Acceptable Use Policy (AUP)

Acceptable Use Policies

  1. Signal IT Solutions has the right to inspect traffic to and from End User server and the right to scan and probe End User servers to validate and ensure that such servers are free from worms and viruses. If Signal IT Solutions in its absolute discretion finds a worm or viruses on such End User servers, it shall give You reasonable notice to make the necessary corrections. In any event Signal IT Solutions reserve the right to suspend Service(s) until such End User server is free from a worm or virus.
  2. You shall not use the Service(s) (and shall ensure that the Service(s) are not used):
    (a) to send, receive, make available, copy, retransmit, broadcast or publish (whether directly or indirectly,
    and whether in cached, mirrored or proxy form or otherwise) any statements or material which:
    (i) infringe any copyright, moral right, patent or other proprietary (including, without limitation,
    intellectual property) right of any person or entity, or
    (ii) which infringe any applicable law, regulation or right of any person or entity including, without limitation, rights under contracts and of confidence, laws relating to defamation, contempt, blasphemy, infringement of privacy or personal data rights, malicious falsehood, seditious libel and any equivalent or related laws in any territory in which they are (or may be) accessed or made available;
    (b) to send, receive, make available, copy, retransmit, broadcast or publish (whether directly or indirectly, whether in cached, mirrored or proxy form or otherwise) any statements or material which are (or may, in places where they are accessible or made available) offensive, abusive, indecent, obscene, or menacing; or which are likely to encourage or are capable of encouraging anything which is in any way unlawful, or to incite violence, sadism, cruelty, or racial hatred, or which promotes or facilitates prostitution, or which are likely to mislead by inaccuracy, ambiguity, exaggeration, omission or otherwise;
    (c) to cause annoyance, inconvenience, or needless anxiety;
    (d) other than in conformance with policies of any connected networks and the Internet Standards;
    (e) use a Name such as to infringe the rights of any person, whether in statute or common law, in a corresponding trademark or name;
    (f) in a manner which occupies communications capacity or bandwidth frivolously, vexatiously or in a manner which is intended to or may inhibit any other person’s use thereof (including, without limitation, by use of facilities intended to substantially fill the communications capacity of leased lines, short packets and for hardware components of Signal IT Solutions’ network such as SPAM, UCE, TCP Sprayers and Flood Ping);
    (g) in a manner which permits IP data packets to be sent with source addresses outside the IP address range granted to You.
    (h) send Unsolicited Bulk Email. The Sender (whether End User or other third party must have explicit permission from all destination addresses before the Sender sends an email in any quantity. The Sender may not assume that the sender has been granted permission by passive actions such as the posting of an article to Usenet or a visit made to senders web site. Where the Sender has acquired explicit permission, either on a web site or through some other relationship the Sender should keep a record of this permission and must cease sending email when requested to stop;
    (i) Relay Unsolicited Bulk Email. Operators of email systems must ensure that they do not further the sending of Unsolicited Bulk Email by others. This applies to both material that originates on Your End User’s system and also third party material that might pass through it. This includes but is not
    limited to a prohibition on running an “open mail relay”, viz a machine which accepts mail from unauthorised or unknown senders and forwards it onward to a destination outside of Your End User’s
    machines or network. If Your End Users’ machine does relay mail, on an authorised basis, then it must record its passing through your system by means of an appropriate “Received” line. However, nothing in this clause shall prevent You or User running an “anonymous” relay service provided that the operator monitors it in such a way as to detect unauthorised or excessive use.
  3. End Users should not announce, or cause to be announced, specific routes unnecessarily.
  4. You agree to maintain any servers free of worms and viruses.