SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Telkom Internet Acceptable Use Policy
Version Date: 19 April 2013

Important Note: This Acceptable Use Policy (“AUP”) will
be updated frequently. Please make a habit of reviewing it
from time to time to stay abreast of the content thereof.
This document has been created by Telkom SA Ltd and is
protected by copyright. The contents or any part thereof
may not be used or copied in any way without prior permission.

ference. Our belief in free speech is a firm commitment to
our customers. However, certain activities are considered
inappropriate by the internet community at large and
cannot be permitted under the guise of free speech.
Save as may be set out herein, we do not monitor the
activity of accounts, except for measurements of system
utilization and billing records. However, in our efforts to
promote good citizenship within the Internet community,
if we become aware of inappropriate use of our service,
we will respond appropriately.

CONTENTS
1	Introduction

If a Telkom Internet account is used in a manner which
violates this AUP, we reserve the right to terminate the
service without notice. Our preferred course of action is
to advise you of the inappropriate behaviour and any
corrective action that is necessary. However, certain
circumstances may warrant immediate termination of the
Telkom Internet service without notice.

2	

Protecting Your Account

3	

Account and Network Security

4	

Electronic Mail

5	

Protection of Network Performance

6	

Personal Home Pages

7	

Third Party Internet Relay Chat (IRC)

8	

Illegal Activities

9	

Fair usage policy

Reports of activity in violation of this policy may be sent
via e-mail to abuse@telkomsa.net.

10	

Breach of the Acceptable Use Policy

2	

As a member of our network community, we encourage
you to use your internet access responsibly. Should you
have any questions regarding this policy, feel free to contact us at 10210.

11	General

Protecting Your Account

It is your responsibility to keep your password secure and
not to share your password and account access with anyone. Attempting to obtain another user’s account information is strictly prohibited, and may result in termination
of service.

1	Introduction
This document sets out general issues related to the
Telkom Internet service and contains the Telkom Internet
Acceptable Use Policy (AUP).

3	

Account and Network Security

It is also your responsibility to implement security measures, including but not limited to the following

Your Telkom Internet account provides you access to a vast
collection of networks around the world via the World Wide
Web, electronic mail, and File Transfer Protocol (FTP). Your
use of these services is subject to the AUP.

•	
changing your internet account password regularly;
•	
changing your router default password regularly;
•	
installing licensed internet security software,
which includes, but are not limited to protection against

It is our intention to allow Telkom customers access to everything the internet has to offer, with minimal or no inter1
internet threats such as viruses, malicious software, spyware, hacking attempts, etcetera; and

from you, you must not send that person any further
messages; and

•	

•	
Telkom Internet accounts may not be used to
collect replies to messages sent from another ISP, where
those messages violate this AUP or the AUP of the other
ISP. Telkom reserves the right to delete messages or files
which have remained on its servers for excessive periods
of time as determined by Telkom, in its sole discretion.

monitoring your internet account for irregularities.

You may not:
•	
attempt to circumvent the user authentication
or security of any host, network or account (“cracking”).
This includes, but is not limited to, accessing making use
of a server or account you are not expressly authorized to
access, or probing the security of other networks;

5	

Telkom reserves sole discretion to determine whether any
customer’s use of the Telkom Internet service interferes
with other customers’ use and enjoyment of any services
provided by Telkom to customers over the same network.

•	
use or distribute tools designed for compromising security. Examples of these tools include, but are not
limited to, password guessing programs, cracking tools or
network probing tools; or

The following examples are non-exclusive and are provided for guidance to customers:

•	
attempt to interfere with service to any user, host,
or network (“denial of service attacks”). This includes,
but is not limited to “flooding” of networks, deliberate
attempts to overload a service, and attempts to “crash” a
host.

4	

Protection of Network Performance

•	
the sending of excessive numbers of e-mail or
excessively large files which, in Telkom’s sole opinion,
negatively affects the performance of the network or
any server on the network may result in deletion of the
offending message or file, and may result in the termination of services;

Electronic Mail

Your account with Telkom Internet includes the ability to
send and receive electronic mail. Misuse of e-mail may result in termination of service. The following examples are
non-exclusive and are provided for guidance to customers:

•	
you may not provide network services from your
account (for example, you may not use your account to
operate as an FTP server);

•	
use of an e-mail account to send an unsolicited
bulk or commercial message is prohibited on your Telkom Internet account. This includes, but is not limited
to, bulk-mailing of commercial advertising, informational
announcements, charity requests, petitions for signatures,
and political or religious tracts. Such material may only be
sent to those who have explicitly requested it;

•	
Telkom Internet accounts operate on shared
resources. You are prohibited from excessive consumption of resources, including central processing unit time,
memory, disk space and session time. You may not use
resource-intensive programs which negatively impact
other customers or the performance of Telkom systems
or networks. Telkom reserves the right to terminate or
limit such activities; and

•	
sending mass unsolicited mail or deliberately sending very large messages or files to one or more recipients
(“mail bombing”) is prohibited;
•	
forging or removing e-mail headers is prohibited;

•	
you may not employ automated electronic or
mechanical processes designed to defeat network inactivity time-outs. Such tools include, but are not limited
to, repetitive pinging the host.

•	
use of e-mail to harass or intimidate other users
is prohibited. Harassment, whether through language,
frequency of messages, or size of messages, is prohibited.
Sending a single unwelcome message may be considered
harassment. If a recipient asks to stop receiving e-mail

6	

Personal Home Pages

Your Telkom Internet account provides the option to
purchase personal home page space. Telkom Internet
2
will routinely monitor the size your personal web page
and may, from time to time, monitor the contents of your
personal web page.

literary, artistic, political or scientific value;
•	
materials that hold Telkom (including its affiliates,
employees or shareholders) up to public scorn or ridicule,
or which unreasonably criticize Telkom, its employees or
its products; and

You are solely responsible for any information contained on
your personal home page. However, if complaints are received regarding language, content or graphics contained
on a customer’s personal home page, Telkom Internet
may, at its sole discretion, remove the personal home page
and / or terminate your personal home page service.

•	
materials which encourage the commission of a
crime, or which tends to incite violence, or which tends to
degrade any person or group based on sex, nationality,
religion, colour, age, marital status, sexual orientation,
disability or political affiliation.

You may not use your personal home page to publish material which Telkom determines, at its sole discretion, to be
unlawful, indecent or objectionable.

7	

Third Party Internet Relay Chat (IRC)

Although Telkom may offer IRC software, you may not:

•	
For purposes of this AUP, “material” refers to all
forms of communications including narrative descriptions,
graphics (including photographs, illustrations, images,
drawings, logos), executable programs, video recordings,
and audio recordings.

•	
use IRC scripts or programs that interfere with or
deny service to other users on any other server or host; or
•	
engage in activities that harass other users. This
includes, but is not limited to, “flooding” (rapidly entering
text with the intent to disrupt service), “flashing” (disrupting terminal emulation), “takeovers” (improper seizing
and abuse of operator privileges), attempting to send private messages to those who do not wish to receive them,
attempting to return to a channel after being banned
from it, and other disruptive behaviours.

•	
“Unlawful content” is that which violates any law,
statute, treaty, regulation, or lawful order. This includes,
but is not limited to obscene material, defamatory, fraudulent or deceptive statements, threatening, intimidating
or harassing statements, or material which violates the
privacy rights or property rights of others (e.g. copyright or
trademarks).

You may run clones (multiple simultaneous IRC connections) and robots only as permitted by the host IRC server.

•	
“Indecent content” is that which depicts sexual or
excretory activities in a patently offensive matter as measured by contemporary community standards.

8	

•	
“Objectionable content” is otherwise legal content with which Telkom concludes, in its sole discretion, it
does not want to be associated with in order to protect its
reputation and brand image, or to protect its employees,
shareholders and affiliates.

Illegal Activities

Any activity on Telkom’s network that is a violation of any
law, regulation or this policy, as such may be in force from
time to time, may result in immediate termination of
service without notice to you.
It is also your responsibility to ensure that you are aware,
stay aware of, and shall at all times comply with, all statutory or other regulatory provisions and rules applicable
to the provision and use of the Telkom Internet service
as amended from time to time, including but not limited
to the provisions of the Electronic Communications and
Transactions Act 25 of 2002, the Films and Publications
Act 65 of 1996 and the Regulation of Interception of
Communications and Provision of Communication-Related Information Act 70 of 2002.

Examples of prohibited personal home page content
include:
•	
materials that depict or describe scantily-clad and
lewdly depicted male and/or female forms or body parts,
and which lack serious literary, artistic, political or scientific
value;
•	
materials that suggest or depict obscene, indecent,
vulgar, lewd or erotic behaviour, and which lack serious
3

Prohibited activities include, but are not limited to:
•	
transmitting obscene materials, including child
pornography or any material regarded as illegal;

mance, Telkom will provide to the customer such information as is practically available regarding the customer’s
usage status by way of a usage tracker tool. A customer
will be able to track when his or her usage is dangerously
high. Once usage is indicated as being dangerously high,
Telkom reserves the right to suspend the relevant customer’s usage within 24 (twenty four) hours of usage having
reached such levels. Customers who are restricted by Telkom in the aforementioned manner in a calendar month
will be returned to full service profile at the beginning of
the next month.
The above controls will be implemented by Telkom in
addition to those set out elsewhere in this AUP regarding
unlawful behaviour.

•	
intentionally spreading or threatening to spread
computer viruses;
•	
gaining or attempting to gain unauthorized access
to private networks including Telkom’s private network
infrastructure;
•	
accessing or attempting to access information not
intended for the customer;
•	

engaging in the transmission of pirated software;

10	

•	
conducting or participating in illegal gambling,
soliciting for illegal pyramid and other schemes through
electronic mail; or

In general, if you use your Telkom Internet account in a
manner which:

•	
any other activities declared to be illegal in terms
of any applicable law.

9	

•	
violates rules, regulations and policies applicable
to any network, server, computer database, website or
Internet Service Provider (“ISP”) that you access through
your internet account;

Telkom Internet Uncapped Fair Usage Policy

Telkom Internet uncapped accounts are designed for either
home or business use, and customers need to select the
appropriate package designed for their access port speed
and type of usage application (for example, for business or
home use).
Telkom Internet uncapped products are not capped in the
ordinary course. However, Telkom reserves the right to apply restrictions on an uncapped account if a customer’s behaviour is determined to be affecting the user experience
of other customers on Telkom’s network. Such restrictions
may include but are not limited to throttling a customer’s
throughput speeds to an appropriate proportion of the
actual port speed and / or shaping a customer’s bandwidth
to limit the use of bandwidth intensive protocols and applications.
Examples of customer behaviour which may compromise
Telkom’s network performance include, for example, causing network congestion, include running excessive concurrent internet sessions or accessing excessive bandwidth
intensive protocols such as peer-to-peer.
In the event of such behaviours, Telkom reserves the right
to terminate the account of a customer whose usage is
continuously affecting Telkom’s network performance, as a
customer of Telkom Internet uncapped products.
In order to assist a customer to be made aware of when his
or her behaviour is compromising Telkom’s network perfor-

Breach of the Acceptable Use Policy

•	

violates any law, regulation, treaty or tariff,

•	
is defamatory, fraudulent, indecent, offensive,
deceptive; or threatens, harasses, abuses or intimidates
others;
•	
damages the name or reputation of Telkom, its
holding company, affiliates and subsidiaries;
•	
interferes with other customers’ use and enjoyment of the services provided by Telkom; or
•	
or

breaches the security on any computer network;

•	
you;

to access an account which does not belong to

it will be regarded as a breach of this AUP.

4

In the event of breaches of this AUP, Telkom will, where
circumstances allow, provide notice of the breach to the
relevant user with a request to remedy same immediately, failing which the relevant customer’s account may be
terminated. However, where the circumstances warrant
it, Telkom may terminate a customer’s account without
notice.
In addition to the above, users who violate systems or network security may incur criminal or civil liability. Telkom will
co-operate fully with investigations of violations of systems
or network security at other sites, including co-operating
with law enforcement authorities in the investigation of
suspected criminal violations.

11	General
Telkom’s failure to enforce this policy, for whatever reason,
shall not be construed as a waiver of Telkom’s right to do
so at any time.
Telkom reserves the right to amend the AUP from time to
time.

5

Weitere ähnliche Inhalte

Was ist angesagt?

Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality reportJonan Momo
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportAbdul Rehman
 
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓNPOLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓNLuis Antonio Bustillos López
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-finalAldrin SuperGo
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
An Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAn Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAnuj Khandelwal
 
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012armaexen
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-wowwFloroRaphaell
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-wowwFloroRaphaell
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillTeeth Maestro
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in PakistanAyesha Majid
 
Cyber law
Cyber law Cyber law
Cyber law Arshad_A
 

Was ist angesagt? (19)

part 3 cyber crimes
part 3 cyber crimes part 3 cyber crimes
part 3 cyber crimes
 
PART 2 TYPES OF CYBER CRIMES
PART 2 TYPES OF CYBER CRIMESPART 2 TYPES OF CYBER CRIMES
PART 2 TYPES OF CYBER CRIMES
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 Report
 
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓNPOLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
 
Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
 
Vipul pdf
Vipul pdfVipul pdf
Vipul pdf
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
An Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAn Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a Newbie
 
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime Bill
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
Shilpa
ShilpaShilpa
Shilpa
 
Cyber law
Cyber law Cyber law
Cyber law
 

Ähnlich wie Telkom Internet Acceptable Use Policy AUP

Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policygfair3
 
Acceptable Use Policy.docx
Acceptable Use Policy.docxAcceptable Use Policy.docx
Acceptable Use Policy.docxSALU18
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)Wissam Abdel Baki
 
Cyber Defense Team's Security Policy
Cyber Defense Team's Security PolicyCyber Defense Team's Security Policy
Cyber Defense Team's Security PolicyKunal Sharma
 
Back to school - CYBER SAFETY
Back to school - CYBER SAFETYBack to school - CYBER SAFETY
Back to school - CYBER SAFETYSairam
 
Topic 12 issues and trends in ed tech
Topic 12 issues and trends in ed techTopic 12 issues and trends in ed tech
Topic 12 issues and trends in ed techNFifa
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxprtabal_25
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessImran Khan
 
Terms and conditions
Terms and conditionsTerms and conditions
Terms and conditionsTom Marshall
 
Google transparency and the challenges of content control (E Rosati)
Google transparency and the challenges of content control (E Rosati)Google transparency and the challenges of content control (E Rosati)
Google transparency and the challenges of content control (E Rosati)Eleonora Rosati
 

Ähnlich wie Telkom Internet Acceptable Use Policy AUP (20)

Web Technologies.pptx
Web Technologies.pptxWeb Technologies.pptx
Web Technologies.pptx
 
Web Technologies.pptx
Web Technologies.pptxWeb Technologies.pptx
Web Technologies.pptx
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Computer Basics in the Work Place
Computer Basics in the Work PlaceComputer Basics in the Work Place
Computer Basics in the Work Place
 
Acceptable Use Policy.docx
Acceptable Use Policy.docxAcceptable Use Policy.docx
Acceptable Use Policy.docx
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)
 
Cyber Defense Team's Security Policy
Cyber Defense Team's Security PolicyCyber Defense Team's Security Policy
Cyber Defense Team's Security Policy
 
Back to school - CYBER SAFETY
Back to school - CYBER SAFETYBack to school - CYBER SAFETY
Back to school - CYBER SAFETY
 
Topic 12 issues and trends in ed tech
Topic 12 issues and trends in ed techTopic 12 issues and trends in ed tech
Topic 12 issues and trends in ed tech
 
Internet Policy
Internet PolicyInternet Policy
Internet Policy
 
Welcome pc
Welcome pcWelcome pc
Welcome pc
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awareness
 
Terms and conditions
Terms and conditionsTerms and conditions
Terms and conditions
 
Google transparency and the challenges of content control (E Rosati)
Google transparency and the challenges of content control (E Rosati)Google transparency and the challenges of content control (E Rosati)
Google transparency and the challenges of content control (E Rosati)
 
PC Pal
PC PalPC Pal
PC Pal
 
PC Pal
PC PalPC Pal
PC Pal
 
Electrnic mail
Electrnic mailElectrnic mail
Electrnic mail
 

Mehr von Fanus van Straten

Critical water shortages disaster plan summary
Critical water shortages disaster plan summaryCritical water shortages disaster plan summary
Critical water shortages disaster plan summaryFanus van Straten
 
Zinandi Agreement For Service
Zinandi Agreement For ServiceZinandi Agreement For Service
Zinandi Agreement For ServiceFanus van Straten
 
Zinandi Agreement For Service
Zinandi Agreement For ServiceZinandi Agreement For Service
Zinandi Agreement For ServiceFanus van Straten
 
African horse sickness diagnosis - Cape Town, South Africa
African horse sickness diagnosis - Cape Town, South AfricaAfrican horse sickness diagnosis - Cape Town, South Africa
African horse sickness diagnosis - Cape Town, South AfricaFanus van Straten
 
How To Design a Memorable Brand That Catches On
How To Design a Memorable Brand That Catches OnHow To Design a Memorable Brand That Catches On
How To Design a Memorable Brand That Catches OnFanus van Straten
 
Position Statement on the Use of Dominance Theory in Behavior Modification of...
Position Statement on the Use of Dominance Theory in Behavior Modification of...Position Statement on the Use of Dominance Theory in Behavior Modification of...
Position Statement on the Use of Dominance Theory in Behavior Modification of...Fanus van Straten
 
Fanus van Straten CV / Resume
Fanus van Straten CV / ResumeFanus van Straten CV / Resume
Fanus van Straten CV / ResumeFanus van Straten
 
The A to Z of Adobe Illustrator – design & illustration
The A to Z of Adobe Illustrator – design & illustrationThe A to Z of Adobe Illustrator – design & illustration
The A to Z of Adobe Illustrator – design & illustrationFanus van Straten
 
Periodic table guide to seo - Search Engine Land
Periodic table guide to seo - Search Engine LandPeriodic table guide to seo - Search Engine Land
Periodic table guide to seo - Search Engine LandFanus van Straten
 
Adobe Illustrator CS5 Keyboard Shortcuts
Adobe Illustrator CS5 Keyboard Shortcuts Adobe Illustrator CS5 Keyboard Shortcuts
Adobe Illustrator CS5 Keyboard Shortcuts Fanus van Straten
 
Windows 8.1 Preview Product Guide
Windows 8.1 Preview Product GuideWindows 8.1 Preview Product Guide
Windows 8.1 Preview Product GuideFanus van Straten
 
Portable massage tables, beds & accessories - Cape Town
Portable massage tables, beds & accessories - Cape TownPortable massage tables, beds & accessories - Cape Town
Portable massage tables, beds & accessories - Cape TownFanus van Straten
 
Recreate Original McDonald’s Menu Items at Home
Recreate Original McDonald’s Menu Items at HomeRecreate Original McDonald’s Menu Items at Home
Recreate Original McDonald’s Menu Items at HomeFanus van Straten
 
Lekker Outydse Afrikaanse Resepte
Lekker Outydse Afrikaanse ResepteLekker Outydse Afrikaanse Resepte
Lekker Outydse Afrikaanse ResepteFanus van Straten
 

Mehr von Fanus van Straten (20)

AMSHeR Progress Report
AMSHeR Progress ReportAMSHeR Progress Report
AMSHeR Progress Report
 
Critical water shortages disaster plan summary
Critical water shortages disaster plan summaryCritical water shortages disaster plan summary
Critical water shortages disaster plan summary
 
Cryodesalination
CryodesalinationCryodesalination
Cryodesalination
 
Video Arts Essentials
Video Arts EssentialsVideo Arts Essentials
Video Arts Essentials
 
Zinandi Agreement For Service
Zinandi Agreement For ServiceZinandi Agreement For Service
Zinandi Agreement For Service
 
Zinandi Agreement For Service
Zinandi Agreement For ServiceZinandi Agreement For Service
Zinandi Agreement For Service
 
African horse sickness diagnosis - Cape Town, South Africa
African horse sickness diagnosis - Cape Town, South AfricaAfrican horse sickness diagnosis - Cape Town, South Africa
African horse sickness diagnosis - Cape Town, South Africa
 
How To Design a Memorable Brand That Catches On
How To Design a Memorable Brand That Catches OnHow To Design a Memorable Brand That Catches On
How To Design a Memorable Brand That Catches On
 
Position Statement on the Use of Dominance Theory in Behavior Modification of...
Position Statement on the Use of Dominance Theory in Behavior Modification of...Position Statement on the Use of Dominance Theory in Behavior Modification of...
Position Statement on the Use of Dominance Theory in Behavior Modification of...
 
EBA Corporate Proposal
EBA Corporate ProposalEBA Corporate Proposal
EBA Corporate Proposal
 
Fanus van Straten CV / Resume
Fanus van Straten CV / ResumeFanus van Straten CV / Resume
Fanus van Straten CV / Resume
 
The A to Z of Adobe Illustrator – design & illustration
The A to Z of Adobe Illustrator – design & illustrationThe A to Z of Adobe Illustrator – design & illustration
The A to Z of Adobe Illustrator – design & illustration
 
Periodic table guide to seo - Search Engine Land
Periodic table guide to seo - Search Engine LandPeriodic table guide to seo - Search Engine Land
Periodic table guide to seo - Search Engine Land
 
Adobe Illustrator CS5 Keyboard Shortcuts
Adobe Illustrator CS5 Keyboard Shortcuts Adobe Illustrator CS5 Keyboard Shortcuts
Adobe Illustrator CS5 Keyboard Shortcuts
 
Windows 8.1 Preview Product Guide
Windows 8.1 Preview Product GuideWindows 8.1 Preview Product Guide
Windows 8.1 Preview Product Guide
 
Design Patterns - GOF
Design Patterns - GOFDesign Patterns - GOF
Design Patterns - GOF
 
Portable massage tables, beds & accessories - Cape Town
Portable massage tables, beds & accessories - Cape TownPortable massage tables, beds & accessories - Cape Town
Portable massage tables, beds & accessories - Cape Town
 
Recreate Original McDonald’s Menu Items at Home
Recreate Original McDonald’s Menu Items at HomeRecreate Original McDonald’s Menu Items at Home
Recreate Original McDonald’s Menu Items at Home
 
Begin jou eie besigheid
Begin jou eie besigheidBegin jou eie besigheid
Begin jou eie besigheid
 
Lekker Outydse Afrikaanse Resepte
Lekker Outydse Afrikaanse ResepteLekker Outydse Afrikaanse Resepte
Lekker Outydse Afrikaanse Resepte
 

Kürzlich hochgeladen

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Kürzlich hochgeladen (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Telkom Internet Acceptable Use Policy AUP

  • 1. Telkom Internet Acceptable Use Policy Version Date: 19 April 2013 Important Note: This Acceptable Use Policy (“AUP”) will be updated frequently. Please make a habit of reviewing it from time to time to stay abreast of the content thereof. This document has been created by Telkom SA Ltd and is protected by copyright. The contents or any part thereof may not be used or copied in any way without prior permission. ference. Our belief in free speech is a firm commitment to our customers. However, certain activities are considered inappropriate by the internet community at large and cannot be permitted under the guise of free speech. Save as may be set out herein, we do not monitor the activity of accounts, except for measurements of system utilization and billing records. However, in our efforts to promote good citizenship within the Internet community, if we become aware of inappropriate use of our service, we will respond appropriately. CONTENTS 1 Introduction If a Telkom Internet account is used in a manner which violates this AUP, we reserve the right to terminate the service without notice. Our preferred course of action is to advise you of the inappropriate behaviour and any corrective action that is necessary. However, certain circumstances may warrant immediate termination of the Telkom Internet service without notice. 2 Protecting Your Account 3 Account and Network Security 4 Electronic Mail 5 Protection of Network Performance 6 Personal Home Pages 7 Third Party Internet Relay Chat (IRC) 8 Illegal Activities 9 Fair usage policy Reports of activity in violation of this policy may be sent via e-mail to abuse@telkomsa.net. 10 Breach of the Acceptable Use Policy 2 As a member of our network community, we encourage you to use your internet access responsibly. Should you have any questions regarding this policy, feel free to contact us at 10210. 11 General Protecting Your Account It is your responsibility to keep your password secure and not to share your password and account access with anyone. Attempting to obtain another user’s account information is strictly prohibited, and may result in termination of service. 1 Introduction This document sets out general issues related to the Telkom Internet service and contains the Telkom Internet Acceptable Use Policy (AUP). 3 Account and Network Security It is also your responsibility to implement security measures, including but not limited to the following Your Telkom Internet account provides you access to a vast collection of networks around the world via the World Wide Web, electronic mail, and File Transfer Protocol (FTP). Your use of these services is subject to the AUP. • changing your internet account password regularly; • changing your router default password regularly; • installing licensed internet security software, which includes, but are not limited to protection against It is our intention to allow Telkom customers access to everything the internet has to offer, with minimal or no inter1
  • 2. internet threats such as viruses, malicious software, spyware, hacking attempts, etcetera; and from you, you must not send that person any further messages; and • • Telkom Internet accounts may not be used to collect replies to messages sent from another ISP, where those messages violate this AUP or the AUP of the other ISP. Telkom reserves the right to delete messages or files which have remained on its servers for excessive periods of time as determined by Telkom, in its sole discretion. monitoring your internet account for irregularities. You may not: • attempt to circumvent the user authentication or security of any host, network or account (“cracking”). This includes, but is not limited to, accessing making use of a server or account you are not expressly authorized to access, or probing the security of other networks; 5 Telkom reserves sole discretion to determine whether any customer’s use of the Telkom Internet service interferes with other customers’ use and enjoyment of any services provided by Telkom to customers over the same network. • use or distribute tools designed for compromising security. Examples of these tools include, but are not limited to, password guessing programs, cracking tools or network probing tools; or The following examples are non-exclusive and are provided for guidance to customers: • attempt to interfere with service to any user, host, or network (“denial of service attacks”). This includes, but is not limited to “flooding” of networks, deliberate attempts to overload a service, and attempts to “crash” a host. 4 Protection of Network Performance • the sending of excessive numbers of e-mail or excessively large files which, in Telkom’s sole opinion, negatively affects the performance of the network or any server on the network may result in deletion of the offending message or file, and may result in the termination of services; Electronic Mail Your account with Telkom Internet includes the ability to send and receive electronic mail. Misuse of e-mail may result in termination of service. The following examples are non-exclusive and are provided for guidance to customers: • you may not provide network services from your account (for example, you may not use your account to operate as an FTP server); • use of an e-mail account to send an unsolicited bulk or commercial message is prohibited on your Telkom Internet account. This includes, but is not limited to, bulk-mailing of commercial advertising, informational announcements, charity requests, petitions for signatures, and political or religious tracts. Such material may only be sent to those who have explicitly requested it; • Telkom Internet accounts operate on shared resources. You are prohibited from excessive consumption of resources, including central processing unit time, memory, disk space and session time. You may not use resource-intensive programs which negatively impact other customers or the performance of Telkom systems or networks. Telkom reserves the right to terminate or limit such activities; and • sending mass unsolicited mail or deliberately sending very large messages or files to one or more recipients (“mail bombing”) is prohibited; • forging or removing e-mail headers is prohibited; • you may not employ automated electronic or mechanical processes designed to defeat network inactivity time-outs. Such tools include, but are not limited to, repetitive pinging the host. • use of e-mail to harass or intimidate other users is prohibited. Harassment, whether through language, frequency of messages, or size of messages, is prohibited. Sending a single unwelcome message may be considered harassment. If a recipient asks to stop receiving e-mail 6 Personal Home Pages Your Telkom Internet account provides the option to purchase personal home page space. Telkom Internet 2
  • 3. will routinely monitor the size your personal web page and may, from time to time, monitor the contents of your personal web page. literary, artistic, political or scientific value; • materials that hold Telkom (including its affiliates, employees or shareholders) up to public scorn or ridicule, or which unreasonably criticize Telkom, its employees or its products; and You are solely responsible for any information contained on your personal home page. However, if complaints are received regarding language, content or graphics contained on a customer’s personal home page, Telkom Internet may, at its sole discretion, remove the personal home page and / or terminate your personal home page service. • materials which encourage the commission of a crime, or which tends to incite violence, or which tends to degrade any person or group based on sex, nationality, religion, colour, age, marital status, sexual orientation, disability or political affiliation. You may not use your personal home page to publish material which Telkom determines, at its sole discretion, to be unlawful, indecent or objectionable. 7 Third Party Internet Relay Chat (IRC) Although Telkom may offer IRC software, you may not: • For purposes of this AUP, “material” refers to all forms of communications including narrative descriptions, graphics (including photographs, illustrations, images, drawings, logos), executable programs, video recordings, and audio recordings. • use IRC scripts or programs that interfere with or deny service to other users on any other server or host; or • engage in activities that harass other users. This includes, but is not limited to, “flooding” (rapidly entering text with the intent to disrupt service), “flashing” (disrupting terminal emulation), “takeovers” (improper seizing and abuse of operator privileges), attempting to send private messages to those who do not wish to receive them, attempting to return to a channel after being banned from it, and other disruptive behaviours. • “Unlawful content” is that which violates any law, statute, treaty, regulation, or lawful order. This includes, but is not limited to obscene material, defamatory, fraudulent or deceptive statements, threatening, intimidating or harassing statements, or material which violates the privacy rights or property rights of others (e.g. copyright or trademarks). You may run clones (multiple simultaneous IRC connections) and robots only as permitted by the host IRC server. • “Indecent content” is that which depicts sexual or excretory activities in a patently offensive matter as measured by contemporary community standards. 8 • “Objectionable content” is otherwise legal content with which Telkom concludes, in its sole discretion, it does not want to be associated with in order to protect its reputation and brand image, or to protect its employees, shareholders and affiliates. Illegal Activities Any activity on Telkom’s network that is a violation of any law, regulation or this policy, as such may be in force from time to time, may result in immediate termination of service without notice to you. It is also your responsibility to ensure that you are aware, stay aware of, and shall at all times comply with, all statutory or other regulatory provisions and rules applicable to the provision and use of the Telkom Internet service as amended from time to time, including but not limited to the provisions of the Electronic Communications and Transactions Act 25 of 2002, the Films and Publications Act 65 of 1996 and the Regulation of Interception of Communications and Provision of Communication-Related Information Act 70 of 2002. Examples of prohibited personal home page content include: • materials that depict or describe scantily-clad and lewdly depicted male and/or female forms or body parts, and which lack serious literary, artistic, political or scientific value; • materials that suggest or depict obscene, indecent, vulgar, lewd or erotic behaviour, and which lack serious 3 Prohibited activities include, but are not limited to:
  • 4. • transmitting obscene materials, including child pornography or any material regarded as illegal; mance, Telkom will provide to the customer such information as is practically available regarding the customer’s usage status by way of a usage tracker tool. A customer will be able to track when his or her usage is dangerously high. Once usage is indicated as being dangerously high, Telkom reserves the right to suspend the relevant customer’s usage within 24 (twenty four) hours of usage having reached such levels. Customers who are restricted by Telkom in the aforementioned manner in a calendar month will be returned to full service profile at the beginning of the next month. The above controls will be implemented by Telkom in addition to those set out elsewhere in this AUP regarding unlawful behaviour. • intentionally spreading or threatening to spread computer viruses; • gaining or attempting to gain unauthorized access to private networks including Telkom’s private network infrastructure; • accessing or attempting to access information not intended for the customer; • engaging in the transmission of pirated software; 10 • conducting or participating in illegal gambling, soliciting for illegal pyramid and other schemes through electronic mail; or In general, if you use your Telkom Internet account in a manner which: • any other activities declared to be illegal in terms of any applicable law. 9 • violates rules, regulations and policies applicable to any network, server, computer database, website or Internet Service Provider (“ISP”) that you access through your internet account; Telkom Internet Uncapped Fair Usage Policy Telkom Internet uncapped accounts are designed for either home or business use, and customers need to select the appropriate package designed for their access port speed and type of usage application (for example, for business or home use). Telkom Internet uncapped products are not capped in the ordinary course. However, Telkom reserves the right to apply restrictions on an uncapped account if a customer’s behaviour is determined to be affecting the user experience of other customers on Telkom’s network. Such restrictions may include but are not limited to throttling a customer’s throughput speeds to an appropriate proportion of the actual port speed and / or shaping a customer’s bandwidth to limit the use of bandwidth intensive protocols and applications. Examples of customer behaviour which may compromise Telkom’s network performance include, for example, causing network congestion, include running excessive concurrent internet sessions or accessing excessive bandwidth intensive protocols such as peer-to-peer. In the event of such behaviours, Telkom reserves the right to terminate the account of a customer whose usage is continuously affecting Telkom’s network performance, as a customer of Telkom Internet uncapped products. In order to assist a customer to be made aware of when his or her behaviour is compromising Telkom’s network perfor- Breach of the Acceptable Use Policy • violates any law, regulation, treaty or tariff, • is defamatory, fraudulent, indecent, offensive, deceptive; or threatens, harasses, abuses or intimidates others; • damages the name or reputation of Telkom, its holding company, affiliates and subsidiaries; • interferes with other customers’ use and enjoyment of the services provided by Telkom; or • or breaches the security on any computer network; • you; to access an account which does not belong to it will be regarded as a breach of this AUP. 4 In the event of breaches of this AUP, Telkom will, where circumstances allow, provide notice of the breach to the relevant user with a request to remedy same immediately, failing which the relevant customer’s account may be terminated. However, where the circumstances warrant
  • 5. it, Telkom may terminate a customer’s account without notice. In addition to the above, users who violate systems or network security may incur criminal or civil liability. Telkom will co-operate fully with investigations of violations of systems or network security at other sites, including co-operating with law enforcement authorities in the investigation of suspected criminal violations. 11 General Telkom’s failure to enforce this policy, for whatever reason, shall not be construed as a waiver of Telkom’s right to do so at any time. Telkom reserves the right to amend the AUP from time to time. 5