SC SYSTEMS is committed to complying with legislation and ensuring all its Customers have the ability to use its network and the Internet without interference or harassment from other users. SC SYSTEMS’s Acceptable Use Policy (“AUP”) is designed to help achieve these goals.
By using any of SC SYSTEMS’s services, Customers agree to comply with this AUP and to remain responsible for its users, where applicable. SC SYSTEMS reserves the right to change or modify the terms of the AUP at any time, by posting an updated version on its Website at http://www.scsystems.co.za/. Customer’s use of SC SYSTEMS’s services after changes to the AUP are posted shall constitute acceptance of any changed or additional terms.
Scope of the AUP
The AUP applies to all SC SYSTEMS products and services but is in particular applicable to IP Services.
General Prohibitions: SC SYSTEMS prohibits use of the IP Services in any way that is: i) unlawful, incitement to commit criminal acts, harmful to or interferes with use of SC SYSTEMS’s network or systems, or the network of any other provider; ii) interferes with the use or enjoyment of services received by others; iii) infringes Intellectual Property Rights; iv) results in the publication of threatening or offensive material which is harmful, obscene, discriminatory, defamatory, constitutes hate speech; or v) constitutes abuse, a security risk or a violation of privacy.
Failure to adhere to the rules, guidelines or agreements applicable to search engines, subscription Web services, chat areas, bulletin boards, Web pages, applications, or other services that are accessed via a link from an SC SYSTEMS-branded website or from a website that contains SC SYSTEMS-branded content is a violation of this AUP.
Unlawful Activities: IP Services shall not be used in connection with any criminal, civil or administrative violation of any applicable local, provincial, national or international law, treaty, court orders, ordinance, regulation or administrative rules.
Violation of Intellectual Property Rights: IP Service(s) shall not be used to publish, submit/receive upload/download, post, use, copy or otherwise reproduce, transmit, re-transmit, distribute or store any content/material or to engage in any activity that infringes, misappropriates or otherwise violates the Intellectual Property Rights or privacy or publicity rights of SC SYSTEMS or any individual, group or entity, including but not limited to any rights protected by any copyright, patent, trademark laws, trade secret, trade dress, right of privacy, right of publicity, moral rights or other Intellectual Property Right now known or later recognized by statute, judicial decision or regulation.
Threatening Material or Content: IP Services shall not be used to host, post, transmit, or re-transmit any content or material (or to create a domain name or operate from a domain name), that harasses, or threatens the health or safety of others. In addition, for those IP Services that utilize SC SYSTEMS provided web or content hosting, SC SYSTEMS reserves the right to decline to provide such services if the content is determined by SC SYSTEMS to be obscene, indecent, hateful, malicious, racist, defamatory, fraudulent, libelous, treasonous, excessively violent or promoting the use of violence or otherwise harmful to others.
Inappropriate Interaction with Minors: IP Services should not be used for the purpose of committing an offence against a child or in way that would constitute or promote unlawful interaction with children.
Child Pornography: IP Services shall not be used to publish, submit/receive, upload/download, post, use, copy or otherwise produce, transmit, distribute or store child pornography. Suspected violations of this prohibition may be reported to SC SYSTEMS at the following e-mail address: [email protected] SC SYSTEMS will report any discovered violation of this prohibition to the South African Police Services and take steps to remove child pornography (or otherwise block access to the content determined to contain child pornography) from its servers.
Spam/E-mail abuse is prohibited using IP Services. Spam/E-mail abuse shall include, but are not limited to, the following activities:
- sending multiple unsolicited electronic mail messages or “mail-bombing” to one or more recipient;
- sending unsolicited commercial e-mail, or unsolicited electronic messages directed primarily at the advertising or promotion of products or services;
- sending unsolicited electronic messages with petitions for signatures or requests for charitable donations, or sending any chain mail related materials;
- sending bulk electronic messages without identifying, within the message, a reasonable means of opting out from receiving additional messages from the sender;
- sending electronic messages, files or other transmissions that exceed contracted for capacity or that create the potential for disruption of the SC SYSTEMS network or of the networks with which SC SYSTEMS interconnects, by virtue of quantity, size or otherwise;
- using another site’s mail server to relay mail without the express permission of that site;
- using another computer, without authorization, to send multiple e-mail messages or to retransmit e-mail messages for the purpose of misleading recipients as to the origin or to conduct any of the activities prohibited by this AUP;
- using IP addresses that the Customer does not have a right to use;
- collecting the responses from unsolicited electronic messages;
- maintaining a site that is advertised via unsolicited electronic messages, regardless of the origin of the unsolicited electronic messages;
- sending messages that are harassing or malicious, or otherwise could reasonably be predicted to interfere with another party’s quiet enjoyment of the IP Services or the Internet (e.g. through language, frequency, size or otherwise);
- using distribution lists containing addresses that include those who have opted out;
- sending electronic messages that do not accurately identify the sender, the sender’s return address, the e-mail address of origin, or other information contained in the subject line or header;
- falsifying packet header, sender, or user information whether in whole or in part to mask the identity of the sender, originator or point of origin;
- using redirect links in unsolicited commercial e-mail to advertise a website or service;
- posting a message to more than ten (10) online forums or newsgroups, that could reasonably be expected to generate complaints;
- intercepting, redirecting or otherwise interfering or attempting to interfere with e-mail intended for third parties;
- knowingly deleting any author attributions, legal notices or proprietary designations or labels in a file that the user mails or sends;
- using, distributing, advertising, transmitting, or otherwise making available any software program, product, or service that is designed to violate this AUP or the acceptable use policy of any other Internet Service Provider, including, but not limited to, the facilitation of the means to spam.
Fair Use Policy (FUP)
- We reserve the right to establish policies, rules and limitations, from time to time, concerning the use of any service. You must comply with any bandwidth, data storage and other limitations we may impose, in our reasonable discretion. Failure to comply with these rules may result in your service being restricted, suspended or terminated, in our reasonable discretion.
- We reserve the right to manage our network and any IP Services and/or network services, for security purposes, and in order to optimize its efficiency for the benefit of all our Subscribers, including, without limitation, by way of the following: rate limiting (speed), rejection or removal of spam or otherwise unsolicited bulk e-mail, anti-virus mechanisms, protocol filtering and imposing restrictions on your use. We may take any other action we deem appropriate in order to help ensure the security of our network and IP Services and to help ensure the integrity of the network experience for all Subscribers, including limiting your data traffic by controlling your network and/or bandwidth usage.
- We will manage bandwidth usage to the best of our ability during peak periods, however, it remains a best effort service.
- We reserve the right to limit the number of emails that you may send in any given period or to limit the total message volume (amount of data) sent per hour.
- You may not restrict, inhibit or interfere with the ability of any person to access, use or enjoy the Internet or any services, or create an unusually large burden on our network, including, without limitation, continuously uploading or downloading streaming video or audio; continuous FTP uploading or downloading, or otherwise generating levels of traffic sufficient to impede others’ ability to send or retrieve information, or to use the services in an abusive manner in connection with any unlimited or uncapped packages, options or promotions.
- You may not use the service for unattended automated operation, unless otherwise agreed. You may stay connected as long as you are actively using that connection. You further agree not to use Internet applications for the purpose of simulating network activity to avoid session inactivity disconnection.
- Unless you subscribe to a business packages and you are permitted in terms of such business package, you may not use any services for anything other than your own personal use and you may not resell any services, receive any charge or benefit for the use of any services or provide Internet access or any other feature of the services to any third party or in any other way exploit the service for any commercial purposes. For example, you cannot provide Internet access to others through a dial up, ADSL or other connection, host shell accounts over the Internet, provide e-mail or news services, or send a news feed. You may not run a server (including game servers) in connection with the services. You may not provide network services to others via the services. In addition, you are prohibited from running servers for mail, http, ftp, irc and multi-user interactive forums. You may not share your services.
Customers are responsible for ensuring and maintaining security of their systems and the machines that connect to and use IP Service(s), including implementation of necessary patches and operating system updates.
IP Services may not be used to interfere with, gain unauthorized access to, or otherwise violate the security of SC SYSTEMS’s (or another party’s) server, network, network access, personal computer or control devices, software or data, or other system, or to attempt to do any of the foregoing. System or network security violations shall include, but are not limited to:
- unauthorized monitoring, scanning or probing of network or system or any other action aimed at the unauthorized interception of data or harvesting of e-mail addresses;
- hacking, attacking, gaining access to, breaching, circumventing or testing the vulnerability of the user authentication or security of any host, network, server, personal computer, network access and control devices, software or data without express authorization of the owner of the system or network;
- impersonating others or secretly or deceptively obtaining personal information of third parties (phishing, etc.);
- using any program, file, script, command or transmission of any message or content of any kind, designed to interfere with a terminal session, the access to or use of the Internet or any other means of communication;
- distributing or using tools designed to compromise security (including but not limited to SNMP tools), including cracking tools, password guessing programs, packet sniffers or network probing tools (except in the case of authorized legitimate network security operations);
- knowingly uploading or distributing files that contain viruses, spyware, Trojan horses, worms, time bombs, cancel bots, corrupted files, root kits or any other similar software or programs that may damage the operation of another’s computer, network system or other property, or be used to engage in modem or system hi-jacking;
- engaging in the transmission of pirated software;
- with respect to dial-up accounts, using any software or device designed to defeat system time-out limits or to allow Customer’s account to stay logged on while Customer is not actively using the IP Services or using such account for the purpose of operating a server of any type;
- using manual or automated means to avoid any use limitations placed on the IP Services;
- providing guidance, information or assistance with respect to causing damage or security breach to SC SYSTEMS’s network or systems, or to the network of any other IP Service provider;
- failure to take reasonable security precautions to help prevent violation(s) of this AUP.
Customers remain solely and fully responsible for the content of any material posted, hosted, downloaded/uploaded, created, accessed or transmitted using the IP Services. SC SYSTEMS has no responsibility for any material created on SC SYSTEMS’s network or accessible using IP Services, including content provided on third-party websites linked to the SC SYSTEMS network. Such third-party website links are provided as Internet navigation tools for informational purposes only, and do not constitute in any way an endorsement by SC SYSTEMS of the content(s) of such sites.
Customers are responsible for taking prompt corrective action(s) to remedy a violation of the AUP and to help prevent similar future violations.
AUP Enforcement and Notice
The Customer’s failure to observe the guidelines set forth in this AUP, including without limitation the FUP, will be regarded as a material breach and may result in SC SYSTEMS taking actions, which may either be a warning, a suspension or termination of the Customer’s services. When reasonably possible, SC SYSTEMS may provide the Customer with a notice of an AUP and/or FUP violation allowing the Customer to promptly correct such violation.
If the IP Services are used in a way that we, in our reasonable discretion, believe violates this AUP, including our FUP or any of our rules or limitations, we may take any responsive actions we deem appropriate. Such actions may include without limitation, temporary or permanent removal of content, cancellation of newsgroup posts, filtering of Internet transmissions, and/or the immediate limitation, restriction, suspension or termination of all or any portion of the services or your account.
Should you engage in any one or more of the above activities, which shall be determined in SC SYSTEMS’s reasonable discretion and which decision shall be final, then SC SYSTEMS shall be entitled, without prejudice to any other rights it may have, to take any responsive action we deem appropriate, such actions may include, without limitation:
- without notice, temporary or permanent limitation, restriction or suspension of your access to the IP Service concerned;
- terminate all agreements with you with immediate effect;
- bill you for any costs incurred by SC SYSTEMS as a result of the offending activity, including (without being limited to) bandwidth used, administration costs, downtime, usage of SC SYSTEMS’s name or registered domain names and CPU cycles; and
- disclose information relating to the offending activity as may be required under the circumstances.
SC SYSTEMS has no obligation to monitor content of any materials distributed or accessed using the IP Services. However, SC SYSTEMS may monitor content of any such materials as necessary to comply with applicable laws, regulations or other governmental or judicial requests; or to protect SC SYSTEMS’s network and its Customers.
Any complaints (other than claims of copyright or trademark infringement) regarding violation of this AUP by an SC SYSTEMS Customer (or its user) should be directed to [email protected], include details that would assist SC SYSTEMS in investigating and resolving such complaint.