Fair Usage Policy

Shared internet service:

1. Introduction

For the shared internet to operate in a manner that satisfies the majority of its users, all clients need to observe some rules and etiquette governing their use of it. These requirements are usually contained or referred to in the relevant terms and conditions governing the particular internet service as well as general law. technologywithin’s customers must ensure that they know what these requirements are and how they are affected by them.

To enable its customers to have a better understanding of what is and is not acceptable when using the shared internet, and to help you get the best out of the internet, technologywithin has developed a number of Acceptable Usage Policies (AUPs) relating to shared internet services. Complying with these AUPs, which is a contractual requirement, should help you benefit from safer surfing and minimize the risk of suffering “online abuse”. technologywithin’s AUPs are based on current “best internet industry practice” and draw on the collective experience of users and service providers across the internet community.

We may change the AUPs from time to time. To make the most of the guidance contained in the AUPs, please keep up to date with changes and look at them on a regular basis. We hope you will find them useful and informative.

2. Legal Compliance

The internet is a global medium and is regulated by the laws of many different countries. Material which is illegal in this country may be legal in another, and vice versa. When you visit a website, a copy of the visited pages is stored on your pc in the web browsers’ cache files. Storage of illegal material in this way may well constitute a criminal offence. If you are in any doubt, we recommend you to take independent legal advice.

While connected to the internet, you must comply with legal requirements concerning telephone network (mis)use. Set out below is a self explanatory extract from the Telecommunications Act:

“Improper use of Public Telecommunication System” A person who -

  • Sends by means of a public communication system, a message or other matter that is grossly offensive or of an indecent, obscene or menacing character, or
  • Sends by those means, for the purpose of causing annoyance, inconvenience or needless anxiety to another, a message that he knows to be false or persistently makes use for that purpose of a public telecommunication system, shall be guilty of an offence and liable on summary conviction to imprisonment for a term not exceeding six months or a fine….. or both”.

 

3. Internet Access – Acceptable Use Policy (AUP)

Introduction

The shared internet is a communal service for normal business usage. As the name suggests it is a shared or contended service, so the bandwidth available is subject to others usage. As such, no one client should over utilize and HOG the bandwidth. technologywithin’s relationships with its customers, other networks, and ultimately its connectivity to the rest of the internet, require its customers to behave responsibly. Accordingly, technologywithin cannot permit irresponsible behaviour by its customers, which could damage these relationships, technologywithin’s network or the use of the internet by others.

Compliance with this Acceptable Use Policy is a contractual requirement. If you fail to do so, your service may be suspended or terminated.

Monthly Shared Internet usage allowance

Customers utilising the shared internet services are subject to a usage allowance which starts from the first of the month and runs to the end of the month.

Monthly usage allowances vary depending on which package you’re on, details of the available packages can be obtained from your Centre Manager.

Over Usage

If you exceed your usage allowance, you’ll be charged for additional usage in units of one gigabyte (GB), which will appear in your next bill.

Over usage charges vary depending on which package you’re on, details of the available packages can be obtained from your Centre Manager.

How can I keep an eye on my usage?

With the assistance of Mojo (http://mojomenow.com) you can monitor your current internet usage, historical usage and predicted usage for the current month.

Heavy Usage

Persistent heavy users of the service, or those seen to be hogging the bandwidth, which in technologywithin’s reasonable opinion could be seen to be over-using their contended service, may at technologywithin’s discretion find their available bandwidth restricted.

Usage is measured periodically at technologywithin’s discretion.

Illegal Activities

You must not, by using the service, possess or transmit illegal material. You should be aware that as the internet is a global network, some activities/material which may be legal in the UK, may be illegal elsewhere in the world and vice versa. When you visit a website, a copy of the visited pages is stored on your pc in the web browsers’ cache files. Storage of illegal material in this way may well be a criminal offence, as well as contravening this AUP. If you are in any doubt as to the legality of anything, don’t do it and take independent legal advice before proceeding.

You must not gain or attempt to gain unauthorised access to any computer systems for any purpose, including accessing the internet. As well as being in breach of your contract for the particular service, such hacking or attempted hacking is a criminal offence.

Forging Addresses

You must not send data via the internet which has forged addresses or which is deliberately constructed to adversely affect remote machines. You must not configure your pc as an open relay system.

Voip

Voice services such as SIP or Skype are not permitted over the technologywithin network.

3G/Mobile phone signal boosters

3G/Mobile phone signal boosters such as Vodafone Sure Signal or EE Signal range are not compatible with the technologywithin network and so not permitted.

Peer2Peer File Sharing

You must not run peer 2 peer file sharing software.

Spam or Unsolicited Email

You must not participate in the sending of unsolicited bulk email or any other form of email or Usenet “abuse”. This applies to material which originates on your system as well as third party material which passes through your system.

Streaming Media

Due to the large bandwidth requirement of streaming media; such as video, internet radio or internet video broadcasts. Streaming Media is not permitted on the shared services.

FTP/File transfers

Due to potential bandwidth hogging, FTP or other file transferring services are not permitted on the shared services.

Online Backup service

Due to potential bandwidth hogging, online backup services are not permitted on the shared services.

Port Scanning

You must not run “port scanning” software which accesses remote machines or networks, except with the explicit prior permission of the administrator or owner of such remote machines or networks. This includes using applications capable of scanning the ports of other internet users.

If you intend to run a port scanning application, you must provide technologywithin with a copy of the written consent received from the target of the scan authorizing the activity. This must be supplied to technologywithin prior to the application being run.

Internet Connection Sharing

If you share the resources of your internet connection over a Private Network on your premises, you must make sure that your network is secure, and that any internet Connection Sharing software that you are using does not permit access from outside of your network. This is especially important if running an “Open Proxy Server”. This is because an “Open Proxy Server” will allow other users of the internet to exploit your internet connection, and use it as if it were their own. For example, an external user could access your local network or send unsolicited e-mail(s) that would appear to come from you.

What Action will technologywithin Take?

Compliance with this Acceptable Use Policy is a contractual requirement. If you fail to do so, your service may be suspended or terminated.

technologywithin may operate systems to ensure compliance with this AUP, including without limitation port scanning and testing of open servers and mail relays.

Customers who engage in abusive behaviour may have their accounts suspended or terminated.

Account Restoration

A suspended account may be restored at technologywithin’s discretion, upon receipt of a written undertaking by the abuser not to commit any future “abuse”. All cases are, however, considered by technologywithin on their individual merits.

Avoiding Abuse While Connected To the Internet

It is the client’s responsibility to ensure their equipment is properly protected from threat; taking the following steps should help you to protect yourself from becoming a victim of abuse while connected to the internet:

Ensure that you are running a good quality virus detection application. The majority of these applications have the ability to detect hackers as well as viruses. Hackers are people who try to hack into your computer to either cause mischief or find your passwords and usernames. You should be aware that some hackers have the ability to seriously damage your computer system!

If you keep sensitive information on your computer, it is worth using encryption software to protect it.
While connected, do not publicise your IP address. This is the unique ID that your ISP allocates you while you are connected to the internet. This is especially important if you are using applications such as CHAT, IRC (internet relay chat) or video conferencing using a directory service.

A majority of people spend their online time finding internet software applications to run while online. Be careful what you install. Before installing software of unknown origin, ask yourself whether you trust the writer/source. Most computer viruses and Trojans are installed unknowingly while installing shareware or freeware applications that are supposedly designed to make your life easier. If in doubt, don’t do it!

4. Email – Acceptable Use Policy (AUP)

Introduction

This email AUP is based on current “best internet industry practice” and draws on the collective experience of email users and service providers across the internet community.

Abusive emails

You must not send any emails which cause annoyance, inconvenience or needless anxiety. You should not send false messages likely to cause distress, or any other material which is distressing, grossly offensive, indecent, obscene, menacing or in any other way unlawful. Particular care should be taken to avoid any material which is offensive to people on grounds of gender, race, colour, religion or other similar categorisation.

Spam (Unsolicited Bulk emails)

You must not use technologywithin’s network to send unsolicited emails, bulk or otherwise. The sending of such emails is an abuse of the service and you will be in breach of the relevant terms and conditions.

Setting up Your Mail Server (Open Relay)

If you choose to run an SMTP email server you must ensure that it is configured correctly, so as to only accept mail from your private domain. technologywithin will block access (TCP port 25), to your SMTP email server from outside of your domain to prevent it from being exploited for the purpose of sending unsolicited emails.

Internet Connection Sharing

If you share the resources of your internet connection over a Private Network on your premises (I.E wireless), you must make sure that your network is secure, and that any Internet Connection Sharing software that you are using does not permit access from outside of your network. This is especially important if running an “Open Proxy Server”. This is because an “Open Proxy Server” will allow other users of the internet to exploit your internet connection, and use it as if it were their own.

What Action Will technologywithin Take?

Compliance with this Acceptable Use Policy is a contractual requirement. If you fail to do so, your service may be suspended or terminated.

technologywithin may operate systems to ensure compliance with this AUP, including without limitation port scanning and testing of open servers and mail relays.

Customers who engage in abusive behaviour will be notified that their behaviour is unacceptable and may have their accounts suspended or terminated if such behaviour continues.

If we find out that you are using our service for illegal purposes, we may notify the police. If we receive a Court Order requesting us to reveal your identity to someone complaining that you have used this service in an abusive manner we will do so.

Account Restoration

A suspended account may be restored at technologywithin’s discretion, upon receipt of a written undertaking by the abuser not to commit any future “abuse”. All cases are, however, considered by technologywithin on their individual merits.

A Guide to Avoiding Email Abuse

Email is without doubt an extremely effective and convenient method of communication. It is fast and cheap. Unfortunately, it is also the most common source of abuse over the internet. Although much unsolicited email (SPAM) may just be a harmless but annoying way of advertising of products or services, some can be as distressing as receiving malicious telephone calls.

There are some simple steps you can take to minimise the likelihood of receiving nuisance emails:
Don’t give out your email address unless you are absolutely sure you can trust the recipient. You should treat your email address as you would treat your telephone number.

When posting into newsgroups configure your newsreader so that it doesn’t show or it disguises your email address, i.e. joe.bloggs32@nospam.isp.com. In the posting you would say “to reply to Joe, remove the nospam”. A person responding to the email then has to remove the nospam section of the email address. This makes it more difficult for automated newsgroup trawlers to strip email addresses from the postings. The majority of the mail lists that are used for the bulk sending of emails are compiled from undisguised email addresses in newsgroups.

Avoid posting into newsgroups if you are not entirely sure about the nature of their subject matter. If you are going to post into these groups, be aware that there is very little your ISP can do to protect you if you become a victim of abusive emails resulting from your posting or a “flame war”. If you do post into such newsgroups, it is a sensible precaution to keep your email address private, as often the only cure to stop nuisance emails is to change your email address.

WEBSPACE – Acceptable Use Policy (AUP)

Introduction

The following AUP contains rules governing the use by customers hosting a website via the technologywithin network. It is based on current “best internet industry practice” and draws on the collective experience of webspace users, service providers and the owners and administrators of computer networks which are connected to form the World Wide Web.

technologywithin cannot and does not proactively monitor content on its customers websites and therefore cannot and does not guarantee that all such websites are free of illegal material or other content considered unacceptable (abusive) by the internet community.

Illegal Activities

You must not have illegal material on your website or link to content that is illegal. You should be aware that as the internet is a global network, some activities/material which may be legal in the UK may be illegal elsewhere in the world and vice versa, and you could risk being prosecuted in another country if you publish what is illegal in that country. If you are in doubt, don’t do it and take independent legal advice before proceeding.

You must not incite disorder or publish any material which would amount to instructions concerning illegal activities.

You must not publish content, or link to content in which you do not own the rights, without the permission of the owner of the relevant rights.

Unacceptable Behaviour

Avoid content that may offend. If you have any doubt about the suitability of your content to others, in particular to children, you must give a warning page before reaching the content. If in doubt, don’t do it and take independent legal advice before proceeding. In particular, you must not use expressions that are offensive to others on grounds of gender, race colour, religion or other similar categories. technologywithin will not make any logs or details of who visited your site available.

  • You must ensure that your index.htm or default.htm file (the first to be viewed on a site) does not contain any material liable to offend. A clearly readable warning page must be displayed before any adult material is displayed.
  • You must not use your webspace to cause annoyance, inconvenience, offence or needless anxiety.
  • You must not publicise the personal details of others without their consent.
  • You must not use your website to advertise, distribute (or link to another webpage containing) virus creation software, e-mail spamming software, or port scanning software.

Your site may not be used to distribute or advertise any of the following:

  • Software for sending SPAM (excessive news postings, bulk emails etc.).
  • Software for port scanning, virus creation, hacking or any other illegal or antisocial activity.
  • Lists of email addresses except where all the addressees have given their explicit permission.
  • Any collection of personal data other than in accordance with all applicable data protection legislation.
  • Links to websites hosting illegal content, including adult material
  • Content designed to offend or cause needless anxiety to others.
  • You must not advertise your websites, or cause another person to advertise it, by techniques that would be classified as abuse, e.g. bulk emailing and excessive news posting.

What Action will technologywithin take?

Compliance with this Acceptable Use Policy is a contractual requirement. If you fail to do so, your service may be suspended, terminated or reported to the police.