Sleek’s Acceptable Use Policy
SLEEK NETWORKS provides Hosting and IP Services. By using our Services, Customers agree to comply with the Acceptable Use Policies (“AUP”) outlined in this agreement at all times and also to indemnify SLEEK NETWORKS against any claims by third parties arising from violation of this Policy.
SLEEK NETWORKS reserves the right to make changes to this Acceptable Use Policy at any time, and any changes will be effective immediately upon posting our web site: www.sleek.net.
SLEEK NETWORKS’ Customers are responsible for regularly reviewing the Policy. Continued use of the Services following any changes shall constitute acceptance of the changes.
Please note that in this AUP “we”/“us”/“our/“SLEEK NETWORKS” denotes SLEEK NETWORKS Ltd, Company Number 5611125, Registered Office Unit 4, Angel Court, Leeds, LS3 1BS, UK and “you”/“your” denotes you the customer or your agent.
It is your responsibility to ensure your compliance with all the provisions of this AUP. If you have any comments or queries, or there is any provision that you do not understand, or if you need any further information regarding this AUP, please feel free to email us at firstname.lastname@example.org
- You must not use your SLEEK NETWORKS Hosting Solution for any illegal purpose.
- Your traffic over the Internet may traverse other networks, or use other services, which are not owned or operated by SLEEK NETWORKS. You must abide by the relevant acceptable use policies and other terms and conditions imposed by the operators of those networks and services.
- SLEEK NETWORKS may, at its sole discretion, run manual or automatic systems to determine compliance with this AUP (e.g. scanning for open mail relays or “smurf” amplifiers).
- You are required to accept email addressed to “postmaster” at any email domain we allocate to you or maintain on your behalf. For example, if you have the domain “example.co.uk”, then you should accept email addressed to email@example.com respectively. You will be deemed to have read any and all such postmaster-addressed email. SLEEK NETWORKS may take action on the basis of this assumption.
- You are required to accept email addressed to “abuse” at any email domain we allocate to you or maintain on your behalf. For example, if you have the domain “example.co.uk”, then you should accept email addressed to firstname.lastname@example.org respectively. This will allow us and other users to contact you directly regarding any possible breaches of this AUP. You will have been deemed to had read any and all such abuse-addressed email and taken suitable action upon it. SLEEK NETWORKS may take action on the basis of this assumption.
- Your usage of the Internet must conform to community standards.
- You must not run “scanning” software which accesses remote machines or networks, except with the explicit permission of the operators of those remote machines or networks.
- You must ensure that you do not further the sending of unsolicited bulk email or any other form of email or Usenet “abuse”. This applies to both material that originates on your system and also third party material that may pass through it.
- Your machine or network must not be configured in such a way that others can exploit it to disrupt the Internet. This includes but is not limited to ensuring that your network cannot be exploited as a “smurf amplifier”.
- We may filter your outgoing network traffic to prevent certain kinds of abuse. If so, we will document such filtering either by email to you or on a web page. Such filtering will be designed not to impact legitimate use of the service. Even where such filtering is in place, you remain responsible for keeping to the terms of this AUP.
- We reserve the right to restrict incoming or outgoing service in any way that we consider reasonable in order to counter denial of service attacks on a server.
- You must not run an “open mail relay”, that is, a machine which accepts mail from unauthorised or unknown senders and forwards it onward to a destination outside of your machine or network. If your machine performs mail relaying on an authorised basis, then it must record this mail passing through your system by means of an appropriate “Received:” line.
- As an exception to the ban on relaying, you may run an “anonymous” relay service provided that you monitor it in such a way as to detect unauthorised or excessive use. However, you must not relay traffic from such an anonymous system via SLEEK NETWORKS’s servers, i.e. you can only pass email from such a system to SLEEK NETWORKS where this is the correct destination for final delivery.
It is not possible to quantify exactly what constitutes “acceptable use” and “unacceptable use” or abuse of the Internet. These terms depend upon the many informal understandings which have arisen between the administrators, owners and operators of the computers and networks that together constitute the Internet, and of which SLEEK NETWORKS is only one participant among many.
We do not intend to actively screen, review, censor, edit or take responsibility for the activities or content of our customers. However, SLEEK NETWORKS’ relationship with other networks, and ultimately its connectivity to the rest of the Internet, depends largely upon proper behaviour by its customers. SLEEK NETWORKS cannot tolerate any behaviour by customers which negatively impacts upon its own equipment or network, or upon the use by other Users, or which damages SLEEK NETWORKS’ standing and reputation in the wider Internet community.
Therefore, it is important that when activity that might constitute abuse occurs SLEEK NETWORKS takes appropriate action – if it did not, and such abuse was permitted to continue SLEEK NETWORKS would lose the confidence of the wider Internet community, which in turn would significantly impair SLEEK NETWORKS’ customers’ freedom to use the Internet.
This AUP and its day-to-day application by SLEEK NETWORKS are a result of SLEEK NETWORKS’ consideration of both the formal and informal practices of the Internet community.
This AUP is intended to assist customers in understanding the types of issues that can arise and what SLEEK NETWORKS will consider to be unacceptable behaviour that does not conform to community standards. This AUP is not an exhaustive list and some behaviour may still be unacceptable even if it does not exactly match some point within this AUP.
We will investigate suspected or alleged breaches of this AUP and in doing so we will endeavour to act reasonably and fairly at all times. If you are found to have breached this AUP, we reserve the right in our sole discretion to take whatever measures we deem appropriate and proportionate to the breach. These measures may include a formal warning, suspending or terminating one or more of your SLEEK NETWORKS accounts, making an additional charge for our reasonable costs of investigating and dealing with the misuse, and/or blocking access to any relevant component(s) of our service to you. If we take such action then we may partially or fully restore your service, at our sole discretion, when the reason for our action has been addressed to our satisfaction; this may require a formal written undertaking from you not to commit any future “abuse”. All cases are, however, considered individually upon their merits.
Without limitation, you expressly authorise us to use your personal data and other account information in connection with any such investigation, including by disclosing it to any third party whom we consider has a legitimate interest in any such investigation or its outcome and a reasonable need to receive the data in question.
There are many forms of email abuse. This AUP discusses the more common forms in an informal manner, but is by no means an exhaustive list. Due to the practical problems caused by “spamming” SLEEK NETWORKS wishes to make it clear that it considers the sending of bulk unsolicited email, of any kind, to be unacceptable behaviour. SLEEK NETWORKS will always act when such behaviour is brought to its notice. Education, in the form of an email warning, can be the most appropriate response to a first offence, since customers can be unaware of contemporary standards. However, it is SLEEK NETWORKS’ policy to terminate the accounts of any customer who continues to send bulk unsolicited email.
Network and Other Abuse
Using SLEEK NETWORKS Hosting Services in any way that adversely affects other SLEEK NETWORKS customers is strictly prohibited and will result in service suspension and termination. This includes but is not limited to:
- Gaining or attempting to gain unauthorized access to servers or services. Such attempts include “Internet scamming” (tricking other people into releasing their passwords), password robbery, security hole scanning, port scanning, probing, monitoring or testing for system or network vulnerabilities.
- Introducing viruses, Trojan horses, trap doors, back doors, Easter eggs, worms, time bombs, packet bombs, cancel bots or other computer programming routines that are intended to damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or personal information.
- Intentionally omitting, deleting, forging or misrepresenting transmission information, including headers, return addressing information and IP addresses. Using IP addresses which were not assigned to them by SLEEK NETWORKS.
Accounts may be terminated that include content or which have links to content that:
- Is unlawful or is considered offensive by the web community. Promotes injury or physical harm against any group or individual.
- Promotes or teaches illegal activities.
- Exploits or depicts children in a negative/sexual way.
- Infringes on copyright, patents, trademarks, trade secrets, or other intellectual property including pirated computer programs, cracker utilities, warez and software serial numbers or registration codes.
- Violates any law, statute, ordinance or regulation governing the Customer’s business or activities, including without limitation the laws and regulations governing export control, unfair competition, false advertising, consumer protection, issuance or sale of securities, trade in firearms, privacy, data transfer and telecommunications.