September 2015 Princess Gemici
core.co.uk Page 1
Contents
PART A: ACCEPTABLE USE POLICY ("AUP") ...2
1. POLICIES REGARDING ACCEPTABLE USE ...2
2. GENERAL ...2 3. RIGHTS OF CORE ...2 4. UNAUTHORISED ACCESS/INTERFERENCE ...2 5. UCE/SPAMMING/MAILBOMBING ...3 6. SPOOFING/FRAUD ...3 7. E-MAIL RELAY ...3 8. USENET POSTINGS ...3 9. ILLEGAL ACTIVITY ...3
10. OTHER PROHIBITED ACTIVITIES ...3
11. COOPERATION WITH INVESTIGATIONS...4
12. PRIVACY ...4
13. CONTENT OF THE INTERNET ...4
14. MODIFICATIONS ...4
15. MISUSE OF ACCESS SERVICES ...4
core.co.uk Page 2
PART A: ACCEPTABLE USE POLICY ("AUP")
1. POLICIES REGARDING ACCEPTABLE USE
Core’s Internet Access service policies ("Policies") set forth below defines acceptable practices while using Core's Services via or which involve access to the internet (the "Access Services"). By using the Access Services, the Client acknowledges that it has read, understood, and agrees to abide by these Policies. In addition, the Client acknowledges that it will be responsible for violations of these Policies by third parties that have gained access to the Access Services through the Client. While it is not Core's intent to control or monitor the Client's on-line experience or the content of the Client's on-line
communications, Core may edit or remove content that it deems to be in violation of these Policies or that Core otherwise deems harmful or offensive upon giving notice to the Client. These Policies apply to all aspects of the Access Services, including e-mail, USENET postings, chatting, and browsing.
2. GENERAL
2.1 These Policies are designed to assist in protecting the Access Services, all Clients of Core and the Internet community as a whole from improper and/or illegal activity over the Internet. All Clients of Core are generally expected to behave in a reasonable fashion and to adhere to commonly accepted practices of the Internet community.
2.2 For the most part, simply exercising good judgment and common sense while using the Access Services should enable the Client to remain within the purview of acceptable conduct as further described in these Policies. The categories listed below are intended merely to serve as guidelines regarding appropriate and inappropriate conduct; the list is by no means exhaustive and should not be interpreted as such.
3. RIGHTS OF CORE
3.1 If the Client engages in conduct while using the Access Services that is in violation of these Policies or is otherwise illegal or improper, Core reserves the right to invoke the provisions of the Master Services Agreement in relation to the Client's access to the affected element(s) of the Access Services.
3.2 Core does not make any promise, nor does it have any obligation, to monitor or police activity occurring via the Access Services and will have no liability to any party, including the Client, for any violation of these Policies.
4. UNAUTHORISED ACCESS/INTERFERENCE
core.co.uk Page 3 or system without authorization. The Client may not attempt to gain unauthorized access to the user accounts or passwords of other users.
5. UCE/SPAMMING/MAILBOMBING
The Client may not use the Access Services to transmit excessive volumes of unsolicited commercial e-mail messages. Any unsolicited commercial e-e-mail messages or a series of unsolicited commercial e-e-mail messages constitutes Unsolicited Commercial E-mail "UCE" and is prohibited. In addition, "spamming" or "mailbombing" is also prohibited. Use of the service of another provider to send UCE, spam or mailbombs, to promote a site hosted on or connected to Core's network or services, is similarly prohibited.
6.
SPOOFING/FRAUD
The Client may not attempt to send e-mail messages or transmit any electronic communications using a name or address of someone other than the Client for purposes of deception. Any attempt to
impersonate someone else by the Client by altering its source IP address information or by using forged headers or other identifying information is prohibited. Any attempt by the Client to fraudulently
conceal, forge, or otherwise falsify its identity in connection with its use of the Access Services is prohibited. This section 6 shall not prevent the Client from undertaking "ethical hacking" whereby the Client is aware of the hacking attempt, provided that the Client has notified Core in advance of such activity.
7. E-MAIL RELAY
Any use of another party's electronic mail server by the Client to relay e-mail without express permission from such other party is prohibited.
8. USENET POSTINGS
All postings by the Client to USENET groups must comply with that group's charter and other policies. The Client is prohibited from cross posting to unrelated news groups or to any news groups where the post does not meet that group's charter. Continued posting of off-topic messages, including commercial messages (unless specifically invited by charter), is prohibited.
9. ILLEGAL ACTIVITY
The Client agrees to use the Access Services only for lawful purposes. Use of the Access Services for transmission, distribution, retrieval, or storage of any information, data, or other material in violation of any applicable law or regulation (including, where applicable any tariff or treaty) is prohibited. This includes, without limitation, the use or transmission of any data or material protected by copyright, trademark, trade secret, patent, or other intellectual property right without proper authorization and the transmission of any material that constitutes an illegal threat, violates export control laws, or is obscene, defamatory, or otherwise unlawful.
10. OTHER PROHIBITED ACTIVITIES
core.co.uk Page 4 10.1.1 attempting to intercept, redirect, or otherwise interfere with communications intended for others; and
10.1.2 intentionally transmitting files containing a computer virus or corrupted data.
10.2 Any other inappropriate activity or abuse of the Access Services (brought to the attention of Core), whether or not specifically listed in these Policies, may result in Core invoking the provisions of clause 28.3 in relation to the Client's access to the affected element(s) of the Access Services.
11. COOPERATION WITH INVESTIGATIONS
Core and the Client will cooperate with appropriate law enforcement agencies and other parties involved in investigating claims of illegal or inappropriate activity.
12. PRIVACY
Core makes no guarantee regarding, and assumes no liability for, the security and integrity of any data or information the Client transmits over the Internet, including any data or information transmitted via any server designated as "secure."
13. CONTENT OF THE INTERNET
Core provides only access to the Internet. Core does not operate or control the information, services, opinions or other content of the Internet. The Client agrees that it shall make no claim whatsoever against Core relating to the content of the Internet or respecting any information, product, service or software ordered through or provided by virtue of the Internet.
14. MODIFICATIONS
Core reserves the right to modify these Policies from time-to-time in its sole discretion. Core will notify the Client of any such modifications either via e-mail or by posting a revised copy of the Policies on its Web site.
15. MISUSE OF ACCESS SERVICES
15.1 Core reserves the right, where reasonably required, to install and use, or to have the Client install and use, any appropriate devices to prevent violations of these Policies, including devices designed to filter or terminate access to the Access Services. Core shall consult with the Client prior to installing, or requiring the installation of, any such devices.
15.2 If the Client becomes aware of any violation of these Policies by any person, including third parties that have accessed the Access Services through it, the Client shall promptly notify Core at
core.co.uk Page 5