1. | Objectives
|
1.1 | Scorpion Research Ltd, referred in this document as the "Company", and its affiliates provide, directly or indirectly, a variety of information technology related products and services, including such service as internet access, content delivery services, various eMail packages and services, world wide web hosting arrangements, ATM, Frame Relay, voice and other data, online, Internet and telecommunications services, each referred to as a "Service" and collectively as the "Services". This document defines the Acceptable Use of the Services with a view of ensuring the integrity, security, reliability and privacy of the network, systems, products, services, server hosting facilities and data contained therein, collectively referred as the "Network".
|
2. | Interpretation
|
2.1 | For the purposes of this policy, a "User" is defined as any party who access a Service provided directly or indirectly by the Company or affiliates.
|
2.2 | The provisions of this Policy are intended as guidelines and are not meant to be exhaustive.
|
3. | Illegal Use
|
3.1 | It is contrary to the Acceptable Use Policy for any Users or other Service user to effect or participate in any conduct that violates law, regulation or the accepted norms of the Internet community, whether or not expressly mentioned in this Policy, whether actual or attempted, and whether directly or indirectly, through a Service.
|
3.2 | The Company reserves the right at all times to prohibit activities that damage its commercial reputation and goodwill.
|
3.3 | The Services may be used only for lawful purposes. The User acknowledges that the Company is unable to exercise control over the content of the information passing over the Network. Therefore, the Company is not responsible for the content of any message whether or not the posting was made by a legitimate User.
|
3.4 | It is prohibited to enter into any activity including the transmission, distribution or storage of any material, that is in violation of any applicable law or regulation. This includes, without limitation, material protected by copyright, trademark, trade secret or intellectual property right used without proper authorisation, infringed upon, or misappropriated; material that is obscene, defamatory, or constitutes an illegal threat; violates export control laws; or involves libel, slander, invasion of privacy, harassment, or obscenity.
|
3.5 | It is prohibited to enter into any activity that threatens the integrity or security of any network or computer system (including, but not limited to, transmission of worms, viruses and other malicious codes and accessing any device or data without proper authorisation).
|
3.6 | It is prohibited to enter into any activity that otherwise degrades or interferes with the use of a Service by another User.
|
3.7 | It is prohibited to enter into any activity that violates generally accepted standards of Internet or other networks conduct and usage, including, but not limited to, denial of service attacks, web page defacement, port and network scanning, and unauthorised system penetrations.
|
4. | The Network
|
4.1 | The Network may be used to link into other networks worldwide and the User agrees to conform to the Acceptable Use Policies of these other networks.
|
4.2 | The User undertakes to conform to the Internet protocols and standards.
|
4.3 | The User may not circumvent user authentication or security of any host, network, or account (referred to as "cracking" or "hacking"), nor interfere with service to any user, host, or network (referred to as "denial of service attacks").
|
4.4 | Without prejudice to the foregoing, The Company considers that any application that overloads the Network by whatever means will be considered as making profligate use of the Network and is prohibited. Use of IP multicast other than by means provided and co-ordinated by the Company is likewise prohibited.
|
4.5 | Users who violate systems or network security may incur criminal or civil liability. The Company will fully co-operate with investigations of suspected criminal violations, violation of systems or network security under the leadership of law enforcement or relevant authorities.
|
5. | Security
|
5.1 | Violations of system or network security are prohibited, and may result in criminal and civil liability. The Company will investigate incidents involving such violations and involve as well as co-operate with law enforcement or relevant authorities if a criminal violation is suspected. Examples of system or network security violations include, without limitation, the unauthorised access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorisation of the owner of the system or network; the unauthorised monitoring of data or traffic on any network or system without express authorisation of the owner of the system or network; the interference with service to any user, host or network including, without limitation, mailbombing, flooding, deliberate attempts to overload a system and broadcast attacks; or the forging of any TCP/IP packet header or any part of the header information in an eMail or a newsgroup posting.
|
5.2 | If approached with complaints relating to any of the above violations, the Company will co-operate and assist the law enforcement or relevant authorities with their investigations in order to bring such misuse and violations to an end.
|
5.3 | It is prohibited to enter into any activity that attempts to use the Service in such a manner so as to avoid incurring charges for or otherwise being required to pay for such usage.
|
6. | eMail
|
6.1 | It is explicitly prohibited to send unsolicited bulk eMail messages, often referred to as "junk mail" or "spam", whether commercial or otherwise of any kind, or to collect the responses from unsolicited eMail messages.
|
6.2 | It is also explicitly prohibited to allow others to send unsolicited bulk eMail messages either directly or by relaying through the Users systems. For the avoidance of doubt, Users must ensure that their systems cannot be relayed through. Users may not forward or propagate chain letters nor malicious eMail.
|
6.3 | A User may not solicit eMail for any other address other than that of the User, except with the full consent of the owner of the referred address.
|
7. | UseNet News
|
7.1 | A User may not post advertisements or messages that violate the charter of any newsgroup or mailing list. The Company reserves the right to make the determination whether a given message violates the newsgroup or mailing list charter. In most cases, it will defer to the judgment of the newsgroup or mailing list moderator or administrator.
|
7.2 | Commercial messages that are appropriate under the charter of a newsgroup or mailing list, or that are expressly solicited by the recipients are permitted.
|
7.3 | Conduct in connection with eMail or Usenet news that is an obvious nuisance (such as "Mail bombing") or that would be unlawful in other contexts (for example, but not limited to, threats, harassment, defamation, obscenity, or software piracy) is prohibited.
|
8. | Forgery Of Identity
|
8.1 | Falsifying User or other Service related information, including, but not limited to, intentionally omitting, deleting, forging or misrepresenting transmission information, including headers, return mailing and Internet protocol addresses, provided to the Company or to other Service users or engaging in any activities or actions intended to withhold or cloak actual identity or contact information, is prohibited. This provision is not intended to disallow the use of aliases or anonymous remailers for any legitimate purpose.
|
9. | Consequences Of Violation
|
9.1 | Violation of this Policy by a User may result in temporary suspension or permanent termination of one or more services at the sole discretion of the Company. Reimbursement of fees paid or due to be paid during service disablement resulting from Policy violations will not be issued.
|
10. | Compliance
|
10.1 | The Company may at its discretion run manual or automatic systems to determine compliance with this Policy and Users are deemed to have granted permission for this limited intrusion onto their networks or equipment for this purpose.
|
11. | Internet Watch Foundation
|
11.1 | The Company subscribes to and shall abide by advice given by the independent industry body The Internet Watch Foundation ("IWF") in relation to content of the Internet. For further information regarding IWF and its policy, please refer to http://www.iwf.org.uk directly.
|
12. | Modification
|
12.1 | The Company reserves the right to add, delete, or modify any provision of this Policy at any time without notice.
|
13. | Jurisdiction
|
13.1 | This Policy shall be governed by the laws of England and the parties hereto agree to submit exclusively to the jurisdiction of the Courts of England.
|