Acceptable Use Policy


  • In this policy:“Data” includes information, documents, text, software, music, sound, photographs, graphics, video, messages and other materials of any kind and in any form;
    “Transmit” includes use, facilitate (e.g. by operating chatroom, discussion groups, FTP sites etc) generate, link to, upload, post, publish, download, store, disseminate, email, send or receive via or in any way connected with our goods or servicesWe do not actively monitor, censor or directly control any Data generated, stored, transmitted or used in connection with our services including content displayed on websites or material sent by email. It is your responsibility to comply with this policy. If, however, it comes to our attention that this policy has been or may be breached, we may act in accordance with our terms and conditions. Policy You must not Transmit any Data which, or otherwise use our products or services (including without limit registration or use of domain names registered through us, hosted by us or for which we are registrar) in a manner which, we consider in our discretion in any way involves or includes or relates to:


  • conduct that is unlawful (including breach of any applicable laws, statutes, regulations, standards or codes of conduct whether or not compulsory), harmful, threatening, a nuisance, abusive, harassing, tortious, defamatory, vulgar, obscene, indecent, invasive of another’s privacy, hateful, inflammatory, racially, ethnically or otherwise objectionable;
  • the infringement of third party intellectual property or other rights;
  • viruses, Trojan horses, worms, time bombs, cancelbots or any other computer code, files or programs designed to interrupt, damage, destroy or limit the functionality of any software, hardware or Data;
  • junk mail, spam, chain letters, pyramid schemes or any similar or fraudulent schemes or any inappropriate form of solicitation; or collection of the responses to any such schemes or solicitation;
  • the forging of headers, manipulation of identifiers or otherwise disguising the origin of any Data;
  • the provision of false or misleading information;
  • denial of service attacks including (without limit) mailbombing, news bombing, trolling, (posting outrageous messages to generate numerous responses), other flooding techniques, deliberate attempts to overload a system, broadcast attacks and any activity designed to cause a computer crash;
  • attempting to or gaining unauthorized access to, or interfering with or damaging, our or any third party’s computer or Data including (without limit) any attempt to breach authentication or security measures or any attempt to probe, scan or test the vulnerability of a computer system;
  • unauthorized monitoring or interception of Data;
  • potential or actual interference with or disruption to our computers or services to other customers including excessive use of our server resources or other services;
  • violation of acceptable use or similar policies of other ISPs or connected networks (eg sending unsolicited commercial e-mail via our services to the subscribers of any ISP that disallows unsolicited commercial e-mail);
  • damage to our commercial reputation; or
    breach of generally accepted standards of netiquette or norms of the internet community.


Please note we reserve the right to modify this policy from time to time you should therefore check it occasionally for changes