• No results found

Transforming business through technology. Acceptable Use Policy & Data Centre Policies

N/A
N/A
Protected

Academic year: 2021

Share "Transforming business through technology. Acceptable Use Policy & Data Centre Policies"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

(1)

September 2015 Princess Gemici

(2)

core.co.uk Page 1

Contents

PART A: ACCEPTABLE USE POLICY ("AUP") ...2

1. POLICIES REGARDING ACCEPTABLE USE ...2

2. GENERAL ...2 3. RIGHTS OF CORE ...2 4. UNAUTHORISED ACCESS/INTERFERENCE ...2 5. UCE/SPAMMING/MAILBOMBING ...3 6. SPOOFING/FRAUD ...3 7. E-MAIL RELAY ...3 8. USENET POSTINGS ...3 9. ILLEGAL ACTIVITY ...3

10. OTHER PROHIBITED ACTIVITIES ...3

11. COOPERATION WITH INVESTIGATIONS...4

12. PRIVACY ...4

13. CONTENT OF THE INTERNET ...4

14. MODIFICATIONS ...4

15. MISUSE OF ACCESS SERVICES ...4

(3)

core.co.uk Page 2

PART A: ACCEPTABLE USE POLICY ("AUP")

1. POLICIES REGARDING ACCEPTABLE USE

Core’s Internet Access service policies ("Policies") set forth below defines acceptable practices while using Core's Services via or which involve access to the internet (the "Access Services"). By using the Access Services, the Client acknowledges that it has read, understood, and agrees to abide by these Policies. In addition, the Client acknowledges that it will be responsible for violations of these Policies by third parties that have gained access to the Access Services through the Client. While it is not Core's intent to control or monitor the Client's on-line experience or the content of the Client's on-line

communications, Core may edit or remove content that it deems to be in violation of these Policies or that Core otherwise deems harmful or offensive upon giving notice to the Client. These Policies apply to all aspects of the Access Services, including e-mail, USENET postings, chatting, and browsing.

2. GENERAL

2.1 These Policies are designed to assist in protecting the Access Services, all Clients of Core and the Internet community as a whole from improper and/or illegal activity over the Internet. All Clients of Core are generally expected to behave in a reasonable fashion and to adhere to commonly accepted practices of the Internet community.

2.2 For the most part, simply exercising good judgment and common sense while using the Access Services should enable the Client to remain within the purview of acceptable conduct as further described in these Policies. The categories listed below are intended merely to serve as guidelines regarding appropriate and inappropriate conduct; the list is by no means exhaustive and should not be interpreted as such.

3. RIGHTS OF CORE

3.1 If the Client engages in conduct while using the Access Services that is in violation of these Policies or is otherwise illegal or improper, Core reserves the right to invoke the provisions of the Master Services Agreement in relation to the Client's access to the affected element(s) of the Access Services.

3.2 Core does not make any promise, nor does it have any obligation, to monitor or police activity occurring via the Access Services and will have no liability to any party, including the Client, for any violation of these Policies.

4. UNAUTHORISED ACCESS/INTERFERENCE

(4)

core.co.uk Page 3 or system without authorization. The Client may not attempt to gain unauthorized access to the user accounts or passwords of other users.

5. UCE/SPAMMING/MAILBOMBING

The Client may not use the Access Services to transmit excessive volumes of unsolicited commercial e-mail messages. Any unsolicited commercial e-e-mail messages or a series of unsolicited commercial e-e-mail messages constitutes Unsolicited Commercial E-mail "UCE" and is prohibited. In addition, "spamming" or "mailbombing" is also prohibited. Use of the service of another provider to send UCE, spam or mailbombs, to promote a site hosted on or connected to Core's network or services, is similarly prohibited.

6.

SPOOFING/FRAUD

The Client may not attempt to send e-mail messages or transmit any electronic communications using a name or address of someone other than the Client for purposes of deception. Any attempt to

impersonate someone else by the Client by altering its source IP address information or by using forged headers or other identifying information is prohibited. Any attempt by the Client to fraudulently

conceal, forge, or otherwise falsify its identity in connection with its use of the Access Services is prohibited. This section 6 shall not prevent the Client from undertaking "ethical hacking" whereby the Client is aware of the hacking attempt, provided that the Client has notified Core in advance of such activity.

7. E-MAIL RELAY

Any use of another party's electronic mail server by the Client to relay e-mail without express permission from such other party is prohibited.

8. USENET POSTINGS

All postings by the Client to USENET groups must comply with that group's charter and other policies. The Client is prohibited from cross posting to unrelated news groups or to any news groups where the post does not meet that group's charter. Continued posting of off-topic messages, including commercial messages (unless specifically invited by charter), is prohibited.

9. ILLEGAL ACTIVITY

The Client agrees to use the Access Services only for lawful purposes. Use of the Access Services for transmission, distribution, retrieval, or storage of any information, data, or other material in violation of any applicable law or regulation (including, where applicable any tariff or treaty) is prohibited. This includes, without limitation, the use or transmission of any data or material protected by copyright, trademark, trade secret, patent, or other intellectual property right without proper authorization and the transmission of any material that constitutes an illegal threat, violates export control laws, or is obscene, defamatory, or otherwise unlawful.

10. OTHER PROHIBITED ACTIVITIES

(5)

core.co.uk Page 4 10.1.1 attempting to intercept, redirect, or otherwise interfere with communications intended for others; and

10.1.2 intentionally transmitting files containing a computer virus or corrupted data.

10.2 Any other inappropriate activity or abuse of the Access Services (brought to the attention of Core), whether or not specifically listed in these Policies, may result in Core invoking the provisions of clause 28.3 in relation to the Client's access to the affected element(s) of the Access Services.

11. COOPERATION WITH INVESTIGATIONS

Core and the Client will cooperate with appropriate law enforcement agencies and other parties involved in investigating claims of illegal or inappropriate activity.

12. PRIVACY

Core makes no guarantee regarding, and assumes no liability for, the security and integrity of any data or information the Client transmits over the Internet, including any data or information transmitted via any server designated as "secure."

13. CONTENT OF THE INTERNET

Core provides only access to the Internet. Core does not operate or control the information, services, opinions or other content of the Internet. The Client agrees that it shall make no claim whatsoever against Core relating to the content of the Internet or respecting any information, product, service or software ordered through or provided by virtue of the Internet.

14. MODIFICATIONS

Core reserves the right to modify these Policies from time-to-time in its sole discretion. Core will notify the Client of any such modifications either via e-mail or by posting a revised copy of the Policies on its Web site.

15. MISUSE OF ACCESS SERVICES

15.1 Core reserves the right, where reasonably required, to install and use, or to have the Client install and use, any appropriate devices to prevent violations of these Policies, including devices designed to filter or terminate access to the Access Services. Core shall consult with the Client prior to installing, or requiring the installation of, any such devices.

15.2 If the Client becomes aware of any violation of these Policies by any person, including third parties that have accessed the Access Services through it, the Client shall promptly notify Core at

(6)

core.co.uk Page 5

PART B: DATA CENTRE POLICY ("DCP")

References

Related documents

In Germany, these include subsidies to the hard coal industry; “eco-taxes” that are to increase energy taxes 10% during 2001–2004 (although, in late 2001, the chancellor’s

David (1999) was amazed at the change in roles she experienced when she switched from her role as a reading specialist to that of a literacy coach. For the past 15 years, I have

Inverse modeling of soil water content to estimate the hydraulic properties of a shallow soil and the associated weathered bedrock.. Ayral

Several low and medium vigour Prunus rootstocks for use with peach cultivars were evaluated under controlled and in field conditions against two nematode

It is better for company to improve the job satisfaction and job performance activities because both of variables have significant influence on turnover

Favor you leave and sample policy employees use their job application for absence may take family and produce emails waste company it discusses email etiquette Deviation from

The lift to drag ratio increases as the angle of attack increased on both wings, for rear wing the lift to drag ratio is reduced when compared to that of front wing due to

In weighing the evidence, the Panel took into account that consumption of non-digestible carbohydrates results in reduced post-prandial blood glucose (and