fbpx
Skip to content

ACCEPTABLE USE POLICY (AUP)

This policy defines the actions that Approved Systems considers to be abusive or inappropriate and, thus, strictly prohibited. Evidence of these actions is grounds for suspension of services pending investigation by Approved Systems, and may result in the termination of the violating account(s). Under certain conditions, usage of accounts by methods not listed below may also be deemed abusive or inappropriate. Due to the nature of the Internet, all possible uses and subsequent actions cannot be listed. If you are not sure, call Approved Systems on 1300 139 257 or email abuse@approvedsystems.com.au.

This policy covers all services provided by Approved Systems, and is deemed to be part of the Terms and Conditions.

1.0 General Services

  1. E-mail
    1. SPAM Email:
      Clients are prohibited from sending unsolicited email messages to multiple recipients (commonly termed “spam”). Email may not be sent to individuals who do not wish to receive it. Clients may not use their account to accept replies from SPAM mail sent through other Service Providers.
    2. Malicious Email:
      Clients are prohibited from sending malicious mail bombing (flooding a user’s email box with a large volume of email), and the sending of harassing messages.
    3. Chain Letters:
      Clients are prohibited from forwarding chain letters.
      Since SPAM email, chain letters and malicious email abuse system resources and compromise the integrity of Approved Systems managed networks, Approved Systems reserves the right to charge users for improper use of email services. Approved Systems may charge up to $100.00 per unsolicited message sent from the Approved Systems network to any point on the Internet or connected networks.
    4. Header Information may not be forged.
      All email exiting the Approved Systems network must include a proper email header indicating the proper origin of the email. Approved Systems has the right to refuse email sent to or received by the Approved Systems network which includes a forged or otherwise false header.
    5. An Approved Systems SMTP gateway may not be used as a relay for emails originating from non Approved Systems controlled networks. Approved Systems restricts access to its SMTP servers to Approved Systems controlled networks. All unauthorised attempts to use Approved Systems’ SMTP gateway are recorded.
  2. Proxies and Web Browsing
    1. Approved Systems reserves the right to redirect HTTP requests to a proxy server so the proxy server can retrieve the requested URL.
      Use of the proxy servers is restricted to those clients within an Approved Systems controlled network.
  3. Shell Access
    1. Approved Systems reserves the right to remove Shell Access from a Client.
    2. Programs (perl/shell scripts, binaries) are not to be run without prior authorisation.
    3. The use of CGI and perl scripts is permitted for websites.
    4. Unless authorised, shell accounts may not run programs that provide network services, such as IRC or MUD servers.
    5. Use of Shell Access is restricted to connections from within a Approved Systems controlled network.
  4. Data storage and Distribution.
    1. Clients may not use Approved Systems storage facilities or communication services (including World Wide Web, Gopher, email, USENET or FTP) to store and/or distribute copyrighted software or documentation or other material, unless authorised to do so by the copyright owner. Approved Systems reserves the right to remove any data that violates these conditions.
    2. Approved Systems reserves the right to remove data from storage facilities as required to by law.

2.0 Residential Voice over IP (VoIP)

  1. Residential VoIP services must not be used for commercial or business use. Breach of this will result in immediate termination of the account.
  2. In order to prevent misuse, Approved Systems may automatically terminate calls if they exceed 60 minutes in one session/call without warning.
  3. Approved Systems reserves the right to discontinue or disconnect a customer’s VoIP service without notice if it breaches the Acceptable Use Policy (AUP).
  4. A national call means a standard national call where the person making the call is not making the call for any commercial purpose.
  5. A mobile call means a standard mobile call where the person making the call is not making the call for any commercial purpose.
  6. National calls exclude calls to:
    1. Operator assistance
    2. Directory assistance
    3. Telephone number that begins with a 19 prefix
    4. Numbers initiated by dialling an override code, for example 1456
    5. Mobile Phones
  7. In this paragraph, commercial purpose includes the following activities:
    1. Calls made for a business operated at home
    2. Running a telemarketing business or call centre
    3. Re-supplying or reselling the service
    4. Other similar activities
  8. Unlawful or Inappropriate Use: If Approved Systems determines that you have used our service for an unlawful or inappropriate purpose, we may disconnect or cancel your account without notice and provide supporting evidence to law enforcement agencies. If Approved Systems determines that the use or content does not conform to the requirements in this agreement or that it interferes with our ability to provide service to you or others, we may also disconnect or cancel your account without notice.
  9. Violation of laws of jurisdictions: If Approved Systems determines that you have used our service in violation of laws of jurisdictions outside of our service areas we reserve the right to cancel or disconnect your service and provide supporting evidence to law enforcement agencies.

3.0 Business Voice over IP (VoIP)

  1. Approved Systems reserves the right to discontinue or disconnect a customer’s Business VoIP service without notice, if it breaches the Acceptable Use Policy (AUP).
  2. A national call means a standard national call where the person making the call is not engaging in unreasonable use of the small to medium business offer.
  3. A mobile call means a standard mobile call where the person making the call is not engaging in unreasonable use of the small to medium business offer.
  4. National calls exclude calls to:
    1. Operator assistance
    2. Directory assistance
    3. Telephone number that begins with a 19 prefix
    4. Initiated by dialling an override code for example: 1456
  5. The free call offer applies to standard calls for the purpose of you making calls for business purposes, but not for the purposes of re-sale, re-supply or commercial exploitation.
  6. We consider your use of the service to be unreasonable if you make or receive calls on our network for any commercial or non-ordinary purpose.
  7. Non-ordinary purpose includes:
    1. Running a telemarketing business or call centre
    2. Using the service in connection with a device that switches or re-routes to or from our network or the network of any supplier
    3. Resupplying or reselling the service
    4. Wholesale any service
    5. Other activity which would not be reasonably regarded as ordinary business use
  8. Unlawful or Inappropriate Use: If Approved Systems determines that you have used our service for an unlawful or inappropriate purpose we may disconnect or cancel your account without notice and provide supporting evidence to law enforcement agencies. If Approved Systems determines that the use or content does not conform to the requirements in this agreement or that it interferes with our ability to provide service to you or others we may also disconnect or cancel your account without notice.
  9. Violation of laws of jurisdictions: If Approved Systems determines that you have used our service in violation of laws of jurisdictions outside of our service areas we reserve the right to cancel or disconnect your service and provide supporting evidence to law enforcement agencies.

4.0 System and Network Security

  1. Clients may not attempt to circumvent the security of any host, network or account on the Internet. This includes, but is not limited to accessing data not intended for the Client, entering a system the Client is not authorised to access, using ‘packet sniffers’ and similar programs to acquire account passwords, or probing the security of an Approved Systems network or other networks.
  2. Approved Systems reserves the right to remove any software which may aid in the violation of System Security.
  3. Clients are responsible for account password(s), and must choose a sufficiently secure password and must not give their password to anyone not directly associated with their company or organisation. Passwords should not consist of words found in a dictionary.
    Passwords should include a combination of numbers and letters, upper and lower case letters, and/or symbols.
    Passwords can be changed at any time on the Approved Systems website by the Client.
  4. Clients are responsible for all activity through their Internet connection. Clients should not allow easy access to their connection by leaving an unsupervised computer connected and unlocked, or saving account information and passwords in an area that is accessible to non-authorised users.
  5. All passwords stored on the Approved Systems network are encrypted. If a password is lost, a Client’s only recourse is to request a password change by calling Approved Systems on 1300 139 257. Password changes via telephone are subject to an identity check. For the security of the Client if any doubt of the caller’s identity exists, Approved Systems reserves the right to refuse the password change. In this instance the Client must submit a written, signed request by fax or post.
    All lost password changes for Clients that are businesses must fax or post a request on Company Letterhead from the person/s who started the account, or an authorised representative.
  6. Immediately upon being notified that a Client’s password has been lost or a Client’s account has been compromised, Approved Systems will change a Client’s password to protect system security.

5.0 Other Networks and Network Resources

  1. When connected to outside hosts or networks, through (s)FTP, Telnet/SSH, rlogin or a similar protocol, or when using resources of an outside host or network (through the WWW, gopher or similar protocol), the Client must obey the Acceptable Use Policies of such networks, in addition to complying with this Acceptable Policy.
  2. Clients must not partake in activities on other networks or through external network resources that could jeopardise the safety or security of Approved Systems managed networks.
  3. Clients must abide by the applicable State or country laws governing the host or network.

6.0 General Behaviour and Conduct

  1. Approved Systems reserves the right to disconnect or discontinue providing a customer any services without notice if it breaches the Acceptable Use Policy (AUP).
  2. Criminal activities, especially those in relation to Part 10.6 of The Criminal Code, will be reported.
  3. Clients must not transmit any menacing, abusive, or defamatory material.
  4. Clients must not engage in any menacing, abusive or defamatory behaviour towards our staff.
  5. Clients must not use their services in a way which makes it unsafe for others, or risks damage to property.
X