Legal Information
Acceptable Use Policy |
|
|
Web Hosts Australia's Acceptable Use
Policy ("AUP") is designed to protect Web Hosts Australia's
customers ("Customers") and third parties, further
compliance with all relevant laws and regulations, and
promote the security and availability of Web Hosts
Australia's network, servers and physical infrastructure.
This AUP applies to each Customer's use of the services
provided to it by Web Hosts Australia ("Services") and every
server or network device that is under Web Hosts Australia
or each Customer's control and attached to Web Hosts
Australia infrastructure as a part of the Services
("Server").
This AUP is incorporated by this
reference into each Customer's service agreement. Web Hosts
Australia reserves the right to amend this AUP from time to
time, and a Customer's use of the Services after changes to
the AUP are posted on Web Hosts Australia's web site
www.webhostsaustralia.com.au will constitute the Customer's
acceptance of any such amendments as will payment of each
invoice.
Customers are responsible for complying
with this AUP and for violations attributable to their
customers and users, whether authorised or not by Customer.
Customers must take all reasonable steps to ensure that
they, their customers and users will comply with this AUP.
This AUP does not (a) obligate Web Hosts
Australia to monitor, review, or police the data and content
residing on its network or (b) create any obligation of Web
Hosts Australia to any party that is not a Customer. Web
Hosts Australia expressly disclaims any liability for the
data and content residing on its network and servers and for
the actions of its Customers.
Any questions or comments regarding this
AUP should be directed to through the Live Sales Facility,
by contacting 1800 00 99 80 or in the case of existing clients
through the Help Desk at
clients.fluccs.com.au
Prohibited Content
Customers shall not allow the posting,
transmission, or storage of data and content on or through
the Services which, in Web Hosts Australia's sole
determination, constitutes a violation of any relevant law,
regulation, ordinance, or court order. Customers shall be
responsible for determining what laws or regulations are
applicable to their use of the Services. Prohibited content
includes, without limitation, (a) content or code that
facilitate any violation of, or describe ways to violate,
this AUP or (b) "harvested" addresses or information, (c)
"phishing" web sites, or (d) "spamvertising" sites.
A Customer shall not knowingly host on
its account, or transmit over Web Hosts Australia's servers
or network, any material believed by Web Hosts Australia to
constitute child pornography. In addition to the any other
actions it may take under this AUP, Web Hosts Australia
reserves the right to cooperate fully with any criminal
investigation of content located on a Server that
constitutes alleged child pornography.
Customer Security Obligation
Customers must use reasonable care to
ensure the security of each Server. A Customer is solely
responsible for any intrusions into, or security breaches
of, any of its Domains or Servers, except as otherwise
covered by a specifically designated security administration
or firewall security service package ordered by the
Customer. Web Hosts Australia reserves the right to
disconnect without provision of service credit any Server or
Account which disrupt Web Hosts Australia's servers, network
or any hardware objects on the network as a result of a
security compromise.
Resource and Server Abuse
In order to ensure the maximum performance
of our servers for all sites hosted on them customers are
prohibited from engaging in any activities that Web Hosts
Australia determines in its sole discretion to constitute
resource or server abuse, including, but not limited to,
the following:
- Run any process that requires more than 96Mb of memory space, more than 120 CPU seconds, or use more than 25% of all available system resources at any time.
- Run any type of interactive real-time chat applications that require server resources. Remotely-hosted services are fully allowed.
- Run stand-alone, unattended server-side processes at any point in time on the server. This includes any and all daemons, such as IRCD.
- Run any software that interfaces with an IRC (Internet Relay Chat) network.
Network Abuse
Customers are prohibited from engaging in
any activities that Web Hosts Australia determines in its
sole discretion to constitute network abuse, including the
following:
- Introducing or executing malicious programmes into
any network or server, such as viruses, worms, Trojan
Horses, and key loggers.
- Causing or initiating security breaches or
disruptions of network communication and/or connectivity,
including port scans, flood pings, email-bombing, packet
spoofing, IP spoofing, and forged routing information.
- Executing any form of network activity that will
intercept data not intended for the Customer's server or
account.
- Evading or circumventing user authentication or
security of any host, network or account, including
cracking, brute-force, or dictionary attacks.
- Interfering with or denying service to any user,
host, or network other than the Customer's host, such as a
denial of service attack or distributed denial of service
attack.
- Conduct designed to avoid restrictions or access
limits to specific services, hosts, or networks, including
the forging of packet headers or other identification
information.
- Using any program, or sending messages of any kind,
designed to interfere with or disable a user's terminal
session.
- Being in breach of the Anti Spam Laws of any country
Intellectual Property
Infringement Policy
Customers may not transmit, distribute,
download, copy, cache, host, or otherwise store on a Server
any information, data, material, or work that infringes the
intellectual property rights of others. Web Hosts Australia
has the right to disable access to, or remove, infringing
content to the extent required under any law or regulation,
including the Digital Millennium Copyright Act of 1998.
Web Hosts Australia reserves the
right to suspend permanently or terminate the Services of
any Customer that repeatedly violates Web Hosts Australia's
Intellectual Property Infringement Policy or any copyright
law.
E-mail Policy
Customer may not send unsolicited bulk
messages over the Internet (i.e., "spamming") and must
comply with all relevant legislation and regulations on bulk
and commercial e-mail, including the CAN-SPAM Act of 2003
and the Australian Anti Spam Legislation 2004.
Mass Mailings – Customers may not sending
mass unsolicited e-mail, which is email that is sent to
recipients who have not double-opted in to mailings from the
Customer. Customers who send mass mailings must maintain
complete and accurate records of all consents and opt-ins,
including the actual e-mail and its headers, and provide
such records to Web Hosts Australia upon its request. If a
Customer cannot provide positive and verifiable proof of
such consents and opt-ins, Web Hosts Australia will consider
the mass mailing to be unsolicited.
Mailing Lists – Customers are prohibited
from operate mailing lists, listservs, or mailing services
that do not target an audience that has voluntarily signed
up for e-mail information using a double opt-in process or
that has made their e-mail addresses available to Customer
for distribution of information. Customers who operate
mailing lists must maintain complete and accurate records of
all consents and opt-ins (including the actual e-mails and
their headers) and provide such records to Web Hosts
Australia upon its request. If a Customer cannot provide
positive and verifiable proof of such consents and opt-ins,
Web Hosts Australia will consider the list mailing to be
unsolicited. Any Customer-maintained mailing list must also
allow any party on the list to remove itself automatically
and permanently. On shared servers no more than 500 emails
may be sent from an account in an hour
Other prohibited mailing activities
include the following:
- Use of Web Hosts Australia's servers and network for
the receipt of replies to unsolicited mass e-mail
- Forgery of e-mail headers ("spoofing")
- Spamming via third-party proxy, aggregation of proxy
lists, or installation of proxy mailing software
- Configuration of a mail server to accept and process
third-party messages for sending without user
identification and authentication
- Hosting web pages advertised within "spam e-mail"
sent from another network ("spamvertising")
- Any other unsolicited bulk messages, postings, or
transmissions through media such as weblog posts, IRC/chat
room messages, guestbook entries, HTTP referrer log
entries, usenet posts, pop-up messages, instant messages,
or SMS messages.
Block Removal – If, as a result of a
Customer's actions, Web Hosts Australia's mail servers or IP
address ranges are placed on black hole lists and other mail
filtering software systems, Web Hosts Australia shall charge
Customer $100 up front and $100 per hour thereafter for any
necessary remedial actions.
IP Allocation
A Customer shall not use IP addresses
that were not assigned to it by Web Hosts Australia. Web
Hosts Australia reserves the right to suspend the network
access of any account or server utilising IP addresses
outside of the assigned range.
IRC Policy
Unless on their own Dedicated Server
customers may not operate and maintain IRC servers which
connect to global IRC networks such as Undernet, EFnet,
DALnet. Use of IRC plug-ins, scripts, add-ons, clones or
other software designed to disrupt or deny service to other
users is prohibited. Harassing or abusive IRC activity is
expressly prohibited under the AUP, including (i) disruption
or denial of service or (ii) the use or joining of "botnets"
or the use of IRC BNC's or other proxy and re-direction
software. If a Customer's IRC servers are frequently
compromised or attract denial of service or distributed
denial of service attacks that disrupt or denies service to
other Customers or users, Web Hosts Australia may
null-route, filter, suspend, or terminate that Customer's
service.
Usenet Policy
Usenet posts and content must conform to
standards established by the Internet community and the
applicable newsgroup charter. Web Hosts Australia reserves
the right to determine whether such posts violate the AUP.
Legal Investigations
Customers will cooperate and comply with
any civil or criminal investigation regarding content
located on its Accounts or Servers, including, without
limitation, the following: discovery orders, subpoenas,
freeze orders, search warrants, information requests, wire
taps, electronic intercepts and surveillance, preservation
requests, and any other order from a court or government
entity (each an "Investigation"). Web Hosts Australia
reserves the right to comply with any Investigation without
notice to a Customer. Customers shall not be entitled to
service credits, and Web Hosts Australia shall not be in
default under any agreement for Services, if its compliance
with any Investigation causes a Customer to incur downtime
or requires the sequestering of all or a portion of the
Servers.
Violations of AUP
Web Hosts Australia may enforce this AUP
with or without notice to a Customer by any actions it deems
necessary in its sole discretion, including the following:
- Disabling access to a Customer's content that
violates this AUP
- Removal of DNS records from Servers
- Blocking mail or any other network service
- Effecting IP address null routing
- Suspending or terminating of a Customer's service
- Taking direct action against a Customer's users and
customers.
The aforementioned list of actions shall
not be construed in any way to limit the actions or remedies
that Web Hosts Australia may take to enforce and ensure
compliance with this AUP. Web Hosts Australia reserves the
right to recover any and all expenses, and apply any
reasonable charges, in connection with a Customer's
violation of this AUP. No service credits will be issued for
any interruption in service resulting from violations of
this AUP.
Web Hosts Australia reserves the right at
all times to investigate any actual, suspected, or alleged
violations of this AUP, with such investigation to include
accessing of data and records on, or associated with, any
Server. |