Acceptable Use Policy

The Hosting Services may not be used in any manner that is illegal, discriminatory, abusive, insulting, threatening, obscene, harassing, racist, or otherwise inappropriate and your commission, or authorising, aiding, abetting, encouraging or inciting any person to do or attempt to use the Services in any such manner (including, but not limited to, by any one or more of the following acts) is strictly prohibited:

  1. Violation of all or any legal rights of any person or company or other entity in any jurisdiction is strictly prohibited ;
  2. Using the Services in relation to crimes such as theft and fraud is strictly prohibited;
  3. Using the Services in breach of laws relating to the protection of copyright, trade secrets, patents or other intellectual property rights and laws relating to spam or privacy and whether such violation is by way of the installation or distribution of "pirated" software or otherwise, is strictly prohibited;
  4. Unauthorised copying of copyrighted material including, but not limited to, digitization and distribution of photographs from magazines, books or other copyrighted sources, copyrighted music or video and the installation of any copyrighted software for which you do not have an active license is strictly prohibited;
  5. Exporting software, technical information, encryption software or technology, in violation of domestic export control laws, is strictly prohibited;
  6. Introduction of malicious programs into the Service Provider 's network or servers (e.g., viruses, worms, Trojan horses, e-mail bombs) is strictly prohibited;
  7. Revealing your account password to others or allowing use of, modification of or tampering with the Services by third parties is strictly prohibited;
  8. Using another person's name, username or password or otherwise attempting to gain access to the Services of any other person is strictly prohibited;
  9. Using the Services to actively engage in procuring or transmitting material that is in violation of sexual harassment or workplace relations laws is strictly prohibited;
  10. Effecting security breaches or disruptions of network communication is strictly prohibited. Security breaches include, but are not limited to, accessing data of which you are not an intended recipient or logging into a server or account that you are not expressly authorised to access or corrupting any data. For the purposes of this paragraph, "disruption" includes, but is not limited to, network sniffing, pinged floods, packet spoofing, denial of service, and forged routing information for malicious purposes;
  11. Port scanning or security scanning is strictly prohibited (where such scanning is carried out without the prior written authorisation of the Service Provider );
  12. Executing any form of network monitoring which will intercept data not intended for you is strictly prohibited;
  13. Circumventing user authentication or security of any Service Provider host, network or account (or those of any supplier of the Service Provider ) is strictly prohibited;
  14. Interfering with or denying service to anyone is strictly prohibited;
  15. Using any program/script/command, or sending messages of any kind, with the intent to interfere with, or disable, any persons' terminal session, via any means, locally or via the Internet, is strictly prohibited;
  16. Sending unsolicited email messages in breach of the Spam Act 2003 is strictly prohibited;
  17. Any form of harassment via email, or any other form of messaging, whether through language, frequency, or size of messages is strictly prohibited;
  18. Unauthorised use, or forging, of email header information is strictly prohibited;
  19. Solicitation of email for any email address, with the intent to harass or to collect replies is strictly prohibited;
  20. Creating or forwarding "chain letters", "Ponzi" or other "pyramid" schemes of any type is strictly prohibited;
  21. Use of the Services in breach of any person's privacy (such as by way of identity theft or "phishing") is strictly prohibited.
Was this answer helpful? 2 Users Found This Useful (5 Votes)