ACCEPTABLE USE POLICY

This Acceptable Use Policy (“AUP”) governs your use of any services provided by Iglu. or group companies (“Iglu. Services”) and any use of Iglu’s website.

By subscribing for or receiving any Iglu Services, or by using our website, you agree to abide by the terms of this AUP, which will be incorporated into any agreement between you and Iglu. and shall apply to any use you make of our website.

Prohibited Uses – Overview

You may use the Iglu. Services only for lawful purposes.  You may not use the Iglu. Services:

  • in any way that breaches any applicable local, national or international law or regulation;
  • in any way that is unlawful or fraudulent, or has any unlawful or fraudulent purpose or effect;
  • for the purpose of harming or attempting to harm anyone, including minors, or in any manner which will, or is likely to, infringe the personal rights of others;
  • in any manner that will, or is likely to, infringe the copyright, trademark, trade secret or other intellectual property rights of others;
  • to transmit, or procure the sending of, any unsolicited or unauthorised advertising or promotional material or any other form of similar solicitation or spam;
  • in connection with any defamatory, indecent, obscene, offensive, threatening, racist, homophobic, terrorist or abusive conduct or activity;
  • to knowingly transmit any data, send or upload any material that contains viruses, Trojan horses, worms, time-bombs, keystroke loggers, spyware, adware or any other harmful programs or similar computer code designed to adversely affect the operation of any computer software or hardware; or
  • in any way that is inconsistent with the terms of your agreement with Iglu.

Specific Prohibitions

Without prejudice to the generality of the overview principles set out above, unacceptable use includes, but is not limited to, the following:

  • Posting, transmission, re-transmission, or storing material on or through any of Iglu.’s Services, if Iglu. reasonably believes that such posting, transmission, re-transmission or storage is:
    • in violation of any local, national or international law or regulation (including rights protected by copyright, trade secret, patent or other intellectual property or similar laws or regulations);
    • threatening or abusive;
    • racist, homophobic;
    • promoting violence or terrorist acts;
    • obscene;
    • indecent; or
    • defamatory.
  • Installation or distribution of pirated or other software products that are not appropriately licensed for use.
  • Resale of Iglu. Services without the express prior written consent of Iglu. (unless you are an authorised Reseller).
  • Deceptive or fraudulent marketing practices.
  • Actions that restrict or inhibit anyone – whether a customer of ISAAC or otherwise – in his or her use or enjoyment of Iglu. Services, or that generate excessive network traffic through the use of automated or manual routines that are not related to ordinary personal or business use of internet services.
  • Introduction of malicious programs into the ISAAC network or servers or software (e.g., viruses, Trojan horses and worms).
  • Causing or attempting to cause security breaches or disruptions of internet communications. Examples of security breaches include but are not limited to accessing data of which the customer is not an intended recipient, or logging into a server or account that the customer is not expressly authorised to access (e.g., port scans, flood pings, packet spoofing and forged routing information).
  • Executing any form of network monitoring that will intercept data not intended for you.
  • Circumventing user authentication or security of any host, network or account.
  • Interfering with or denying service to any user other than the customer’s host (e.g., denial of service attack-DDOS).
  • Using any program/script/command, or sending messages of any kind, designed to interfere with, or to disable a user’s terminal session.
  • Failing to comply with Iglu.’s procedures relating to the activities of customers on ISAAC-owned facilities.
  • Furnishing false or incorrect data on the order form contract (electronic or paper) including fraudulent use of credit card numbers or attempting to circumvent or alter the processes or procedures to measure time, bandwidth utilisation or other methods to document use of the Iglu. Services.
  • Sending unsolicited mail messages, including the sending of junk mail or other advertising material to individuals who did not specifically request such material, who were not previous customers of the customer or with whom the customer does not have an existing business relationship (e.g., e-mail spam).
  • Harassment (e.g., through language, frequency, or size of e-mail messages).
  • Unauthorised use or forging of mail header information.
  • Solicitations of mail or any other e-mail address other than that of the poster’s account or service, with the intent to harass or to collect replies.
  • Creating or forwarding chain letters or other pyramid schemes of any kind.
  • Use of unsolicited e-mail originating from within the Iglu. network or networks of other internet service providers on behalf of or to advertise any service hosted by ISAAC or connected via the Iglu. network.
  • Exporting, re-exporting, or permitting downloads of any content in violation of the export or import laws of the England and Wales or Scotland or without all required approvals, licenses and exemptions.
  • Use of IRC servers or bots connected to public IRC networks or servers.
  • Use or hosting of TOR or similar services aiming to provide anonymous internet access.

Security and Penetration Testing of Iglu. Managed Services

Any form of security testing (also known as penetration testing) on any system managed by Iglu. is subject to Iglu.’s prior written authorisation. The request for authorisation is to be submitted to Iglu. representative giving at least five (5) working days’ notice. Authorisation request should include the scope of the testing activity as well as planned start and end times. Iglu. technical teams will then review the request and identify the set of addresses / systems that can be included in the testing activity and issue an authorisation e-mail to the customer.

Enforcement

Iglu. will determine, in its discretion, whether there has been a breach of this AUP by you.  When a breach of this policy has occurred, we may take such action as we deem appropriate.

Failure to comply with this AUP constitutes a material breach of your agreement with Iglu. under which you are permitted to use the Iglu. Services, and may result in our taking all or any of the following actions: 

  • Immediate, temporary or permanent withdrawal of your right to use the Iglu. Services.
  • Immediate, temporary or permanent removal of any posting or material uploaded by you.
  • Issue of a written warning to you.
  • Legal proceedings against you for reimbursement of all costs on an indemnity basis (including, but not limited to, reasonable administrative and legal costs) resulting from the breach.
  • Further legal action against you as recommended by our lawyers.
  • Disclosure of such information to law enforcement authorities as we reasonably feel is necessary.

We exclude liability for actions taken in response to breaches of this AUP.  The responses described in this policy are not limited, and we may take any other action we reasonably deem appropriate.

Changes to this Policy

We may revise this AUP at any time by publishing it on our webpage and will provide you with full details and a copy of the revised AUP. Amendments shall automatically come into effect 30 days from the date on which we provide you notice of the proposed revision.  Some of the provisions contained in this AUP may also be superseded by provisions or notices published elsewhere on our website. 

Waiver and Severance

Any failure or delay in exercising or enforcing this policy shall not constitute a waiver of this policy or of any other right or remedy.