General Usage Guidelines
General Usage Guidelines
This is Linear G’s Acceptable Use Policy. It applies to you if you are an Linear G subscriber or customer (“You”). It is intended to ensure that your use of Linear G’s service is trouble free and that you have due regard to the law and the needs of other customers. Please read it carefully. It is a condition of your use of our service that you comply with the terms of this Policy. Please look out for any amendments to the Policy that Linear G (“We”) might make in the future. From time to time we will make amendments to it, and it is your responsibility to familiarise yourself with this Policy, which is accessible via the Linear G Web Site (linearg.com).
Section 1: General Principles
- 1.1 Linear G is not responsible for the content of customer originated traffic
- 1.1.1 We exercise no direct supervision or control whatsoever over the content of the information passing through our network.
- 1.1.2 We do not assume any responsibility for information not sent or authorised by us.
- 1.1.3 The responsibility for traffic that does not conform with this policy and all possible consequences lie with the sender(s) of the traffic.
- 1.2 You are responsible for use of your account
- 1.2.1 If your actions permit others to use our service, you are responsible for making users of the service aware of this policy and obtaining compliance of your users with this policy.
- 1.2.2 You are not to resell any of Linear G’s services without prior written permission from Linear G.
- 1.3 You are responsible for complying with the conditions of use of other networks
- 1.3.1 If we provide you with access to a network outside our service you must comply with any acceptable use conditions which apply to that networks.
Section 2: Acceptable Uses
- 2.1 You have responsibilities which include:
- 2.1.1 use our service and services in a manner which does not violate any applicable laws or regulations;
- 2.1.2 use our service and services in a manner which does not violate any applicable laws or regulations;
- 2.1.3 respect the legal protection afforded by copyright, trade marks, license rights and other laws to materials accessible via our service;
- 2.1.4 respect the privacy of others; use the service in a manner which does not interfere with or disrupt other network users, services or equipment; and Â
- 2.1.5 refrain from acts that waste resources or prevent other users from receiving the full benefit of our services.
- 2.2 Use must be ethical
- 2.2.1 Your use of our services should be ethical and in accordance with accepted community standards.
3 Unacceptable Uses
- 3.1 You must comply with the Law
- 3.1.1 It Is not acceptable to use our service for any purpose which violates local, State, Federal or international laws.
- 3.2 Specific kinds of use are not allowed
- 3.2.1 violate copyright or other intellectual property rights;
- 3.2.2 illegally store, use or distribute software; transmit threatening, obscene or offensive materials;
- 3.2.3 engage in electronic `stalking’ or other forms of harassment such as using abusive or aggressive language; misrepresent or defame others;commit fraud;
- 3.2.4 gain unauthorised access to any computing, information, or communications devices or resources, including but not limited to any machines accessible via the Internet;
- 3.2.5 damage, modify or destroy the files, data, passwords, devices or resources of Linear G, other users or third parties; engage in misleading or deceptive on-line marketing practices;
- 3.2.6 conduct any business or activity or solicit the performance of any activity that is prohibited by law;
- 3.2.7 make an unauthorised transmission of confidential information or material protected by trade secrets; or
- 3.2.8 gain unauthorised access a third parties personal files, e-mail or information.
- 3.2.9 attempt to do any of these things.
- 3.3 Disruption of the network is not allowed
- 3.3.1 distribute messages to inappropriate or unrelated forums, newsgroups or mailing lists (`spamming’);
- 3.3.2 send unsolicited commercial messages;
- 3.3.3 propagate computer worms, viruses and other types of malicious programs;
- 3.3.4 make transmissions of any type or quantity which adversely affect our operation or jeopardise the use of our service, or its performance for other customers; and
- 3.3.5 harass or impersonate Linear G’s staff or other users.
- 3.3.6 conduct any business or activity or solicit the performance of any activity that is prohibited by law;
- 3.3.7 make an unauthorised transmission of confidential information or material protected by trade secrets; or
- 3.3.8 gain unauthorised access a third parties personal files, e-mail or information.
- 3.3.9 attempt to do any of these things.
- 3.4 Soliciting subscribers to other services is not allowed
- 3.4.1 It is also not acceptable to use our service to solicit customers to become subscribers of other competitive information services.
- 3.5 Resale of our services is not allowed
- 3.5.1 Resale of our services to others is strictly forbidden unless prior written permission is given by Linear G.
Section 4: Ensuring The Policy Is Being Followed
- 4.1 We may monitor your account but will respect your privacy
- 4.1.1 If we have cause, we may monitor the conduct of your account to determine whether this policy is being followed. If we monitor the conduct of your account we will safeguard your privacy unless to do so would involve us in concealment of a criminal offence or inhibit the enforcement of this policy.
- 4.2 We will make an effort to contact you
- 4.2.1 If we become concerned that your use of our service may break the law or that you have3 not complied with this policy we will attempt to contact you before taking action;
- 4.3 We may terminate your account and/or notify the authorities
- 4.3.1 If we believe that you use of the service may break the law or that you have not complied with this policy we may: warn you by phone, mail or email.
- 4.3.2 suspend your access to the service;
- 4.3.3 terminate your account without notice; and/or
- 4.3.4 notify and provide relevant information to the authorities, as appears appropriate in the circumstances.
- 4.4.1 In the event of taking action under Section 4.3 we reserve the right to delete any or all of your information, material, software or other content stored on our system in our sole discretion.
- 4.5.1 We will re-establish services if resolution is achieved. If you do not repeatedly breach this policy, we do not regard an instance of conduct causing our intervention as dangerous or serious and the cause of our intervention is addressed and resolved, we will promptly re-establish your service.
Section 5: Acceptable Utilisation of Network Services
- 5.1 We reserve the right to charge additional fees or over utilisation ‘unrestricted’ or ‘unlimited’ services
- 5.1.1 If we have cause, we may monitor the average utilisation of your service(s) in any given billing period If this utilisation exceeds 70% for a given billing period we reserve the right to change an additional overuse fee in this billing period on the grounds of over-usage.
- 5.1.2 For example, if you have a 512 Kbit/s connection to us, In a given billing month (30 days) you could download 158.203 Gigabytes. If you exceeded 70% of this threshold (110.74 Gigabytes), you may be asked to pay over usage fees.