AGILE SP ACCEPTABLE USE POLICY
At Agile Solutions Provider, we are committed to doing the right thing, and doing the right thing is at the very heart of our business operations. Our employees are expected to respect the rights of others, and we seek to work only with suppliers and partners equally committed to doing the right thing and who maintain high ethical standards.
This Acceptable Use Policy applies to all persons and entities (collectively, "customers") using the products and services of Agile Solutions Provider (Pty) Ltd.
The intend of this policy is to protect the security, integrity, reliability, and privacy of both the Agile Solutions Provider network and the products and services we offer to our customers.
Agile Solutions Provider reserves the right to modify this policy at any time, effective immediately upon posting of the modification.
Your use of Agile Solutions Provider’s products and services constitutes your acceptance of this Acceptable Use Policy in effect at the time of your use. Violations of this Policy and the Acceptable Use Policies of other providers can severely affect the provision of various services. Please report violations of this policy to email@example.com
We can’t control the data passing over our network, you are solely responsible for any and all acts and omissions that occur during or relating to your use of the service, and you agree not to engage in any unacceptable use of the service.
You undertake to use Agile Solutions Provider’s services in accordance with any restrictions imposed under the following South African legislations:
Electronic Communications and Transactions Act 25 of 2002
Electronic Communications Act 36 of 2005
Films and Publications Act 65 of 1996 (as amended)
Regulation of Interception and Provision of Communication-related Information Act 70 of 2003 This policy forms part of Agile Solutions Provider’s standard terms and conditions of service.
What we don’t allow
Unacceptable use includes, but is not limited to, any of the following:
Posting, transmission, re-transmission, or storing material on or through any of Agile Solutions Provider products or services, if in the sole judgment of Agile Solutions Provider such posting, transmission, re-transmission or storage is;
In violation of any law or regulation (including rights protected by copyright, trade secret, patent or other intellectual property or similar laws or regulations)
threatening or abusive
Each customer shall be responsible for determining what laws or regulations are applicable to his or her use of the products and services.
Installation or distribution of "pirated" or other software products that are not appropriately licensed for use by the customer.
Resale of Agile Solutions Provider’s products and services without the express prior written consent of Agile Solutions Provider (unless you are an authorized reseller).
Deceptive marketing practices.
Actions that restrict or inhibit anyone - whether a customer of Agile Solutions Provider or otherwise - in his or her use or enjoyment of Agile Solutions Provider’s products and services, or that generate excessive network traffic through the use of automated or manual routines that are not related to ordinary personal or business use of Internet services.
Introduction of malicious programs into the Agile Solutions Provider network or servers or other products and services of Agile Solutions Provider (e.g., viruses, trojan horses and worms).
Causing or attempting to cause security breaches or disruptions of Internet communications.
Executing any form of network monitoring that will intercept data not intended for the customer.
Circumventing user authentication or security of any host, network or account.
Interfering with or denying service to any user other than the customer's host (e.g., denial of service attack).
Sending unsolicited mail messages, including the sending of "junk mail" or other advertising material to individuals who did not specifically request such material, who were not previous customers of the customer or with whom the customer does not have an existing business relationship (e.g., E-mail "spam"); or distributing, advertising or promoting software or services that have the primary purpose of encouraging or facilitating unsolicited commercial E-mail or spam.