Scorpion Research Logo Scorpion Research Header


  Corporate
Information
Software
Products
Bespoke
Solutions
Contact
Information
Legal
Disclosure
 


Network Services Acceptable Use Policy

1.Objectives

1.1Scorpion Research Ltd, referred in this document as the "Company", and its affiliates provide, directly or indirectly, a variety of information technology related products and services, including such service as internet access, content delivery services, various eMail packages and services, world wide web hosting arrangements, ATM, Frame Relay, voice and other data, online, Internet and telecommunications services, each referred to as a "Service" and collectively as the "Services". This document defines the Acceptable Use of the Services with a view of ensuring the integrity, security, reliability and privacy of the network, systems, products, services, server hosting facilities and data contained therein, collectively referred as the "Network".

2.Interpretation

2.1For the purposes of this policy, a "User" is defined as any party who access a Service provided directly or indirectly by the Company or affiliates.

2.2The provisions of this Policy are intended as guidelines and are not meant to be exhaustive.

3.Illegal Use

3.1It is contrary to the Acceptable Use Policy for any Users or other Service user to effect or participate in any conduct that violates law, regulation or the accepted norms of the Internet community, whether or not expressly mentioned in this Policy, whether actual or attempted, and whether directly or indirectly, through a Service.

3.2The Company reserves the right at all times to prohibit activities that damage its commercial reputation and goodwill.

3.3The Services may be used only for lawful purposes. The User acknowledges that the Company is unable to exercise control over the content of the information passing over the Network. Therefore, the Company is not responsible for the content of any message whether or not the posting was made by a legitimate User.

3.4It is prohibited to enter into any activity including the transmission, distribution or storage of any material, that is in violation of any applicable law or regulation. This includes, without limitation, material protected by copyright, trademark, trade secret or intellectual property right used without proper authorisation, infringed upon, or misappropriated; material that is obscene, defamatory, or constitutes an illegal threat; violates export control laws; or involves libel, slander, invasion of privacy, harassment, or obscenity.

3.5It is prohibited to enter into any activity that threatens the integrity or security of any network or computer system (including, but not limited to, transmission of worms, viruses and other malicious codes and accessing any device or data without proper authorisation).

3.6It is prohibited to enter into any activity that otherwise degrades or interferes with the use of a Service by another User.

3.7It is prohibited to enter into any activity that violates generally accepted standards of Internet or other networks conduct and usage, including, but not limited to, denial of service attacks, web page defacement, port and network scanning, and unauthorised system penetrations.

4.The Network

4.1The Network may be used to link into other networks worldwide and the User agrees to conform to the Acceptable Use Policies of these other networks.

4.2The User undertakes to conform to the Internet protocols and standards.

4.3The User may not circumvent user authentication or security of any host, network, or account (referred to as "cracking" or "hacking"), nor interfere with service to any user, host, or network (referred to as "denial of service attacks").

4.4Without prejudice to the foregoing, The Company considers that any application that overloads the Network by whatever means will be considered as making profligate use of the Network and is prohibited. Use of IP multicast other than by means provided and co-ordinated by the Company is likewise prohibited.

4.5Users who violate systems or network security may incur criminal or civil liability. The Company will fully co-operate with investigations of suspected criminal violations, violation of systems or network security under the leadership of law enforcement or relevant authorities.

5.Security

5.1Violations of system or network security are prohibited, and may result in criminal and civil liability. The Company will investigate incidents involving such violations and involve as well as co-operate with law enforcement or relevant authorities if a criminal violation is suspected. Examples of system or network security violations include, without limitation, the unauthorised access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorisation of the owner of the system or network; the unauthorised monitoring of data or traffic on any network or system without express authorisation of the owner of the system or network; the interference with service to any user, host or network including, without limitation, mailbombing, flooding, deliberate attempts to overload a system and broadcast attacks; or the forging of any TCP/IP packet header or any part of the header information in an eMail or a newsgroup posting.

5.2If approached with complaints relating to any of the above violations, the Company will co-operate and assist the law enforcement or relevant authorities with their investigations in order to bring such misuse and violations to an end.

5.3It is prohibited to enter into any activity that attempts to use the Service in such a manner so as to avoid incurring charges for or otherwise being required to pay for such usage.

6.eMail

6.1It is explicitly prohibited to send unsolicited bulk eMail messages, often referred to as "junk mail" or "spam", whether commercial or otherwise of any kind, or to collect the responses from unsolicited eMail messages.

6.2It is also explicitly prohibited to allow others to send unsolicited bulk eMail messages either directly or by relaying through the Users systems. For the avoidance of doubt, Users must ensure that their systems cannot be relayed through. Users may not forward or propagate chain letters nor malicious eMail.

6.3A User may not solicit eMail for any other address other than that of the User, except with the full consent of the owner of the referred address.

7.UseNet News

7.1A User may not post advertisements or messages that violate the charter of any newsgroup or mailing list. The Company reserves the right to make the determination whether a given message violates the newsgroup or mailing list charter. In most cases, it will defer to the judgment of the newsgroup or mailing list moderator or administrator.

7.2Commercial messages that are appropriate under the charter of a newsgroup or mailing list, or that are expressly solicited by the recipients are permitted.

7.3Conduct in connection with eMail or Usenet news that is an obvious nuisance (such as "Mail bombing") or that would be unlawful in other contexts (for example, but not limited to, threats, harassment, defamation, obscenity, or software piracy) is prohibited.

8.Forgery Of Identity

8.1Falsifying User or other Service related information, including, but not limited to, intentionally omitting, deleting, forging or misrepresenting transmission information, including headers, return mailing and Internet protocol addresses, provided to the Company or to other Service users or engaging in any activities or actions intended to withhold or cloak actual identity or contact information, is prohibited. This provision is not intended to disallow the use of aliases or anonymous remailers for any legitimate purpose.

9.Consequences Of Violation

9.1Violation of this Policy by a User may result in temporary suspension or permanent termination of one or more services at the sole discretion of the Company. Reimbursement of fees paid or due to be paid during service disablement resulting from Policy violations will not be issued.

10.Compliance

10.1The Company may at its discretion run manual or automatic systems to determine compliance with this Policy and Users are deemed to have granted permission for this limited intrusion onto their networks or equipment for this purpose.

11.Internet Watch Foundation

11.1The Company subscribes to and shall abide by advice given by the independent industry body The Internet Watch Foundation ("IWF") in relation to content of the Internet. For further information regarding IWF and its policy, please refer to http://www.iwf.org.uk directly.

12.Modification

12.1The Company reserves the right to add, delete, or modify any provision of this Policy at any time without notice.

13.Jurisdiction

13.1This Policy shall be governed by the laws of England and the parties hereto agree to submit exclusively to the jurisdiction of the Courts of England.




  © 1994 - 2017 Scorpion Research Ltd. All Rights Reserved Worldwide.