Legal Stuff
Talk legal to me.
Talk legal to me.
Customer
Reseller
For All
Visitors to our website
Online Conduct Policy
Last Reviewed : 23 April 2018
This Online Conduct Policy applies in addition to the terms of the Professional Services Agreement and is incorporated by reference into, and made a part of, the terms of the Professional Services Agreement. In the event of any inconsistency between the terms of the Professional Services Agreement and this Online Conduct Policy, the terms of this Online Conduct Policy shall prevail followed by the terms of the Professional Services Agreement.
All capitalised terms used in this Online Conduct Policy shall have the meaning set out in the Professional Services Agreement unless defined otherwise in this Online Conduct Policy.
By using or accessing the Services, Customers agree to be bound by the terms of this Online Conduct Policy. C2M reserves the right to amend this Online Conduct Policy from time to time and will notify Customers by posting a revised copy of the Online Conduct Policy on its website here
1. Use
The Customer shall not attempt to access any of C2M’s other systems, programs or data that are not made available for use in connection with the Services. The Customer shall be entitled to access and use only those modules and software applications of C2M that are expressly listed on an Order Form.
The Customer is responsible for all activities conducted under user logins and for user compliance with this Online Conduct Policy.
The Customer shall take all measures necessary to ensure compliance by all users authorised to access the Services under the terms of the Professional Services Agreement.
The Customer shall not impersonate another user or provide false identity information to gain access to or use of the Services.
2. Restrictions
The Customer shall not use or knowingly permit the use of any security testing tools in order to probe, scan or attempt to penetrate or ascertain the security of the Services.
The Customer shall not download, upload, publish, display or transmit via the Services any content that C2M reasonably believes: (i) constitutes child pornography or is otherwise obscene, sexually explicit or morally repugnant; (ii) is excessively violent, incites violence, threatens violence, or contains harassing content or hate speech; (iii) is unfair or deceptive under the consumer protection laws of any jurisdiction, including chain letters and pyramid schemes; (iv) is defamatory or violates a person’s privacy; (v) creates a risk to a person’s safety or health, creates a risk to public safety or health, compromises national security, or interferes with an investigation by law enforcement; (vi) improperly exposes trade secrets or other confidential or proprietary information of another person; (vii) is intended to assist others in defeating technical copyright protections; (viii) clearly infringes another person’s trade or service mark, patent, or other intellectual property right; (ix) promotes illegal drugs, violates export control laws, relates to illegal gambling, or illegal arms trafficking; (x) is discriminatory in any way, including by way of sex, race, or age discrimination; (xi) is otherwise illegal or solicits conduct that is illegal under laws applicable to C2M or the Customer; or (xii) is otherwise malicious, fraudulent, or may to result in retaliation against C2M by offended viewers.
The Customer shall not use the Services to: engage in illegal, abusive, or irresponsible behaviour, including: (i) unauthorised access to or use of data, services, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorisation of the owner of the system or network; (ii) monitoring data or traffic on any network or system without the authorisation of the owner of the system or network; (iii) interference with service to any user, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks; (iv) use of an Internet account or computer without the owner’s authorisation, including, but not limited to Internet scanning (tricking other people into releasing their passwords), password robbery, security hole scanning, and port scanning; (v) forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting; or (vi) any activity or conduct that is likely to result in retaliation against the Services.
The Customer will not: (i) distribute, publish, send, or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations (“spam”), including commercial advertising and informational announcements; (ii) Alter or obscure mail headers or assume a sender’s identity without the sender’s explicit permission; and (iii) Collect replies to messages sent from another internet service provider if those messages violate this Online Conduct Policy or the acceptable use policy of that provider.
3. Liability for Users
The Customer shall be liable for any breach of this Online Conduct Policy by any users of the Services. In addition to C2M’s other remedies hereunder, C2M reserves the right upon giving notice to the Customer to terminate any user’s right to access the Services if such user has breached any of the restrictions contained in this Online Conduct Policy.
4. Users
The Customer shall authorise access to and assign unique passwords to the number of users purchased by Customer. User logins are for designated users and cannot be shared or used by more than one user, but any user login may be reassigned to another user as needed. The Customer will be responsible for the confidentiality and use of user’s passwords. The Customer agrees to immediately notify C2M if a Customer becomes aware of any loss or theft or unauthorised use of any of Customer’s passwords or accounts, or any other known or suspected breach of security.
5. Monitoring of Content
C2M does not monitor, verify, warrant, or vouch for the accuracy or quality of the information that users may acquire over the Internet when using the Services. For this reason, users must exercise their best judgment in relying on information obtained from the Internet. Because the C2M does not monitor or censor the Internet, and will not attempt to do so, C2M cannot accept any responsibility for injury to its Customers or their users that results from inaccurate, unsuitable, offensive, or illegal Internet communications. C2M does not review, edit, censor, or take responsibility for any information its users may create on the Internet. While C2M does not control or monitor the content of online communications, C2M may block access to content that it deems to be in breach of this Online Conduct Policy or that it otherwise deems to be unlawful, harmful or offensive, in its reasonable discretion.
6. Monitoring of Emails
C2M will not intentionally monitor private electronic mail messages sent or received by Customers unless required to do so by law, governmental authority, or when public safety is at stake. C2M may, however, monitor its service electronically to determine that its facilities are operating satisfactorily. Use of the Services by Customers or users constitutes Customer’s and/or user’s authorisation to C2M to monitor the Services consistent with the foregoing sentence.
7. Disclosure of Content
C2M will cooperate with appropriate law enforcement agencies in investigating claims of illegal or inappropriate activity. C2M may disclose information, including but not limited to, information concerning a Customer or user, a transmission made using the Services, or a website, in order to comply with a court order, subpoena, summons, discovery request, warrant, statute, regulation, or governmental request. C2M assumes no obligation to inform the Customer or user that user-specific information has been provided to any person or entity. C2M may disclose user information or information transmitted via the Services where necessary to protect C2M and others from harm, or where such disclosure is necessary to the proper operation of the system.
8. Reduction in bandwidth
If a Customer overloads the network (for example by using peer to peer or file sharing software), C2M reserves the right to manage the Customer’s bandwidth (which could result in reduced service speeds).