USE POLICY. iprimus.com.au

Similar documents
Acceptable Use Policy Document ID: SER-POL-001

Acceptable Use Policy

USAGE POLICIES. is defamatory, offensive, abusive, indecent, obscene, or constitutes harassment;

Acceptable Use Policy

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP)

Acceptable Use and Publishing Policy

ACCEPTABLE USE POLICY

Acceptable Use Policy. Effective January 2017

Midstate Telephone & Midstate Communications. Acceptable Use Policy

The AUP applies to all Snowball products and services but is in particular applicable to internet services.

amaysim NBN Broadband Fair Go Policy Valid as of May 2017

Acceptable Use Policy

Acceptable Use Policy (AUP)

Acceptable Use Policy

ACCEPTABLE USE POLICY

PTLGateway Acceptable Use Policy

Magna5 reserves the right to make modifications to this policy at any time.

ACCEPTABLE USE POLICY

Acceptable Use Policies

Any reference in the Term to you or your means you as a user of the Website.

VOCUS SIP SERVICE SCHEDULE

Acceptable Use Policy

region16.net Acceptable Use Policy ( AUP )

NebraskaLink Acceptable Use Policy

NUCONNECT INTERNET ACCEPTABLE USE POLICY

Acceptable Usage Policy

You may contact The Translation Network by at You may also call The Translation Network at

GhostFiber Acceptable Use Policy

TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE

TERMS AND CONDITIONS FOR USE OF THE SAFARICOM PREPAY BLACKBERRY SERVICE

TELEPHONE AND MOBILE USE POLICY

Acceptable Usage Policy Published by FirstNet March 2015

Terms and Conditions of use for the

300 Lena Drive Aurora, Ohio P: F: Page 1 of 5

BUCKEYE INTERNET SERVICE ACCEPTABLE USE POLICY

NETCOM.cm Acceptable Use Policy

The Readlyn Telephone Company dba RTC Communications NETWORK MANAGEMENT AND ACCEPTABLE USE POLICY Internet Service

Acceptable Use Policy ("AUP")

Breckenridge Financial Supplies Website Use Policy

Acceptable Use Policy Updated 1/16/2018

Coastal Babysitters Privacy Policy

WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY

Acceptable Use Policy

Fair and acceptable usage policy

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.

Acceptable use policy for SLT idc services(ver 1.2)

Service Specific Terms & Conditions

PROFESSIONAL NETWORK SERVICES ACCEPTABLE USE POLICY ( AUP )

Terms Of Use AGREEMENT BETWEEN USER AND DRAKE MODIFICATION OF THESE TERMS OF USE LINKS TO THIRD PARTY WEB SITES USE OF COOKIES

ACCEPTABLE USE POLICY (AUP) 3W INFRA reserves the right to unilaterally amend the conditions set out in the Acceptable Use Policy (the Policies ).

Sac County Mutual Telephone Company Acceptable Use Policy High Speed Internet Service Page 1 of 5. Sac County Mutual Telephone Company

IP WAN SERVICE SCHEDULE

: Acceptable Use Policy

FreedomNet Solutions Acceptable Use Policy ( )

WEBSITE TERMS AND CONDITIONS

The following is the Lightning IP Acceptable Usage Policy ( AUP ) for all Users of the Lightning IP Services. In General

Communication and Usage of Internet and Policy

Wave s High-Speed Internet Service Acceptable Use Policy

Fooji Code of Conduct

Terms and Conditions of Website Use

Acceptable Use Policy

ACCEPTABLE USE POLICY FOR HIGH SPEED INTERNET SERVICE

Western Iowa Telephone Association (dba Wiatel, Western Iowa Telecom) AUP Wiatel Wiatel Company 1. Applicability. User 2. Compliance Required.

1.1. This User Agreement (hereinafter referred to as the Agreement) refers to the website located at

Sanuk Systems Broadband Service. Terms and Conditions

MON-CRE TELEPHONE COOPERATIVE, INC. ACCEPTABLE USE POLICY

SMS SERVICE PROVISION

PSS Affiliate Agreement

PRIMUS ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY

UCLan-Wireless for Apple iphone

We collect information from you when You register for an Traders account to use the Services or Exchange and when You use such Services. V.

CHAPTER 13 ELECTRONIC COMMERCE

Acceptable Use Policy

Electronic Network Acceptable Use Policy

Acceptable Usage Policy

YADTEL - Privacy Information INFORMATION WE COLLECT

3. As far as the hosting services of WWW INFOTECH are through leased severs of our data centre partners in US and UK through contracts.

This Policy applies to all staff and other authorised users in St Therese School.

The Safe and Sound Services are available for individuals aged 18 years or older.

PTCI INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION

Healthfirst Website Privacy Policy

Voice over IP Services (TekVoice)

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010

Our Customer Terms Page 1 of 14 Telstra s Network IVR Solution

Terms and Conditions for External accounts Service

NATIONAL UNIVERSITY OF SINGAPORE COMPUTER CENTRE ACCEPTABLE USE POLICY FOR IT RESOURCES. VERSION 4.1 Oct 2013

NOOTRY TERMS OF SERVICE

Acceptable Use Policy

2.1 Website means operated and owned by UCS Technology Services, including any page, part of element thereof;

HF Markets SA (Pty) Ltd Protection of Personal Information Policy

MOBILE VOICE SERVICE SCHEDULE

Acceptable Use Policy Metamora Telephone Company Marseilles Telephone Company MTCO Communications

TERMS AND CONDITIONS

Business Lite powered by Microsoft Office 365

Acceptable Use Policy

Starflow Token Sale Privacy Policy

Student Network, Computing & Software Usage Regulations Version th July 2006

TERMS AND CONDITIONS

Our Customer Relationship Agreement BIZPHONE SERVICE DESCRIPTION

Transcription:

ACCEPTABLE USE POLICY iprimus.com.au

iprimus ACCEPTABLE USE POLICY 1. ABOUT THIS POLICY This document is the iprimus Acceptable Use Policy (Policy). In this Policy you and your mean the Customer; and iprimus, Primus, we, us or our mean Primus Telecommunications Pty Ltd (ABN 69 071 191 396). This Policy aims to ensure iprimus can continue to provide high quality telecommunications services (including but not limited to telephone, internet, mobile phone, internet telephony and other telecommunications services) (Services) to all Customers in compliance with applicable laws and industry codes. This Policy also looks to safeguard the security and integrity of the infrastructure and systems which we use to deliver Services in order to maintain them consistently for the common benefit of all users and other suppliers of telecommunications. The Policy applies to all our Services. It sets out Customers responsibilities when using our Services and confirms the steps we may take to ensure and monitor compliance with this Policy. Capitalised terms not defined in this policy have the meaning given to them in the Agreement, a copy of which is available at http://www. iprimus.com.au/legal/standard-forms-of-agreement/ (Agreement). 2. WHEN DOES THIS POLICY APPLY? This Policy applies to all Customers and any users of our Services. By acquiring or using any of our Services, you are taken to have agreed to comply with the terms of this Policy. We may rely on this Policy where a Customer or other end users use of a Service is: not in accordance with this Policy; and/or reasonably considered to be use outside the purposes of the relevant Plan. 3. GENERAL RESPONSIBILITY FOR BEHAVIOUR Every end user is responsible for their use of our Services, network and the operation of any systems or applications accessed or used with our Services. All Customers agree they will not use, attempt to use or allow their Service to be used for any unlawful or malicious purpose. Any act that endangers any person or risks endangering or compromising the security or effective operation of our network, or any of our systems or equipment (or the network, systems or equipment of our suppliers), may mean access to a Service will be restricted, suspended or terminated in accordance with the Agreement and this Policy. When using a Service, we may require users to comply with rules imposed by our upstream suppliers or from a third party from which you access content. Where a supplier or third party provider considers one of our Customers is in breach of this Policy, they may require we prevent the relevant Customer continuing to breach this Policy. 1.

If a Customer fails to comply with the Agreement or this Policy, we may suspend or cancel a Customer s use of, or access to, some or all Services. More specific examples of conduct which may breach this Policy Further to the general rights and responsibilities set out above and in the Agreement, all Customers agree they will not use, attempt to use or allow their Service to be used to: a) breach any law, code or standard; b) c) d) transmit, publish or communicate material which is defamatory, offensive, abusive, indecent, menacing, unwanted or violates the privacy of another party; distribute communication to a person or group who has indicated that they do not wish to receive the communication from the Customer; store, send or distribute any content which is restricted, prohibited or unlawful under any applicable law, or that is likely to offend a reasonable person; e) f) g) h) i) j) send or distribute unsolicited advertising or bulk messages not in accordance with the Spam Act 2003; do anything which incites violence or hatred against, any person or class of persons, or which could give rise to civil or criminal proceedings; gain unauthorised access to a person s private or personal information or a company s commercially sensitive information (or attempt to do either); use another person's name, username or password or attempt to gain access to the account of any person; provide false, misleading or deceptive information about yourself or your business to us or any other person in relation to your use of the Services or in order to gain access to a Service or a Service feature; or infringe any person or company s intellectual property or other rights; UNLAWFUL USE 2.

k) l) m) n) compromise the security or integrity of any network or system; access, download, store, send or distribute viruses, spy software or other harmful material; interfere, restrict or disrupt Services or any other person or company's use or enjoyment of Services; use the Service to communicate with emergency service organisations where an emergency situation does not exist; o) disguise the origin of a use or communication; p) q) access, monitor or use any data or traffic on any systems or networks without authority; attempt to probe, scan or test the vulnerability of any data, system or network; r) use the Services for the purposes of arbitrage; s) t) u) overload any network or system including our infrastructure, network and/or systems; tamper with, hinder the operation of or make unauthorised modifications to any network or system; authorise, aid, abet, encourage or incite any other person to do or attempt to do any of the above acts. Provider not responsible for content Customers acknowledge that: a) we are not responsible for the content of the Services; b) use of the Services is at the Customer s sole risk; c) we are not liable for any unsolicited or unwelcome information disseminated via the Services to the Customer or the consequences of the Customer receiving such information; d) the Internet: i. is not necessarily a secure and confidential method of communication and the Customer transmits data at their own risk; and ii. contains viruses, Trojan programs, spy software and other harmful material that may destroy or corrupt Customer s own system; and iii. is not controlled by us and we are not liable for any damage to, or loss of data caused by material accessed on the internet. Customers are responsible for providing, configuring or maintaining any equipment or software they need to access the Services, as well as for the security and integrity of Customer s data (in particular for protecting equipment from unauthorised third parties using your hardware of software) except where we have agreed to provide and manage certain equipment or software. MALICIOUS USE 3.

4. UNREASONABLE USE Primus considers Customer use of a Service, plan inclusion, promotion and/or offer to be unreasonable if accessed or utilised for any non-ordinary purpose or if the Plan is a residential plan for household or personal use only, but is instead used for commercial or other untypical household or personal purposes. Non-ordinary purpose includes: a) running a telemarketing business or call centre; b) re-supplying or reselling the Service; c) wholesale of any Service (e.g. transit, refile or aggregate domestic or international traffic) on our network; d) abnormal or excessive use of back to base services; e) SIM boxing or using the Service (including any of our SIM card(s)) in connection with a device or method that switches, routes or reroutes traffic (e.g. calls, SMS, data, etc.) to or from the our network or the network of any supplier; f) usage that affects other Customers access to the network or enjoyment of the Services; g) setting up switch devices which overcome subscription and/or pricing charges, potentially limiting the ability for other Customers to access the Service; or h) any other activity which would not be reasonably regarded as typical or ordinary use. 5. REGULATORY AUTHORITIES At law, we are required to assist law enforcement agencies. We may be required to comply with law enforcement or other lawful requests at any time without notice to Customers but in doing so will act in accordance with our legal obligations, including under the Telecommunications (Interception and Access) Act 1979 (Cth). For more information on how we handle Customer information, please refer to our Privacy Policy, http://www.iprimus.com.au/legal/ privacy-policy/. 6. LAWFUL USE Customers must ensure that any use of our Services is lawful and it is their responsibility for determining the content and information they choose to access when using a Service, even if they were used without the Customer s consent, by another person who gains access to them. Customers are responsible for any content stored, sent, accessed or distributed on or via our Network and systems including content posted on web pages, email, social media, chat or discussion forums, bulletin boards, instant messaging and SMS. Customers must not use Services to send or distribute content which is prohibited or otherwise unlawful under any applicable Australian law or in breach of an applicable Agreement. If Customers provide content using the Services it is the Customer s responsibility to comply with the Broadcasting Services Act 1992 (Cth), any applicable Industry Codes and any other applicable law. We are required by law to refer a Customer to the Australian Federal Police if we have reason to believe a Service has been used to access child pornography. 4.

7. MONITORING COMPLIANCE We may from time to time monitor transmissions of published content for the purposes of ensuring compliance with this Policy. 8. WHAT HAPPENS IF I BREACH THIS POLICY? If we believe on reasonable grounds that a Customer has breached this Policy, we may contact you and ask you to modify your use of the Service. We also specifically reserve the right to take one or more of the following steps: a) suspend access to the Service indefinitely or for a specific period; b) terminate access to the Service and refuse to provide the Service to the Customer or their associates in the future; c) inform appropriate government and regulatory authorities of suspected illegal or infringing conduct; d) delete or edit any of the Customer s data (including webpage content) stored on systems; e) override any attempt by the Customer to breach this Policy, such as specify a particular traffic routing pattern; and f) take any other action we deem appropriate, including taking action against offenders to recover the costs and expenses of identifying them. We may also take any of the above steps if directed to do so by a regulatory or other law enforcement body. Please note, our right to suspend access to Services without notice under this Policy overrides any requirement we may have to give notice under the Agreement. 9. CHANGES We may vary this Policy from time to time but will do so in line with the relevant notice provisions in your Agreement. Continued use of Services after receiving notice once the variation takes effect will constitute acceptance of the variation. 10. REPORT A BREACH You can report a suspected breach of this Policy by sending an email to compliance@m2.com.au. 5.

iprimus ABN 69 071 191 396 P.O. Box 631 Collins St West Melbourne VIC 8007 131 789 iprimus.com.au IPR_0600_Terms_Booklet_Acceptable_Use_Policy_Jan16