Acceptable Use Policy

1.0 Introduction

1.1 This Acceptable Use Policy must be read in conjunction with our General Terms & Conditions of Service. Together they form part of our Standard Form of Agreement for purposes of section 479 of the Telecommunications Act 1997.

1.2 Some words or expressions are highlighted in bold because they have a special meaning defined in the General Terms & Conditions of Service. “We”, “us”, “our”, “you”, “your” and “yourself” also have special meanings defined in that document.

1.3 We may change this Acceptable Use Policy from time to time by giving notice to you.

2.0 Why we have this policy

2.1 Our customers expect us to provide an efficient, reliable network. In order for us to achieve this, we must protect the network against abuse.

3.0 What you should know

3.1 We do not proactively monitor information that passes through our network, or is stored on it. However, we will promptly investigate complaints about offensive, malicious or illegal material and take appropriate action if necessary. You should take all necessary steps to protect yourself against offensive or malicious material.

4.0 What you must do

4.1 You must ensure that anyone else that you permit to use the service complies with the agreement between us including the General Terms and Conditions of Service and this Acceptable Use Policy.

4.2 If you operate an email server, you must ensure that it is configured to reject open relay requests.

4.3 You must protect the confidentiality of your password, and all steps necessary to prevent unauthorised access to the service.

4.4 You must properly supervise anyone who you allow to use the service. You must closely monitor the activities of any children to whom you grant access.

4.5 If you are a Content Provider for the purposes of the Internet Industry Association's Codes for Industry Co-Regulation in Areas of Internet and Mobile Content ("the Codes") you must comply with the relevant sections of the Codes. In particular you must use appropriate warnings or labelling systems in respect of Content which is likely to be considered unsuitable for children according to the Classification Act and relevant Classification Guidelines, even though such Content may not be Prohibited Content or Potential Prohibited Content. For the purpose of this clause, the terms "Content", "Content Provider", "Classification Act", "Classification Guidelines", "Prohibited Content" and "Potential Prohibited Content" have the same meanings as defined in the Codes. The Codes are available at www.iia.net.au.

5.0 What you must not do

5.1 Unless the product description indicates otherwise, you must not run an email server on a consumer grade service.

5.2 You must not probe, scan or test the vulnerability of another computer system or network unless you have permission from the owner of that system or network.

5.3 You must not attempt to gain unauthorised access to another computer system or network.

5.4 You must not do anything which causes damage or disruption to another computer system or network. This includes the transmission of viruses or other malicious code.

5.5 You must not send, receive or store illegal material.

5.6 You must not use our network to engage in any illegal activity.

5.7 You must not breach someone else’s copyright or other intellectual property rights.

5.8 You must not use false or forged addresses, including email addresses.

5.9 You must not use false email headers or alter email headers to conceal your identity.

5.10 You must not use an email address that you are not authorised to use.

5.11 You must not send unsolicited e-mail (or "spam").

5.12 You must not operate a website which is advertised by unsolicited email, even if that email originates from another network.

5.13 You must not use our network to harass someone else or to maliciously offend or upset them.

6.0 What you should do

6.1 You should install anti-virus software on all of your systems, and update the anti-virus definitions regularly. We do not accept any liability for damage to your systems resulting from viruses or other malicious code.

6.2 You should change your password regularly to protect your privacy and to prevent unauthorised use of the service.

7.0 What we may do

7.1 We may investigate suspected abuse of this Acceptable Use Policy.

7.2 We may terminate, restrict or suspend the service if we reasonably believe that you may have breached the agreement between us, including this Acceptable Use Policy or our General Terms and Conditions of Service.

7.3 We may temporarily or permanently remove suspected illegal or offensive material from our network without notice.

8.0 Fair use guidelines

8.1 We have an obligation to all of our customers to provide fast and reliable network access. If you enter the top 1% of volume users on our network, we may request that you change to another plan. Alternatively we may decline to renew your account at the end of the current billing period.