Acceptable Use Policy
This Acceptable Use Policy specifies the actions prohibited by Green ISP ("the ISP"/"ISP") to users of the the ISP's or Wholsale Bandwidth providers Network. "Users" may be defined as "customer or anyone who uses or accesses the the ISP Network or Internet service". The ISP reserves the right to modify this Policy at any time, effective upon posting of the modified Policy to this URL/web page. Any modifications to this Policy will be made when the ISP feels it is appropriate and it is therefore it is advised that it is the User's responsibility to ensure their awareness of any such changes by checking this policy/URL from time to time.
The ISP Network may be used only for lawful purposes. Transmission, distribution or storage of any material in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or intellectual property right used without proper authorisation, and material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws.
1. The user acknowledges that the ISP is unable to exercise control over the content of the information passing over the the ISP Network. Therefore, the ISP is not responsible for the content of any message whether or not the posting was made by an ISP customer.
2. The ISP Network may be used to link into other networks worldwide and the user agrees to conform to the acceptable use policies of these networks.
3. In addition the user undertakes to conform to the Internet protocols and standards.
4. The user may not circumvent user authentication or security of any host, network, or account (referred to as "cracking" or "hacking"), nor interfere with service to any user, host, or network (referred to as "denial of service attacks").
5. Without prejudice to the foregoing, the ISP considers that any application that overloads the the ISP Network by whatever means will be considered as making profligate use of the the ISP Network and is as such NOT allowed. Use of IP multicast other than by means provided and co-ordinated by the ISP is likewise prohibited.
6. Users who violate systems or network security may incur criminal or civil liability. The ISP will fully co-operate with investigations of suspected criminal violations, violation of systems or network security under the leadership of law enforcement or relevant authorities.
SYSTEM AND NETWORK SECURITY
Violations of system or network security are prohibited, and may result in criminal and civil liability. The ISP will investigate incidents involving such violations and will involve and will co-operate with law enforcement if a criminal violation is suspected. Examples of system or network security violations include, without limitation, the following : · Unauthorised access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorisation of the owner of the system or network; · Unauthorised monitoring of data or traffic on any network or system without express authorisation of the owner of the system or network; · Interference with service to any user, host or network including, without limitation, mailbombing, flooding, deliberate attempts to overload a system and broadcast attacks; · Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting. If approached with complaints relating to any of the above violations, the ISP will co-operate and assist the Police and law enforcing bodies with their investigations in order to bring such mis-use and violations to an end.
1. It is explicitly prohibited to send unsolicited bulk mail messages ("junk mail" or "spam") of any kind (commercial advertising, political tracts, announce-ments) etc.
2. It is also explicitly prohibited to allow others to send unsolicited bulk mail messages either directly or by relaying through the Users systems. For the avoidance of doubt, users must ensure that their systems cannot be relayed through. Users may not forward or propagate chain letters nor malicious e-mail.
3. A user may not solicit mail for any other address other than that of the user, except with full consent of the owner of the referred address.
All Users of the the ISP Network are advised to become familiar with the the ISP's information and guidelines which explain what the service is and how to use it.Posting of irrelevant material to newsgroups (also known as USENET spam) is also forbidden. Posting binaries to a non-binary newsgroup is forbidden.
INDIRECT OR ATTEMPTED VIOLATIONS OF THIS POLICY, AND ACTUAL OR ATTEMPTED VIOLATIONS BY A THIRD PARTY ON BEHALF OF A CUSTOMER OR A CUSTOMER'S END USER SHALL BE CONSIDERED VIOLATIONS OF THIS POLICY BY SUCH A CUSTOMER OR END USER.