Acceptable Use Policy for Broadband
IMPORTANT: These terms are in addition to our standard Acceptable Use Policy.
Effective Date: January 14, 2021
This Acceptable Use Policy (AUP) is intended to help protect our customers, and the Internet community, from the inappropriate use of the Internet. This AUP sets out the rules which apply to the use of our internet connection services including your responsibilities, and permitted and prohibited uses of those services.
We remind customers that when they are connected to the internet via our service they must comply with the law. Customers must not use our service:
· for the improper use of a public electronic communications network which is or would be an offence under Section 127 of the Communications Act 2003; or
· any unauthorised access or denial of service attack which is or would be an offence under Sections 1, 2 or 3 of the Computer Misuse Act 1990; or
· to commit an offence under the Regulation of Investigatory Powers Act 2000; or
· to commit an offence under any other relevant UK legislation;
A customer’s use of our service constitutes acceptance of this AUP.
We reserve the right to revise and update this AUP from time to time.
You are responsible for your actions on our network and systems you access through your Internet Service. If you act recklessly or irresponsibly in using your Internet Service or your actions endanger any person or the integrity or security of our Network, systems or equipment, your access may be restricted, suspended or terminated, without prior notice. In particular, you agree that you will not use, attempt to use or allow your Internet Service to be used to:
· store, send or distribute any content or material which is restricted, prohibited or otherwise unlawful under any applicable law or which is likely to be offensive or obscene to a reasonable person;
· store, send or distribute confidential information, copyright material or other content which is subject to third party intellectual property rights, unless you have a lawful right to do so;
· do anything, including store, send or distribute material which defames, harasses, threatens, abuses, menaces, offends, violates the privacy of, or incites violence or hatred against, any person or class of persons, or which could give rise to civil or criminal proceedings;
· do any other act or thing which is illegal, fraudulent or otherwise prohibited under any applicable law or which is in breach of any code, standard or content requirement of any other competent authority;
· do anything, including store, send or distribute material, which interferes with other users or restricts or hinders any person from accessing, using or enjoying the Internet, our Services, Network or systems;
· forge header information, email source address or other user information;
· access, monitor or use any data, systems or networks, including another person’s private information, without authority or attempt to probe, scan or test the vulnerability of any data, system or network;
· compromise the security or integrity of any network or system including our Network;
· deliberately access, download, store, send or distribute any viruses or other harmful programs or material;
· send or distribute unsolicited advertising, bulk electronic messages or otherwise breach your spam obligations set out in this policy, or overload any network or system including our Network and systems;
· use another person’s name, username or password or otherwise attempt to gain access to the account of any other User;
· tamper with, hinder the operation of or make unauthorised modifications to any network or system; or
· Authorise, aid, abet, encourage or incite any other person to do or attempt to do any of the above acts.
3. Unsolicited Commercial Email / Unsolicited Bulk Email (Spam)
Junk mail or Unsolicited Commercial Email (UCE), the term “spam” refers to submitting a commercial email to a large number of recipients who have not requested or opted to receive it and have no reasonable expectation to receiving email from the sender.
Email sent by a company or an organisation with whom the recipient has established a relationship or which was requested or accepted (opt-in requirement) by the recipient is not considered spam.
Spamming is not only harmful because of its negative impact on consumer attitudes toward File Sanctuary, but also because it can overload File Sanctuary’s network and disrupt service to File Sanctuary subscribers.
As a user of a File Sanctuary email service platform
· Include a conspicuous notice identifying the message as an advertisement or a commercial solicitation;
· Provide a valid physical postal address in each email your send;
· Include a valid email address or an unsubscribe link allowing the recipient to opt-out, either by replying to a valid return address, or by using an Internet based unsubscribe mechanism
· Process opt-out requests for at least 30 days after the sending of the commercial email and stop sending email to the requestor within 10 business days upon request;
· Set up and provide File Sanctuary with a valid “abuse” email address in order to process any Spam positive complaint.
· Comply with any regulation in force that covers direct marketing regulations
You may not:
· Include false, deceptive or misleading header information, including a false domain name or address;
· Send emails with a false, deceptive or misleading subject line;
· Include sexually explicit content in your email;
· Add an address into your list without the subscriber’s permission;
· Maintain an email address in your list for which an opt-out request has been received;
· Use lists older than 6 months without obtaining a confirmation of the subscriber’s permission;
· Harvest email addresses from websites or web services;
· Generate email address by using a dictionary attack combining letters and numbers into multiple permutations;
· Use scripts or automated ways to register for multiple email or user accounts to send commercial emails;
· Relay emails through a computer or network without permission;
· Use your subscription form to subscribe users for an unrelated list or to send them content differing from the one they have agreed to.
· send emails with added words/characters in an attempt to bypass Bayesian filters
· Send, or attempt to send, Spam of any kind from third-party networks using a return email address that is hosted on the File Sanctuary network, or referencing an email address hosted on the File Sanctuary network
· Send email messages which result in complaints from the recipient or from the recipient’s email provider, or which result in blacklisting of the sender’s email address or mail server
· Send email messages which are excessive and/or intended to harass or annoy others
· Continue to send email to a recipient that has indicated that he/she does not wish to receive it
· Take any actions intended to cloak the User’s identity or contact information, including but not limited to intentionally omitting, deleting, forging or misrepresenting message headers or return addresses
· Take any other action that results in blacklisting of the sender’s email address or mail server, or negatively impacts other Users who use the Email service.
In the absence of positive, verifiable proof to the contrary by a User, File Sanctuary will consider complaints by recipients of emails to be conclusive that the recipient did not subscribe or otherwise request the email(s) about which a complaint was generated.
4. Bulk Email
The use of our network to send bulk email whether opt-in or otherwise, and the use of bulk email to promote a site on our network is strictly forbidden. Bulk mailing is defined as:
· Sending E-mails at a rate of over 50 emails per 5 minutes
If bulk mailing attempts are detected the relevant ports may be blocked with temporary or permanent immediate effect.
5. Excessive use
You must use your Internet Service in accordance with any download or capacity limits stated in the specific plan that you subscribe to for the use of that Service. We may limit, suspend or terminate your Internet Service if you unreasonably exceed such limits or excessively use the capacity or resources of our Network in a manner which may hinder or prevent us from providing services to other customers or which may pose a threat to the integrity of our Network or systems. If File Sanctuary determines that excessive bandwidth, disk space utilisation or high CPU loads are adversely affecting File Sanctuary’s ability to provide service to other users, File Sanctuary may take immediate action. File Sanctuary will attempt to notify the account owner as soon as possible.
For connections supplied on an “unlimited” broadband ADSL, FTTC or FTTP product, File Sanctuary reserves the right to force a change in the supplying carrier if monthly download usage exceeds 100GB on more than one occasion. The change in carrier will ensure that the current broadband technology continues to be used (eg if supplied using FTTC, it will remain an FTTC connection at the same speed), but the path the traffic takes taken over another carrier of File Sanctuary’s choice. File Sanctuary will attempt to notify the account owner of the change prior to action.
6. Illegal Use
The File Sanctuary network may only be used for lawful purposes. For example, Users may not use the File Sanctuary network to create, transmit, distribute, or store content that: violates a trademark, copyright, trade secret or other intellectual property rights of others, violates export control laws or regulations, violates the privacy, publicity or other personal rights of others, impairs the privacy of communications, contains obscene, offensive, unlawful, defamatory, harassing, abusive, fraudulent, or otherwise objectionable content as reasonably determined by File Sanctuary, encourages conduct that would constitute a criminal offense or give rise to civil liability, constitutes deceptive online marketing, causes technical disturbances to the File Sanctuary network, its affiliated networks, or the network used by Users to access the Email service., or violate the policies of such networks, including, but not limited to, intentional introduction of any viruses, Trojan horses, worms, time bombs, cancel bots or other computer programming routines that are intended to damage, detrimentally interfere with, surreptitiously intercept or expropriate any system or data, or assists, encourages or permits any persons in engaging in any of the activities described in this section. If the Client becomes aware of any such activities, the Client is obligated to immediately notify File Sanctuary and take all other appropriate actions to cause such activities to cease.
7. Consequences of Unacceptable Use
File Sanctuary reserves the right to suspend or terminate User’s access to the Email Service and/or internet service upon notice of a violation of this policy. If File Sanctuary believe that the policy has been breached or the integrity of the network and/or the performance of others users are at risk, then File Sanctuary will contact the Client with notice of its intent or to notify the User of the breech of the policy.
8. Administration of Policy
The Client understands that the administration of this policy requires the exercise of discretion and judgment by File Sanctuary. File Sanctuary agrees to exercise good faith in its administration of this policy and in making determinations under the policy.