Network acceptable use policy
You are responsible for maintaining the confidentiality of your account and all activities that occur under your username and password.
IAAPS Limited (hereafter IAAPS) offers the Network Service for activities such as the active use of e-mail, instant messaging, browsing the World Wide Web and accessing corporate intranets.
IAAPS reserves the right to suspend the Service if IAAPS Limited reasonably believes that your use of the Service is unreasonably excessive.
IAAPS Limited reserves the right to revise, amend or modify these Terms & Conditions, our other policies and agreements, and aspects of the Service itself.
The IAAPS Network may not be used directly or indirectly by a User for the download, creation, manipulation, transmission or storage of:
- Any offensive, obscene or indecent images, data or other material, or any data capable of being resolved into obscene or indecent images or material;
- Unlawful material or material that is defamatory, threatening, discriminatory, extremist or which has the potential to radicalise themselves or others;
- Unsolicited “nuisance” emails;
- Material which is subsequently used to facilitate harassment, bullying and/or victimisation of a member of the IAAPS or a third party;
- Material which promotes discrimination on the basis of race, gender, religion or belief, disability, age or sexual orientation;
- Material with the intent to defraud or which is likely to deceive a third party;
- Material which advocates or promotes any unlawful act;
- Material that infringes the intellectual property rights or privacy rights of a third party, or that is in breach of a legal duty owed to another party; or
- Material that brings the IAAPS into disrepute.
b) The IAAPS Network must not be deliberately used by a User for activities having, or likely to have, any of the following characteristics:
- Intentionally wasting staff effort or other IAAPS resources;
- Corrupting, altering or destroying another User’s data without their consent;
- Disrupting the work of other Users or the correct functioning of the IAAPS Network; or
- Denying access to the IAAPS Network and its services to other users.
c) Any breach of industry good practice that is likely to damage the reputation of the IAAPS will also be regarded prima facie as unacceptable use of the IAAPS Network.
d) Where the IAAPS Network is being used to access another network, any abuse of the acceptable use policy of that network will be regarded as unacceptable use of the IAAPS Network.
e) Users shall not:
- Introduce data-interception, password-detecting or similar software or devices to IAAPS Network;
- Seek to gain unauthorised access to restricted areas of IAAPS Network;
- Access or try to access data where the user knows or ought to know that they should have no access;
- Carry out any hacking activities; or
- Intentionally or recklessly introduce any form of spyware, computer virus or other potentially malicious software.
Consequences of Breach
In the event of a breach of this Acceptable Use Policy by a User, IAAPS may in its sole discretion:
a) restrict or terminate a User’s right to use the IAAPS Network;
b) withdraw or remove any material uploaded by that User in contravention of this Policy; or
c) where appropriate, disclose information to law enforcement agencies and take any legal action against a User for breach of this Policy, including but not limited to claiming all costs, fees and disbursements (including but not limited to legal fees) connected therewith.
In addition, where the User is also a member of the IAAPS community, IAAPS may take such action, disciplinary or otherwise as it deems appropriate and which is in accordance with its Policies.