The BTG MergeIT Acceptable Use Policy
This Acceptable Use Policy applies to all individual users (Users) within a BTG client organisation, as well as the organisation itself (You) employing BTG’s MergeIT Cloud Computing solutions (Services).
Violations of this Policy and the Acceptable Use Policies of other providers can severely affect the provision of various services. For example, spamming by Users can lead to Denial of Service attacks that disrupt not only the Services to You but also the use by others of services on the Internet. Compliance is therefore particularly important.
Breach of this Policy by a User that utilises any of the Services, via You, is considered to be a breach by You, as well as by the User, whether or not You had knowledge or gave consent. It is important that You ensure compliance with this Policy.
Indirect or attempted violations of the Policy by Users are considered to be violations of this Policy by You.
The Policy supplements, but does not supersede, any BTG Agreement for the Services. The requirements in this Policy are guidelines. They are not intended to be exhaustive.
While we do not monitor or control communications, if we become aware of a violation of this Policy, we may take such action as we consider appropriate including, in respect of You or a User, termination, suspension, blocking or filtering of sites and co operating with and notifying relevant authorities and parties including enforcement agencies and other Internet Service Providers and carriers (we may, for this purpose, need to communicate personal information to others).
We will inform your System Administrator and affected Users when we are investigating any problem or complaint. If we are legally required to disclose any of Your personal information, we will notify You of this requirement as far ahead of disclosure as is reasonably possible in the circumstances and will (at Your direction and expense) use our best endeavors to oppose the disclosure.
Users must inform us of all breaches by any person of which they are aware. They should do so by contacting 095801374 or their BTG Relationship Manager.
Changing the Acceptable Use Policy
We may change this Policy at any time by changing or removing existing requirements or adding new ones. Changes may take the form of a completely new Policy. We will tell You about any changes in advance of the changes taking effect and once adopted will by an email to Your System Administrator details.
By continuing to accept the provision of the Services by us after we have notified You of such changes, You are deemed to have accepted and agreed to comply with the terms of this Acceptable Use Policy as amended.
Users must not use Services in ways that constitute criminal or civil breaches of any statute, regulations, government requirements or any other law (including general or common law) of any country. Those breaches include, without limitation, breach of intellectual property rights (such as copyright, trade marks, patents, trade secrets and confidential information); defamation; breach of obscenity laws and laws as to objectionable publications, such as pornography and hateful materials; fraud; theft; misappropriation of money, credit card details or personal information; breaches of privacy obligations; and trade practices legislation, examples of which are the Fair Trading and Consumer Guarantees Acts (New Zealand) and the Trade Practices Act (Australia).
Security and Protection of the Network
Users must not use Services to breach, or attempt to breach, the security and operation of any network, equipment or any other system. This includes: hacking, cracking into, monitoring, or using systems without authority; scanning ports (including scanning for open relays); improper configuration of mail servers and FTP servers enabling distribution of spam and unlicensed material by others; interference of service to any User or network (or activities that might encourage such interference by others) including mail-bombing, flooding, deliberate attempts to overload a system and broadcast attacks; denial of service attacks or activities which might encourage denial of service attacks by others; unnecessarily excessive traffic (including excessive pings); distributing viruses, or other harmful material or software; any communications across the Services which do not accurately identify (or disclose in a manner that is misleading) addresses, headers, names and other relevant details; and using our network in any way as a staging ground for any of those breaches or to disable or “crack” other systems.
Users must not use Services in a way that breaches any material standard, code and content requirements produced by any relevant authority or industry body.
Users may not use Services to transmit content of a threatening nature including threats of death, physical harm and defamation.
Other Providers’ Policies
Users must not breach the Acceptable Use Policies (or similar guidelines and rules) of other Internet providers including ISPs and telecommunication carriers involved in providing services to us or You in relation to the Services.
Users must use Services in a responsible manner taking into account:
- the effect that use may have on networks, equipment and other parties.
- compliance with “netiquette“, newsgroup and Internet conventions (as well as restrictions in rules, charters, FAQs and similar Newsgroup, Website and email mailing list material).
- such use must not interfere with the availability of any of the Services to others (or any other services including services offered by us and other Internet providers and carriers to others).
- Users must take reasonable steps to prevent activities that enable denial of service attacks and other adverse interference with networks.