In this Policy:
“the service provider” means EasyComs Communications (Pty) Ltd , Co. Reg. No. 2006/012143/07;
“the service” means the internet access and related services such as hosting and mailbox provision as requested and agreed upon by the customer and provided by the service provider;
“infrastructure” means all facilities, equipment, software and other amenities owned or leased by the service provider and utilized in or related to the provision of the service.
- This Acceptable Usage Policy ("AUP") specifies the types of actions and specific actions prohibited to users of the network and systems ("infrastructure") of EasyComs Communications (Pty) Ltd (“the service provider”), and is intended to enhance the use of the Internet by preventing unacceptable use. Users are required to adhere to all the policies specified in this AUP without exception.
- The service provider does its level best to maintain and sustain service delivery in goodwill and within reasonable parameters as decided on by its management, the extent to which it will go is at the service providers sole discretion.
This AUP forms part of and is incorporated by reference into the Terms and Conditions governing the provision of the service. An updated copy hereof will be available at http://www.easycoms.co.za
- This AUP may be amended from time to time as required by legal developments and at the sole discretion of EasyComs. While the service provider will take steps to notify users of amendments, users retain the sole responsibility for acquainting themselves with such amendments and will be regarded as having agreed thereto through continued use of the service, and/or whenever the action of a user may be covered by this policy. User's are responsible for being familiar with the spirit and rules of this policy.
- Compliance with applicable laws and regulations
- The service provider’s infrastructure and the service provided may be used only for lawful purposes. Users may not violate any applicable laws or regulations of South Africa as may apply to any user in South Africa.
- Transmission, distribution or storage of any material on or through the infrastructure in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property right used without proper authorization, including any material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws and security legislation.
- Transmission of data
- The user acknowledges that the service provider is unable to exercise control over the content of the information passing over the infrastructure and the Internet, including any websites, electronic mail transmissions, news groups or other material and associated materials such as traffic data created or accessible over its infrastructure. The service provider is not responsible for the content of any messages or other information transmitted over its infrastructure.
- The user acknowledges further that the service provider is under no general obligation to monitor traffic passing over the infrastructure and the Internet.
- System and Network Security, Stability
- Any reference to systems and networks under this section includes the Internet (and all those systems and/or networks to which the user is granted access through the service provided) and includes, but is not limited to, the infrastructure of the service provider. The user may not circumvent user authentication or security of any host, network, or account (referred to as "cracking" or "hacking"), nor interfere with service to any user, host, or network (referred to as "denial of service attacks").
- Violations of system or network security by the user are prohibited, and may result in civil or criminal liability. The service provider may have incidents investigated that involve such violations and will involve and co-operate with law enforcement officials and any required security third parties if a criminal violation is suspected. Examples of system or network security violations include, without limitation, the following:
- Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of any system or network or to breach security or authentication measures;
- Unauthorized monitoring of data or traffic on the network or systems;
- Interference with service to any user, host or network including, without limitation, mail-bombing, flooding, deliberate attempts to overload a system and broadcast attacks;
- Forging of any TCP-IP page header (spoofing) or any part of the header information in an e-mail or a news group posting.
- Client agrees not to run e-mail or other hosting services for public use on any access packages. Any hosting, high-volume traffic and users wanting to send e-newletters should make use of a online hosting Service suitable to their needs.
- EasyComs monitors the quality of service on its network, and where a client exceeds reasonable parameters for usage, such use may be controlled automatically to safeguard the service for others. Penalties - Deemed Over-utilization where a user is deemed to be carrying out unauthorized activity, generating excessive volumes of data traffic or sending spam may be controlled by various means, including throttling service speeds, deprioritization of service, blockinh spam and even summarily suspending the clients service if the breach is considered serious at the solw discretion of EasyComs management. This includes excessive use of loop-back traffic by developers as well as any such issues as may be caused by devices that become infected by malware and viruses that threaten other devices or that result in excessive traffic of any kind being generated. The aim is to ensure that other bona-fide users enjoy consistent high standards of service.
- Disclaimer and indemnity
- The service provider disclaims all and any liability for any claim or action or other legal proceeding, howsoever arising, from unacceptable use or use in contravention of this AUP of the service or the service provider’s infrastructure by users, including special and consequential damages and damages for loss of profits and pure economic loss.
- The user agrees to indemnify and hold the service provider harmless in respect of liability for any claim or action or other legal proceeding, howsoever arising, from unacceptable use or use in contravention of this AUP or of the service or the service provider’s infrastructure by users, including special and consequential damages and damages for loss of profits and pure economic loss.
- E-mail use
- It is explicitly prohibited to send unsolicited bulk mail messages ("junk mail" or "spam") of any kind (commercial advertising, political tracts, announcements, etc). This is strongly objected to by most Internet users and the repercussions against the offending party and the service provider can often result in disruption of service to other users.
- Users’ attention is drawn to section 45 of the Electronic Communications and Transactions Act No. 25 of 2002 (Republic of South Africa) and the fact that failure to comply with the provisions of section 45 can result in criminal liability.
- Maintaining of mailing lists by users of the service is acceptable only when done with the written permission and approval of the list members, and when generated on an external hosting service. Should mailing lists contain invalid or undeliverable addresses or addresses of unwilling recipients those addresses must be promptly removed.
- All users of such services hereby indemnify the service provider from any responsibility for the permission from addressees to send emails to their accounts.
- Where laws governing electronic marketing are breached and are brought to the service providers attention, this may constitute grounds for termination or suspension of the user’s account or such other sanction as may be proportionate in the circumstances as sole discretion of the service provider and no refunds for lost service are claimable.
Quality of service is managed by EasyComs, where heavy users may be 'shaped' or limited if they use excessive traffic. Uncapped packages have asymmetrical speeds. Dedicated services can be applied for from the service provider, such as FTTH ( fiber to the home ) where the service provider can process applications where such service exists. HD cctv requires dedicated bandwidth and the service provider may be able to support such a service under a service level agreement contract - on request.
- Public relay
- Public relay occurs when a mail server is accessed by a third party from another domain and utilized to deliver mails, without the authority or consent of the owner of the mail server. Users’ mail servers must be secure against public relay as a protection to both themselves and the Internet at large. Mail servers that are unsecured against public relay often become abused by unscrupulous operators for spam delivery and upon detection such delivery must immediately be disallowed / blocked.
- The service provider reserves the right to examine users’ mail servers to confirm that no mails are being sent from the mail server through public relay and the results of such checks can be made available to the user. The service provider also reserves the right to examine the mail servers of any users using mail servers provided by the service provider for "smart hosting" (when the user relays its mail off a service provider mail server to a mail server of its own) or similar services at any time to ensure that the servers are properly secured against public relay. All relay checks will be done in a manner aimed at preserving customer privacy.
- Notwithstanding measures taken by the service provider in this regard, users acknowledge that the responsibility for taking reasonable measures to secure their mail servers against public relay remains solely that of the user and the service provider will accept no liability for managing, correcting, maintaining or ensuring service to or from these client servers.
- Interception and Monitoring
- Users expressly acknowledge the fact of and consent to the lawful monitoring and interception of traffic carried over the service provider’s infrastructure by the service provider or related entities under the following circumstances:
- Where required under the provisions of the Interception and Monitoring Prohibition Act No 127 of 1992 or the Regulation of Interception of Communications and Provision of Communication-related Information Act 70 of 2002 or any other law;
- Where required by court order;
- Where required for the efficient provision of services, including billing and bandwidth and performance monitoring;
- Where required for the maintenance of system and network integrity and security;
- Where required for the actioning of a take-down notice or complaint in terms of this AUP.
- The service provider will undertake interception and monitoring in accordance with the following principles:
- The privacy of users is a fundamental right and any interception and monitoring will accordingly be reasonable and proportionate according to the circumstances;
- The actual content of any private communication will not be accessed unless required by law or otherwise regarded as necessary for the achievements of one or more of the objectives set out above;
- Staff and specifically contracted entities will be bound by confidentiality agreements in respect of interception and monitoring activities.
- Notice and Take-Down procedures
- EasyComs confirms that it has a procedure in place for the notice and take-down of illegal material, where EasyComs itself hosts content. In compliance with section 77 of the Electronic Communications and Transactions Act (No. 25 of 2002) Contact our office directly for any queries.
- Breach of Fair Use Rules by any user
Since Covid and government caused the extreme lock-down, we have seen demand for bandwidth make it the most scarce and valuable of business resources.
Where a users usage exceeds the FUP it is considered to be excessive. The account will be soft-capped.
Where we encounter any user that refuses to control users on their account, or who fails to have infected devices cleaned that cause excessive usage, we reserve the right to soft-cap the service to protect
other users - AND to terminate their service. i.e. we will deny further service.
To repeat - where other users services are being affected by a rogue user drawing excessive bandwidth, we prefer not to continue service.
Similarly, where a user chooses to behave in a way that causes us unnecessary admin in trying to resolve any issue - and where their behavior is seem by us to have become abusive, we treat that as acting
in bad faith. We do not tolerate abuse and will firmly act to stop it as early as possible.
Clients threatening to cancel service after they have so abused our service will be treated as rogue clients and we have no interest in continuing to serve them.
As stated under our terms, which clients agree to upon signing-up with us, we enter into no further correspondence, and will reject any attempts that may be aimed at co-ercing us or forcing us to continue
supporting such acts of bad faith.
We are under no obligation to provide service to any user - and we will exercise our right of refusal and terminate the relationship.
Once such a decision is made to terminate a service, no further correspondence will be entered into.
We value our relationship with our customers, but where the relationship has been damaged, we consider it terminal and will close the account and the relationship.
- Complaints / Failure to observe this AUP
Upon receipt of a complaint, or having become aware of an incident, the service provider reserves the right to, as may be applicable:
- Inform the user’s network administrator of the incident and require the network administrator or network owner to deal with the incident according to this AUP.
- In the case of individual users, suspend the user’s account and withdraw the user’s network access privileges completely without advance notice.
- Charge the offending parties for any administrative costs including any time & materials as may be incurred due to such an incident.
- Where any additional or special service is required over and above the standard service, requests must be detailed in writing and any advice given does not bind the service provider unless and until such service is detailed in a written contract.
- Where a client experiences any problems these shall be reported to the service providers support email.
- Where a user is deemed to behave unaccetably by cursing at staff or levelling threats, management may suspend and/or cancel service at their discretion.
- Please note that any of the abovementioned abuse of services may result in suspension without redress in any form. Access by the user to services may be withheld until EasyComs is satisfied that abuse has been effectively prevented by the user, and where the user undertakes in writing to actively prevent any recurrence of similar abuse.
- EasyComs may share information concerning such incidents with other Internet Access providers, or publish the information, and/or make available the users’ details to law enforcement agencies - at EasyComs sole discretion following a breach of these rules.