a) conduct that is unlawful (including breach of any applicable laws, statutes, regulations, standards or codes of conduct whether or not compulsory), harmful, threatening, a nuisance, abusive, harassing, tortious, defamatory, vulgar, obscene, indecent, invasive of another's privacy, hateful, inflammatory, racially, ethnically or otherwise objectionable;
b) the infringement of intellectual property or other rights of any third party;
c) viruses, trojan horses, worms, time bombs, cancelbots or any other computer code, files or programs designed to interrupt, damage, destroy or limit the functionality of any software, hardware or Data;
d) junk mail, spam, chain letters, pyramid schemes or any similar or fraudulent schemes or any inappropriate form of solicitation; or collection of the responses to any such schemes or solicitation;
e) the forging of headers, manipulation of identifiers or otherwise disguising the origin of any Data;
f) the provision of false or misleading information;
g) denial of service attacks including (without limit) mailbombing, news bombing, trolling, (posting outrageous messages to generate numerous responses), other flooding techniques, deliberate attempts to overload a system, broadcast attacks and any activity designed to cause a computer crash;
h) attempting to or gaining unauthorized access to, or interfering with or damaging, our our any third party's computer or Data including (without limit) any attempt to breach authentication or security measures or any attempt to probe, scan or test the vulnerability of a computer system;
i) unauthorized monitoring or interception of Data;
j) potential or actual interference with or disruption to our computers or services to other customers including excessive use of our server resources or other services;
k) violation of acceptable use or similar policies of any internet service providers or connected networks (eg sending unsolicited commercial e-mail via our services to the subscribers of any internet service provider that disallows unsolicited commercial e-mail);
l) damage to our commercial reputation;
m) breach of generally accepted standards of .netiquette. or norms of the internet community.
n) the provision of any incorrect or incomplete name, address, email address or telephone number or any other false information otherwise enter information intended to conceal your identity; or
o) attempting to reverse engineer, de code or in any way disassemble any software provided in relation to the provision of services.
Changes to this Policy
We may vary this policy at any time by varying this page and you are advised to regularly check this Policy for updates. Any changes to the Policy are automatically binding upon you.
Last updated 4 October 2013