Acceptable Use Policy
- This acceptable use policy (“AUP”) outlines the principles that govern use of the systems, services and equipment provided by Gigabit Networks Ltd (“Gigabit” or “we”) in connection with your Gigabit services (broadband, telephone and mobile).
- You must read this AUP very carefully. It is important. It forms part of your agreement with us.
- “User(s)” or “you” means customers or anyone else who uses or accesses Gigabit’s services.
- We may amend, modify or substitute this AUP at any time. Your continued use of any Gigabit services after any such amendment, modification or substitution constitutes your acceptance of any new AUP. We recommend that you visit our website regularly to check for any updates or amendments to this AUP.
Gigabit’s enforcement actions – our rights to investigate, suspend, restrict or terminate your services
- We reserve the right to investigate any suspected violation(s) of this AUP. When we become aware of possible violations, we may initiate an investigation, which may include gathering information from the User involved and the complaining party, if any, and examination of material on our servers, networks or any other equipment associated with the services.
- We will take action if you abuse our services. The actions we may take, in our sole discretion, at any time include but are not restricted to:
- a quick chat on the phone or an informal email asking for your cooperation;
- a formal warning to you;
- suspension of your account or service (with or without notice);
- restriction of your access to all or any part of our services (with or without notice); or
- termination of your account (with or without notice). This is not a full list of the action we may take.
- Notwithstanding our right to restrict, suspend or terminate your services, if you breach this AUP and/or our terms and conditions we may issue a formal warning to you specifying the unacceptable conduct and notifying you that repeated breaches may result in all or part of our services being temporarily or permanently withdrawn from you.
- If, after we have issued a formal warning in accordance with paragraph 2.3 above, your conduct continues to breach this AUP, then we may withdraw all or any part of the services from you until such time as we are satisfied that you have implemented appropriate steps to ensure that your use of our systems, services or equipment will comply with this AUP. Read the guidance in paragraph 3.4 below about reviewing your mailbox regularly or providing an alternative preferred email address to ensure you are aware of any warnings we send you.
- If such a suspension is imposed, then this may be lifted at our discretion upon receipt of a formal written undertaking from you not to commit any future relevant abuse. Until the formal written undertaking is received by us using the contact details we specify to you your account will remain suspended. Gigabit is in no way responsible for any loss during transmission (post, email, fax).
- Prior to terminating services as a general rule, we will attempt to work with Users (but are not obliged to do so) to avoid future violations of the AUP and to ensure that there is no reoccurrence of the incident(s) in question.
Use of the services
- You must not use our services in any way that is unlawful or illegal or in any way to the detriment of other Internet users. You also must not allow anybody using your connection or device(s) to use our services in any way that is unlawful or illegal or in any way to the detriment of other Internet users.
- In addition to and without prejudice to your obligations pursuant to our terms and conditions, you agree to comply with (and ensure that others using the services comply with) all applicable laws, statutes and regulations in connection with the services. As the User of record, you are liable for all use of all accounts in your name, irrespective of use without your knowledge and/or consent.
- You are required to keep your contact details provided to Gigabit up to date. Keeping such records up to date is important as we may need to send notices or other information to you using the contact information you gave us.
- Users are expected and required to review email messages in their preferred email address registered with Gigabit on a regular basis. This is to enable us to advise you of any significant issues that may affect your use of the services. We recommend that you check your preferred email address at least every 3 days. We normally notify customers of AUP-related issues prior to suspension/disconnection of services and it is important that you read these emails.
- It is the User’s responsibility to that their preferred email address that can be accessed on a regular basis.
- In the event that your use of our services is under investigation by relevant authorities, we reserve the right to suspend the services for the duration of the investigation.
Your responsibilities – security
- You are responsible for the security of the information you send and the other services you use through your Gigabit services. We are not responsible for the consequences of your failure to employ adequate security measures (e.g. lost or corrupted files, identity theft, fraud).
- Wireless routers should be secured by applying the encryption methods specified by us on our website, visit our help pages and search for ‘protecting your wifi network’ for more information. Unsecured Wi-Fi connections could lead to you being held legally responsible for misuse on your account by a third party.
- Device security: Users are responsible for the security of their own devices that are directly or indirectly connected to our systems or services via your home connection and/or your mobile connection. This includes, but is not limited to: PCs, iPods/iPads (or equivalent), laptops, your mobile handset(s), wired and wireless home networking devices and games consoles.
- If we identify that devices on the end of your connection are causing significant impact to our service or are part of a “botnet” (machines hijacked by others to distribute malicious software or other forms of abuse), we reserve the right to suspend or disconnect your services without notice.
- Users must ensure that their devices are protected with up-to-date anti-virus software and a properly configured firewall as a minimum where applicable. For advice on anti-virus software and firewalls please visit our help pages and search for ‘security’.
- You must keep your password(s) confidential and secure. If you think that your password(s) has become known to any unauthorised person or may be used in an unauthorised way you should take steps to change your password immediately. If you believe that any of your devices have been used to breach the terms of this Acceptable Use Policy you must inform us immediately.
Your responsibilities – Gigabit’s systems, services and equipment
- Users must not take any action that may restrict or inhibit any person, partnership, company, firm or organisation (whether a customer of Gigabit or otherwise) in his/her/its lawful use or enjoyment of any of our systems, services or products.
- Specific prohibited acts in relation to Gigabit’s systems, services and equipment are:
- the sale or resale of our services and products;
- any form of advertising or marketing practices – deceptive, misleading or otherwise;
- furnishing false data on our sign-up forms, contracts or online applications, including fraudulent use of credit card numbers (and such conduct is grounds for immediate termination and may subject the offender to civil or criminal liability);
- trade or business use of our services, except for remote access to your employer’s corporate network (and remember in any case that we are not liable for any loss occurring as a result of such use), unless you subscribe to a product that is specifically stated as a business product. If you are a residential customer and you wish to use our services for trade or business use, go to our website for more information;
- attempting to circumvent user authentication or security of any host, network, or account (also known as “cracking” or “hacking”). This includes, but is not limited to, accessing data not intended for the User, logging into a server or account the User is not expressly authorised to access, or probing the security of other networks without the express authorisation of the owner of such third party network(s);
- effecting security breaches or disruptions of communications. Security breaches include, but are not limited to, accessing data of which the customer is not an intended recipient or logging onto a server or account that the customer is not expressly authorised to access. For the purposes of this section “disruption” includes, but is not limited to, port scans, ping floods, packet spoofing, forged routing information, deliberate attempts to overload a service, any otherwise unspecified form of Denial of Service (DoS) attack, or attempts to “crash” a host;
- using any program/script/command, or sending messages of any kind, designed to interfere with or adversely affect a User’s enjoyment of our network by any means, locally or by the Internet, including violating the privacy of other Users; and
- conducting, for malicious purposes, any form of network monitoring or interception of any data that does not belong to you.
- Specific prohibited acts in relation to Gigabit’s systems, services and equipment are:
Your responsibilities – content/material
- You are prohibited from storing, distributing, transmitting or causing to be published any “prohibited material” through your use of the services, including for example your use of the services to send emails, post on online forums or blogs and use social media. What constitutes “prohibited material” shall be determined by us (acting in our sole discretion). Prohibited material includes (without limitation):
- material that is threatening, harassing, invasive of privacy, discriminatory, defamatory, racist, obscene, indecent, offensive, abusive, harmful or malicious;
- material that infringes or breaches any third party’s intellectual property rights (which shall include, but not be limited to copyright, trade marks, design rights, trade secrets, patents, moral rights, paternity rights and performance rights) – this includes the use, distribution and/or copying of any material without the express consent of the owner;
- material that is in violation of any law or regulation that is enforceable in the United Kingdom;
- unsolicited promotional or marketing material;
- chain letters or pyramid selling schemes; and
- programs containing viruses, Trojans, malware (malicious software), hoaxes or any tools designed to compromise the security of Internet users, websites and/or systems. However, you may pass samples of malware in a safe manner to appropriate agencies for the purpose of combating its spread.
- Phishing – material that is designed to acquire information such as usernames, passwords, credit card details or other personal information through masquerading as a trusted source.
- For the avoidance of doubt, the storage upon and/or distribution via our systems and/or services by any User of “pirated” software, or any other materials that are not expressly licensed to the User, will constitute a violation of this AUP.
- At our sole discretion (and without prejudice to any of our other rights pursuant to this AUP and our terms and conditions), we reserve the right to remove any material from any server under our control. In addition to any other action we may take, we reserve the right to notify relevant authorities, regulators and/or other third parties of the use, storage, distribution, transmission, retransmission or publication of prohibited material (and/or any other materials the dealing with or use of which may constitute unlawful conduct by Users).
- It is your responsibility to back up the contents of your Gigabit email account. Upon suspension or termination of services the content may be removed and permanently deleted by Gigabit without notice.
- If you do not access any your Gigabit email account at least once in every 150 days we have the right to delete that email account and its contents without prior warning.
- If the email account is not used in any 90 day period we will suspend that account without prior notice. This will not impact any other email addresses associated with that account, as long as they are accessed within a 90 day period.
- The email account will remain suspended for a further 60 days. During this time you can reactivate it by calling customer care.
- Any e-mail accounts not reactivated will be closed and the contents permanently deleted.
- For the purposes of clarity the term ‘unsolicited’ can be defined as ‘not asked for’ or ‘unwanted’.
- Without prejudice to the other provisions of this AUP, we will investigate complaints regarding email and may take action at our discretion, which may be based on but not limited to the following:
- you may not use your email to send unsolicited messages;
- if so requested by us or any recipient(s), you must desist from posting messages to said recipient(s);
- malicious mail, unsolicited e-mail and unsolicited bulk e-mail is prohibited from being sent from or via a Gigabit connection. Users must take all appropriate precautions to prevent such use of their machines by third parties. We will not forward mail from accounts terminated for bulk mailing or unsolicited advertising;
- chain letters are unsolicited by definition and may not be propagated using the services;
- you may not send, distribute, or reply to mailbombs (whether malicious or otherwise). “Mailbombing” is understood as causing individuals to receive large amounts of unrequested email by any means;
- Users may not construct, alter and/or forge the headers of email messages to conceal the sender’s email address, or to prevent other Internet users from responding to messages;
- harassment, whether through language, frequency or size of messages sent, is prohibited.
- Violations of this AUP may result in a large amount of email traffic. If our customers send and/or receive so much email that our resources are affected, we reserve the right to take such action(s) as may be necessary (to be determined at our sole discretion) to protect both the services and our Users, including, but not limited to, deployment of appropriate network security software.
- Users may only run servers to provide Internet Protocol Services (“IPS”) within the limits set out in Sections 4, 5 and 7. Users are deemed wholly responsible for any and all network traffic emanating from relevant servers and are required to ensure that such IPS are secured against abuse by third parties. This includes (but is not limited to) ensuring that servers are running up-to-date security patches and are configured so as to not act as relay servers at any time. “Relay servers” mean servers that can be utilised by another Internet user to relay spam, or any other type of abusive network traffic.
- Failure by Users to secure servers against such abuse may result in immediate suspension or termination of service by us (acting at our sole discretion), with no prior notice, in order to protect the overall network and the services we provide to other customers.
- In addition to the above, Users’ provision of IPS must not adversely affect any other users of our network (including telephony and internet services). Further, Users may not include within and/or distribute via an IPS any content without the express consent of the owner of all relevant rights in such content (including but not limited to intellectual property rights). We reserve the right to monitor network traffic and to take appropriate action as required, including the right to restrict any IPS. We will not offer any technical support for the provision of IPS.
- We may contact Users at any time to instruct them to stop making server(s) available via their Gigabit services. Upon being notified Users must cease to operate the relevant server(s) with immediate effect.
Making a complaint
- Complaints regarding the conduct of Users on our network will be accepted by our reporting webform available in your account page on our website and via any other standard abuse reporting mechanisms notified by us on our website. Any complaint must include as much quantitative and supportive evidence as possible to enable us to investigate the alleged conduct properly, such as a full email header and body. Submitting all relevant evidence in the original abuse report will significantly speed up the resolution of the issue by us.
- In the event that we request from the complainant further evidence or clarification of some kind, and the information is not forthcoming in a timely fashion, the investigation will be closed without notice. Investigations will be kept open for a maximum of 15 days before being closed.
- Please do NOT send excerpted parts of a message. Sending a copy of the entire message, including headers, helps to prevent misunderstandings based on incomplete information, or information used out of context. For example full headers demonstrate which path the message has taken, and enable us to determine whether any part of the message has been forged. This information is vital to our investigation.