Acceptable Use Policy

This Acceptable Use Policy specifies the actions prohibited by Green ISP ("the ISP"/"ISP") to users of the the ISP's or Wholsale Bandwidth providers Network. "Users" may be defined as "customer or anyone who uses or accesses the the ISP Network or Internet service". The ISP reserves the right to modify this Policy at any time, effective upon posting of the modified Policy to this URL/web page. Any modifications to this Policy will be made when the ISP feels it is appropriate and it is therefore it is advised that it is the User's responsibility to ensure their awareness of any such changes by checking this policy/URL from time to time.

ILLEGAL USE

The ISP Network may be used only for lawful purposes. Transmission, distribution or storage of any material in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or intellectual property right used without proper authorisation, and material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws.

THE NETWORK

1. The user acknowledges that the ISP is unable to exercise control over the content of the information passing over the the ISP Network. Therefore, the ISP is not responsible for the content of any message whether or not the posting was made by an ISP customer.

2. The ISP Network may be used to link into other networks worldwide and the user agrees to conform to the acceptable use policies of these networks.

3. In addition the user undertakes to conform to the Internet protocols and standards.

4. The user may not circumvent user authentication or security of any host, network, or account (referred to as "cracking" or "hacking"), nor interfere with service to any user, host, or network (referred to as "denial of service attacks").

5. Without prejudice to the foregoing, the ISP considers that any application that overloads the the ISP Network by whatever means will be considered as making profligate use of the the ISP Network and is as such NOT allowed. Use of IP multicast other than by means provided and co-ordinated by the ISP is likewise prohibited.

6. Users who violate systems or network security may incur criminal or civil liability. The ISP will fully co-operate with investigations of suspected criminal violations, violation of systems or network security under the leadership of law enforcement or relevant authorities.

7. User Bandwidth/Download and upload usage including "advanced traffic management"
We have recently introduced (1/8/14)"advanced traffic management" to enhance the quality of service for our customers as a whole, this should not effect general access of HTTP, FTP or e-mail services as these are given priority).
USAGE EXPLAINED:
Light - Light packages are for customers expecting to use no more than 100GB per month
Usage over this amount will be billed at £1.25 per GB.


Standard and Unlimited - Standard packages cater for the majority of broadband usage requirements and account for more than 80% of Broadband usage. Standard packages are for customers expecting to use no more than 100 GB per month. for ADSL2+ LLU and 21CN. FTTC Usage is UnlimitedGB and 100GB
Usage over this amount will be billed at £1.25 per GB.

As these limits are not specifically defined (for better flexibility) the good judgement of the Internet Systems Support Analyst team shall be used to generally define those limits.
The use of bandwidth or disk space in excess of those limits will therefore not be permitted.
If Green ISP or our any of our Bandwidth providers determine that excessive bandwidth or disk space utilisation is adversely affecting Green ISP,s ability to provide a good level of service accross all our customer base ,we may have to take immediate action form time to time.

SYSTEM AND NETWORK SECURITY

Violations of system or network security are prohibited, and may result in criminal and civil liability. The ISP will investigate incidents involving such violations and will involve and will co-operate with law enforcement if a criminal violation is suspected. Examples of system or network security violations include, without limitation, the following : · Unauthorised access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorisation of the owner of the system or network; · Unauthorised monitoring of data or traffic on any network or system without express authorisation of the owner of the system or network; · Interference with service to any user, host or network including, without limitation, mailbombing, flooding, deliberate attempts to overload a system and broadcast attacks; · Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting. If approached with complaints relating to any of the above violations, the ISP will co-operate and assist the Police and law enforcing bodies with their investigations in order to bring such mis-use and violations to an end.

E-MAIL

1. It is explicitly prohibited to send unsolicited bulk mail messages ("junk mail" or "spam") of any kind (commercial advertising, political tracts, announce-ments) etc.

2. It is also explicitly prohibited to allow others to send unsolicited bulk mail messages either directly or by relaying through the Users systems. For the avoidance of doubt, users must ensure that their systems cannot be relayed through. Users may not forward or propagate chain letters nor malicious e-mail.

3. A user may not solicit mail for any other address other than that of the user, except with full consent of the owner of the referred address.

USENET NEWS

All Users of the the ISP Network are advised to become familiar with the the ISP's information and guidelines which explain what the service is and how to use it.Posting of irrelevant material to newsgroups (also known as USENET spam) is also forbidden. Posting binaries to a non-binary newsgroup is forbidden.

INDIRECT OR ATTEMPTED VIOLATIONS OF THIS POLICY, AND ACTUAL OR ATTEMPTED VIOLATIONS BY A THIRD PARTY ON BEHALF OF A CUSTOMER OR A CUSTOMER'S END USER SHALL BE CONSIDERED VIOLATIONS OF THIS POLICY BY SUCH A CUSTOMER OR END USER.