Our Acceptable Use Policy (AUP) can be downloaded at the bottom of this article.
Background Context
Our Acceptable Use Policy (AUP) distinguishes constraints and practices that all users abide when using our services. By using our services you have agreed to operate according to our Acceptable Use Policy.
Having clear parameters within which we all operate increases consistency and control, decreases security vulnerabilities, and reinforces mutual respect and trust. All our actions are interdependent. As the networks and services we offer are shared interdependent environments, our individual actions effect the whole. For this level of cooperation to thrive, it is essential to communally adhere to fair and reasonable boundaries and practices.
The extent of our response to violation of the Acceptable Use Policy will depend on it’s nature, degree, severity, and impact. We will also consider the work and costs required to correct the violation. In simple cases a violation may be innocent and rectified quickly with minimal costs. However, it important for clients and their users to understand that we may suspend, limit, terminate, delete, or take any other appropriate action with regard to the services, without any obligation to refund fees paid and without notice.
Clients and their users are solely responsible for the content they upload to their website. We do not regularly review or screen the content. However, we will access and review any stored content when responding to a legitimate third-party complaint or when we reasonably suspect breach of conduct.
Highlighted Policies
All the following activity is prohibited:
Using, posting, or publishing any material in violation of any law or regulation is prohibited. This includes anything pornographic, abusive, threatening, harmful or hateful.
Using our services to transmit bulk email including email marketing including any form of unsolicited bulk email (“spam”) through our servers.
Collecting email, phone, physical or mailing information without adequate disclosure and consent. Get legal advice about privacy and include privacy policies on your websites.
Decompiling, disassembling, reverse engineering, or otherwise attempting to discover source code of any programs, software, or data on the services.
Use of any technique that attempts to deceive, bypass, or manipulate the proper function of online search facilities, also known as “black hat”, conduct or activity.
Sharing usernames or allowing multiple users to access a restricted services using the same username. Auditing requires that individual users need individual usernames.
Installing or using prohibited or disallowed software, systems, networks, plugins, or modules.
Feedback and Collaboration
By its nature, the Acceptable Use Policy has been conceived on behalf of all stakeholders including ourselves, our suppliers, users, clients and society. We are open to suggestions. Email your specific suggestions to
le***@we******.au
. Your suggestion do not create an agreement and may not receive a reply.