Acceptable Use Policy

By using any service provided by Network Online Limited, you indicate your acceptance to be bound by our Service Agreement that consists of our Terms of Service and our Acceptable Use Policy. Acceptance of this Service Agreement forms a legally binding contract.

Our Acceptable Use Policy (the "Policy") is designed to help protect us, and you, from irresponsible or illegal activities.

  1. Definitions
    1. "Terms of Service" refers to the clauses in our Terms of Service document
    2. "Acceptable Use Policy" refers to the clauses in this document.
    3. "Service Agreement" refers to our Terms of Service and Acceptable Use Policy.
    4. In this Service Agreement "you" and "your" refer to each customer, and "we", us" and "our" refer to Network Online Limited.
  2. Interpretation
    1. The following policy is intended to be a guideline to our stance against violations of the accepted norms of the internet community and is not intended to be exhaustive. We reserve the right at all times to protect our reputation and goodwill.
  3. Web Sites
    1. You will be provided with disk space, bandwidth transfer, and other resources commensurate with the hosting plan you have chosen. Additional resources can be provided at any time for an agreed cost.
    2. You are responsible for ensuring that the data contained within any web site under your direct or indirect control does not break any UK law or any law in your home country.
    3. We reserve the right to remove any content, or suspend or terminate any account, under any of the following circumstances:
      1. The material is suspected to be illegal.
      2. The site gets an abnormally high number of hits outside the bandwidth allowance
      3. The presence of the site adversely affects - in any way - our ability to provide our services to other customers. This includes any web site that uses excessive resources. Excessive resource use on a shared web server, or any other shared resource (e.g. Database Servers, FTP Servers etc) is interpreted as any web site that uses 5% or more of a server's CPU, network connection, bandwidth, or memory resource for more than 5 consecutive minutes.
      4. The material is, in our reasonable opinion, in violation of any law or regulation, or which is defamatory, menacing, constitutes an illegal threat, is obscene, in breach of third party intellectual property rights (including copyright) or in breach of trade secrets.
    4. You cannot use any service provided by us:
      1. in a way that causes damage to, or affects the integrity and performance of our servers and their data, or in a manner that affects our ability to provide our services to other customers without limits or interuption. Failure to do so is a material breach of our Terms of Service, and you will be liable for all costs required to repair or rectify any damage caused.
      2. to host sites that contain adult content. This includes, but is not limited to, pornographic images, text, and sound files.
      3. to provide hyperlinks to sites containing Adult content is not allowed. This includes, but is not limited to, pornographic images, text, and sound files.
      4. to operate IRC Services
      5. to operate File Download or File Sharing services
      6. to run Mailing Lists that do not operate confirmed opt-in procedures
      7. to operate Mailing Lists that contain email addresses of members who have not specifically joined the list from the domain operating the mailing list, and who have not joined using a confirmed opt-in procedure. We reserve the right to ask for proof that each member of the Mailing List joined in the appropriate manner. Failure to provide this proof to our satisfaction, or to the satisfaction of our network or bandwidth providers, will be a material breach of our Acceptable Use Policy.
      8. if your actions cause any of our IP addresses or email servers to be listed on a major anti-spam list, including but not limited to, Spamcop, Spamhaus, Sorbs, or our abilty to deliver our emails is banned or deferred by a major email server operator such as Yahoo, Google or any provider with more than 1000 email user accounts.
    5. to store files that are not used directly by your web site. The directory space provided must not be used to archive or store any other file.
    6. to resell your web space or any service being provided by us, except for Dedicated Server customers, VPS accounts, and Reseller Accounts .
    7. to charge for access to any information or output provided by us unless the service has been provided by us as a service you can charge other users for.
    8. to provide adult verification systems.
    9. to promote the services being provided by us in such a way that you would breach this Policy in any circumstances.
  4. Electronic Mail
    1. We operate a zero tolerance policy towards Spam. The term "Spamming" includes, but is not limited to, the sending of unsolicited bulk and/or commercial messages over the Internet or maintaining an open SMTP policy. We, or our network and bandwidth providers, reserve the right to determine, at our sole discretion, whether e-mail recipients were from a confirmed opt-in email list. You may not use your account for the following purposes:
      1. To send unsolicited bulk or commercial messages. This includes, but is not limited to, bulk mailing of commercial advertising, informational announcements, charity requests, petitions for signatures, and political or religious information, unless the recipient has specifically requested it by a confirmed opt-in system
      2. To collect responses from unsolicited bulk or commercial e-mail sent from accounts with other providers.
      3. To send a number of copies of the same or similar message, or very large messages or files, with the intent to disrupt a server or account ("mail bombing").
      4. To harass or intimidate others. If a recipient asks to stop receiving email, you must not send that person any further messages.
      5. Forward or propagate chain letters, whether or not such messages solicit money or other items of value, and whether or not the recipient wishes to receive such mailings.
      6. To collect replies to messages sent from another Internet service provider if those messages violate this Acceptable Use Policy or the acceptable use policy of the other service provider.
      7. If you use the services of another provider to promote a web site hosted by or through us, the provisions of this Acceptable Use Policy shall apply to the methods used to promote such a site.
      8. If a complaint about Spam can be confirmed from our Log Files or the evidence provided by the complainant, your account will be terminated immediately and the domain name, and all files associated with the customer's account, removed from our servers and backup facilities. No refunds will be provided on unused Credit in this circumstance and you will be liable to pay us all costs associated with rectifying any damage caused such a being banned by a anti-spam list or email server operator.
    2. The Forging, altering or removal of electronic mail headers is prohibited ("spoofing").
  5. Use of Service
    1. You cannot use your account:
      1. in a manner that causes damage to, or affects the integrity and performance of our servers and their data, or in a way that affects our ability to provide our services to other customers without limits or interuption. Failure to do so is a material breach of our Terms of Service, and you will be liable for all costs, required to repair any damage caused.
      2. To obtain or attempt to obtain unauthorised access to any computer or service, to break or attempt to break security on any computer network, including our own, or to access, or attempt to access a computer, account, or information which does not belong to you.
      3. To install network scanners or packet analysers, or any other software or programme designed to "snoop" on network activity
      4. To carry out
        1. intrusion scans, port scans, stealth scans, and other activities designed to assist in hacking
        2. Ping scans and Ping floods
        3. Mail host relay use or hijacking
        4. Telnet or FTP to internal systems
        5. attempts to access privileged or private TCP or UDP ports
        6. multiple or frequent Finger attempts
        7. IP Spoofing or masquerading
        8. Syn Floods
        9. OOB Attacks
        10. Password cracking or guessing schemes
        11. SNMP attempts
        12. Source route spoofing
      5. In a manner which violates any law, regulation, treaty or tariff
      6. In a manner which is defamatory, fraudulent, indecent, offensive or deceptive
      7. To threaten, harass, abuse or intimidate others
      8. To damage the name or reputation of Network Online Limited, or our partners
      9. In a manner which interferes with other customers' use and enjoyment of the services provided by us.
    2. You are responsible at all times for the use of your account and you agree not to use our services in a way that causes damage to, or affects the integrity and performance of our servers and their data, or in a manners that affects our ability to provide our services to other customers without limits or interuption. You agree to pay all costs, including the time spent, to repair any damage caused or to rectify a problem that your use of our services has caused.
  6. Viruses and Destructive Activities
    1. You must ensure that any content or file loaded on to the server does not contain any unauthorised code and is free of viruses, worms, Trojans or other malicious code. For the avoidance of doubt, malicious or unauthorised code can be interpreted as:
      1. Unauthorised code (contained within a legitimate program or script, or image) that performs functions unknown to and/or not specifically authorised by Network Online Limited
      2. A legitimate program that has been altered by the placement of unauthorised code within it that performs functions unknown and/or not specifically authorised by Network Online Limited
      3. Any program that appears to perform a desirable and necessary function but that (because of unauthorised code within it) performs functions unknown to and/or not specifically authorised by Network Online Limited
      4. Unauthorised code designed to conceal itself and/or destroy data, or read data that the User has not been specifically authorised to view
      5. Unauthorised code designed to perform functions that Network Online Limited has not specifically authorised
    2. You may not use our facilities or services for any of the following activities:
      1. Creating or sending Internet viruses, worms or Trojan horses
      2. Pinging, flooding or mailbombing, or engaging in denial of service attacks
      3. Engaging in other activity that is intended to disrupt or interfere with, or that results in the disruption of or interference with, the ability of others to effectively use the Services (or any connected network, system, service or equipment) or conduct their business over the Internet.
    3. Network attacks related to your server or domain name(s) may result in suspension or termination
  7. Dedicated, Managed, VPS, and Colocated Servers
    1. You must not disable or alter any security programmes or settings set by us, including anti-virus programmes, software firewalls, registry settings, and account policies, without our express permission.
    2. You must not create an open SMTP, or other email, relay.
    3. You must not remove or interfere with any administrator accounts that we set up to allow us to access your server either locally or remotely. To do so is a material breach of our Acceptable Use Policy
  8. Miscellaneous
    1. Network Online Limited reserve the right to ban IP addresses or IP address blocks from accessing our servers or network.
    2. Abusive language, threats, intimidation, or harrassment of our staff, whether verbal or written, is unacceptable and is a material breach of our Acceptable Use Policy
  9. Complaints
    1. Complaints about Violation or Breaches of our Acceptable Use Policy can be sent to abuse@network-online.co.uk