This Acceptable Use Policy sets out the rules which apply to use our communicaction services including your responsibilities and permitted and prohibited uses of those services. Compliance with this policy ensures you may continue to enjoy and allow others to enjoy optimum use of our services.
You are responsible for your actions on our network and systems you access through your service. If you act recklessly or irresponsibly in using your service, or your actions endanger any person or the integrity or security of our Network, systems or equipment, your access may be restricted, suspended or terminated, without prior notice.
In particular, you agree that you will not use, attempt to use or allow your internet service to be used to:
Also known as junk mail or Unsolicited Commercial Email (UCE), the term "spam" refers to submitting a commercial email or SMS messages to a large number of recipients who have not requested or opted to receive it and have no reasonable expectation to receiving email or SMS from the sender.
Email or SMS sent by a company or an organisation with whom the recipient has established a relationship or which has requested or accepted (opt-in requirement) by the recipient is not considered spam.
Spamming is not only harmful because of its negative impact on consumer attitudes toward the supplier, but also because it can overload the supplier's network and disrupt service to the suppliers subscribers.
As a user of the supplier, you must comply with any regulation in force that covers direct marketing regulations if you are sending communications to large multiple lists of users.
In the absence of positive, verifiable proof to the contrary by a user, the supplier will consider complaints by recipients of emails or SMS messages to be conclusive that the recipient did not subscribe or otherwise request the email(s) or SMS about which a complaint was generated.
You must use your service in accordance with any download or capacity limits stated in the specific plan that you subscribe to for the use of that service. We may limit, suspend or terminate your internet service if you unreasonably exceed such limits or excessively use the capacity or resources of our Network in a manner which may hinder or prevent us from providing services to other customers or which may pose a threat to the integrity of our Network or systems.
If the supplier determines that excessive bandwidth, disk space utilisation or high CPU loads are adversely affecting the supplier's ability to provide service to other users, the supplier may take immediate action. The supplier will attempt to notify the account owner as soon as possible.
Where a data service is specified as Unmetered or Unlimited use, reasonable usage is considered to be within 500GB per month where this usage is exceeded, the supplier reserves the right to apply policies in traffic management to limit or restrict the usage above this level or to terminate the users access to the services if the limit continues to be exceeded after notification to the user.
The supplier's network may only be used for lawful purposes. Users may not use the supplier's network to create, transmit, distribute or store content that:
The supplier reserves the right to suspend or terminate the user's access to the services upon notice to the client of a violation of this policy. If the supplier believes that the policy has been breached or the integrity of the network and/or the performance of other users are at risk, then the supplier will contact the client with notice of its intent tor to notify the user of the breach of the policy.
We undertake traffic management to ensure taht our Clients and Users receive optimum performance at all times. The policy applied is as follows.
Our broadband products are subject to traffic management to ensure you receive optimum performance at all times.
Like other providers, we deliver broadband service over a shared network. To provide a sustainable quality broadband service to all our customers we have to manage the network.
The principles of our network management policies are:
Traffic types are identified in a real-time based on a combination of port, source IP address and DPI signature detection. Tihs allows us at any given time to see exactly what traffic is on the network and who is doing what.
At times, we may prioritise time sensitive traffic such as VoIP by reducing the throughput of standard traffic.
Traffic is prioritised according to time sensitivity. The following table outlines the standard prioritisation classes.
|VPN||iPlayer and YouTube||Binary Usenet|
The client understands that the administration of this policy requires the exercise of discretion and judgement by the supplier. The supplier agrees to exercise in good faith in its administration of this policy and in making determinations under the policy.
This policy was last updated on the 5th September 2017.
Please note, this policy may be updated at any time without notice. Please check back regularly to ensure your business practice keeps inline with the restrictions set out within this policy.