse, support, aid, instigate, prepare or commit acts of terrorism,
Infringe any intellectual property right (including, without limitation, trade marks, copyright,, design right, service mark, or patent or rights relating to domain names), or allow others to do so. This prohibition includes publishing a private e-mail message to third parties, by any means, without the express prior consent of the author. The e-mail addresses of Our subscribers are not for sale or commercial distribution to third parties without the express prior consent of the subscriber.
6.5 We take no responsibility for any material created or accessible on or through Our Networks and Services that is not posted by or at Our request.. We do not monitor nor exercise any editorial control over such material, but reserve the right to do so to the extent permitted by applicable law. We are not responsible for the content of any web sites other than Our web sites, including the content of web sites linked to Our web sites. Links are provided as Internet navigation tools only.
7 Use Of Usenet News Facilities
7.1 You may have access through Our Network and Services to search engines, subscription web services, chat areas, bulletin boards, web pages, Usenet, or other services that promulgate rules, guidelines or agreements to govern their use. You must adhere to any such rules, guidelines and agreements. If You post messages to Usenet newsgroups You are responsible for becoming familiar with any written charter or FAQ governing use of such newsgroups and complying with them. Regardless of such policies,
7.2 Usenet facilities should be used only in accordance with relevant Usenet group rules.
7.3 Excessive cross-posting, posting of irrelevant material to newsgroups is prohibited.
7.4 Binaries should only be posted to binary Usenet groups.
7.5 Commercial or advertising messages should not be posted to multiple news groups
8 Violation Of This Acceptable Use Policy
We are not obliged to take active steps to monitor customer compliance with this Policy. In the event that We become aware of a breach of this Policy We may take any or all of the following actions:
8.1 We may inform a network administrator of an issue or incident;
8.2 We may require help from You in resolving a security incident where Your system(s) may have been involved
8.3 We may, without notice, suspend or terminate a network connection or connections.
8.4 We may, without notice, remove or make inaccessible illegal, or potentially illegal, material created or accessible on or through Our Networks and Service
8.5 If We suspend the Services We provide to You, for any reason whatsoever,, You may be liable to pay a Reconnection Charge if We agree to resume such Services, plus all reasonable costs and expenses (including legal fees) that We may incur, if We have reasonable justification for doing so.
8.6 We do not issue service credits for any outages incurred through service disablement resulting from violations of this Acceptable Use Policy.
9 System and Network Security
You are prohibited from violating or attempting to violate the security of Our Network and Services, including, without limitation,
9.1 accessing data not intended for You or logging into a server or account which You are not authorised to access;
9.2 attempting to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without proper authorisation;
9.3 attempting to interfere with, disrupt or disable service to any user, host or network, including, without limitation, via means of overloading, "flooding", "mailbombing" or "crashing";
9.4 forging any TCP/IP packet header or any part of the header information in any e-mail or newsgroup posting; or
9.5 taking any action in order to obtain services to which such User is not entitled.
Violations of system or network security may result in civil or criminal liability. We will investigate occurrences that may involve such violations and may involve, and co-operate with, law enforcement authorities in prosecuting Users who are involved in such violations.
10 Other Activities
You must not engage in any activity, either lawful or unlawful, which We consider detrimental to its subscribers, operations, reputation, goodwill or customer relations.
Using Our facilities to engage in activities that violate the Terms of Service of any other network access provider is prohibited.
11 Customer Familiarisation
11.1 You are expected to make Yourself aware of any laws relevant to the service You are providing.
11.2 We are not responsible if You fail to make Yourself properly aware of laws effecting the service(s) You provide.
11.3 We may, at Our sole discretion, modify this Policy from time to time. Your continued use osf the Services signifies Your acceptance of any modifications to this Policy. Please check the Policy from time to time.
Please send reports of any activity in violation of this Policy to: firstname.lastname@example.org