e IT s Acceptable Use Policy (AUP)
Effective Date: November 2023
- Introduction
This Acceptable Use Policy (the "Policy") sets out the rules for using the hosting services, networks, and any other related services (the "Services") provided by e IT s ("we", "us", "our"). This Policy forms an integral part of our
Terms and Conditions of Service
.
By accessing or using our Services, you confirm that you accept this Policy and agree to comply with it. If you are using our Services on behalf of an organisation, you are agreeing to this Policy for that organisation and promising that you have the authority to bind that organisation to this Policy.
- General Prohibition
You may not use our Services:
- For any unlawful, fraudulent, or malicious purpose or activity.
- To harm or attempt to harm minors in any way.
- In any way that breaches any applicable local, national, or international law or regulation.
- In a manner that is libellous, defamatory, threatening, harassing, invasive of privacy, or abusive.
- Specific Prohibited Activities
The following activities are expressly prohibited and constitute a material breach of this Policy:
3.1. System and Network Security
- Unauthorised Access & Hacking: Any activity that violates the Computer Misuse Act 1990, including but not limited to: accessing computers or networks without authority, attempting to probe, scan, or test the vulnerability of a system or network, or breaching security or authentication measures.
- Denial of Service (DoS/DDoS): Any activity intended to impose an unreasonably large load on our infrastructure or to overwhelm a target with traffic, including the execution of DoS or DDoS attacks.
- Malicious Software: Knowingly transmitting, uploading, or distributing any data that contains malware, viruses, Trojan horses, worms, time-bombs, keystroke loggers, spyware, adware, or any other harmful programs or code.
- Interception: Unauthorised monitoring of data or traffic on any network or system.
3.2. Content-Related Violations
- Illegal Content: Storing, transmitting, or distributing any material that is illegal under UK law. This includes, but is not limited to, copyrighted material without a valid licence (infringing the Copyright, Designs and Patents Act 1988), and material that is obscene or constitutes child sexual abuse material.
- Harmful and Offensive Content: Disseminating any material that is defamatory (under the Defamation Act 2013), threatening, grossly offensive, indecent, or menacing (as defined by Section 127 of the Communications Act 2003), or which constitutes a "malicious communication" under the Malicious Communications Act 1988.
- Fraudulent Content: Engaging in or facilitating phishing, pyramid schemes, or other fraudulent activities.
3.3. Communications Abuse
- Spam & Unsolicited Communications: Sending, receiving, or facilitating the transmission of any unsolicited advertising or promotional material (spam), in violation of the Privacy and Electronic Communications Regulations (PECR) 2003. This includes bulk email, mail bombs, and spam over instant messaging.
- Misrepresentation: Forging email headers or any part of a message to disguise its origin.
3.4. Resource Usage
- Excessive Consumption: Engaging in any activity that consumes excessive resources (CPU, memory, bandwidth, etc.) in a manner that is likely to impair the Services for other users.
- Unaised Scripts/Processes: Running any software that interfaces with an IRC (Internet Relay Chat) network or operating a standalone, unattended server-side process.
- User Responsibilities
- Account Security: You are responsible for maintaining the confidentiality of your password and account information and for all activities that occur under your account.
- Content Liability: You are solely responsible for the content you store on, transmit, or distribute via our Services.
- Compliance with Laws: You agree to comply with all applicable laws and regulations, including but not limited to the Data Protection Act 2018 (UK GDPR) in your use of the Services and your handling of personal data.
- Our Rights & Enforcement
- Right to Monitor: We reserve the right, but do not assume the obligation, to monitor your compliance with this Policy. We may investigate any suspected violation.
- Enforcement Actions: If we determine, in our sole discretion, that you have violated this Policy, we may take immediate action without prior notice. Such actions may include, but are not limited to:
- Issuing a warning.
- Suspending or terminating your access to the Services.
- Removing or disabling access to prohibited content.
- Reporting to Authorities: Where we identify activities that we believe are illegal, we will report such activities and the relevant user data to the appropriate law enforcement agencies, such as the National Crime Agency, the Police, or the Information Commissioner's Office (ICO), as required or permitted by UK law (e.g., the Investigatory Powers Act 2016).
- Our
Take Down Policy
is an integral part of this AUP
- Reporting Violations
If you become aware of any violation of this Policy by any person, please report it immediately to our abuse team. All reports must be sent to support@eits.dev and should include as much detail as possible to assist our investigation.
- Changes to this Policy
We may revise this Policy at any time by posting an updated version on our website. You are expected to check this page periodically for any changes. Your continued use of the Services after changes are posted constitutes your acceptance of the revised Policy.