Acceptable Use Policy.

The Jubilee Group provides a variety of Internet services to many customers, using resources which are, of necessity, shared. The Jubilee Group is for the purposes of this discussion both a user and a supplier of Internet services. The term 'user' means any user, whether on the planet or not, and it is not restricted to users of the resources which we own or control.

This statement is provided to make you aware of our Policy on the Acceptable Use of our Internet facilities, and to show you how we enforce it. Unfortunately, experience teaches us that the Policy would perhaps better be named the Unacceptable Abuse Policy. Those who have studied the behaviour of human beings in large numbers will be familiar with the lesson.

Background.

The Internet is a developing medium, and we are all (we hope) learning. This Policy may be amended at any time, and to make it easy to revisit often you are encouraged to use the 'bookmark' facility of your browser.

None of us yet has the experience to write a bullet-proof Internet service providers' contract. Until we do, the best we can offer is our Policy on Acceptable Use in the hope that users will consent. If you are unhappy with it, please contact us for a refund of the service fee.

Because of the rapid development of the Internet and the high speed nature of Internet communications, sometimes unexpected things happen without warning, very quickly, and emergency action becomes necessary.

Because the resources are shared it is possible for circumstances to arise, both unintentionally and otherwise, where one user or a group of users can cause problems for other users.

Because the Internet is a public medium with access available to all, and because homo sapiens is not a particularly accurate description of the species, there are many individuals and organizations who abuse the Internet in many ways. Attacks come from millions of sources, every day. The attackers are often at least as capable as those of us in the business of defence. One successful attack could destroy our ability to provide Internet services for an unpredictable length of time, without warning. Fortunately thesedays, attackers are no longer children simply trying to prove how clever they are, or to do mindless damage. Unfortunately, they are now usually interested only in using our facilities illegally, for financial gain, and without paying for the service. It is doubly unfortunate because now there are many more of them, they are better equipped, and they are much more skillful and determined than the average high-school prankster. They are often hardened criminals whom one would not care greatly to offend.

For these and other reasons the services which we provide are provided on a "best effort" basis only. It is not our intention to police the Internet, nor to censor free expression. However we cannot allow resources which we own or control to be used for activities which, for example, might cause disruption to the lawful activities of any user, or to those of our own business, or which might create unexpected costs for any user, or which might affect the safety or security of resources, or which may be illegal, or which may breach confidence or contractual obligations.

Enforcement.

We use a number of techniques to defend ourselves and our resources (and those of other users) against attacks, and to prevent both the reception and transmission of unsolicited, dangerous and/or nuisance communications, especially mail messages.

We take the actions we deem necessary as and when the need arises to repair damage, to restrict inconvenience, to counter threats, and to enforce our policies. Sometimes emergency action to counter a new threat causes complete loss or restriction of a service to legitimate users. We will make every effort to avoid this, but sometimes it is necessary to use 'shotgun reefing'. The rigging can later be made more seamanlike when the situation is under control.

We will not be liable for losses resulting from the use of such techniques or such actions.

The techniques evolve and are constantly being augmented in the face of known threats which are ceaselessly changing, and new threats which are incessantly appearing. We may block transmissions from any source and/or to any destination and/or for any reason at any time without notice. Beyond this we do not normally discuss our security measures.

Specific Prohibitions.

The transmission of high volumes of unsolicited electronic mail (SPAM, whether commercial, political, religious or not), pyramid schemes, chain letters, 'mail bombing', DOS (Denial Of Service) attacks, and any activity which might cause excessive consumption of bandwidth are specifically forbidden, as are transmissions intended to deceive, for example electronic mail containing email addresses or hostnames which are forged or used without the proper consent, and all transmissions which are offensive, dangerous, malicious or harassing including computer viruses, worms, trojans and hoaxes.

Illegal activities are forbidden, including but not limited to the distribution of material which is illegally copied; the distribution of proscribed material; any attempt to gain or supply unauthorised access to, or use of, any resource; fraud, 'phishing', phony prizes and scams of all kinds. The publication of information which might tend to assist those who seek to engage in any illegal activity is also forbidden. Be aware that by its nature, the Internet crosses national boundaries in a way which nothing else can do, and that the definition of 'illegal' differs from place to place and from time to time. In this document the definition of 'illegal' takes the widest possible meaning, for example it is possible to breach this Acceptable Use Policy without breaching the Law of the Land in which a guilty party is situated.

Material of a confidential nature must not be disseminated without the proper authority. Amongst other things this includes passwords and/or keys which we may from time to time provide to customers in the course of business.

Warranty and Remedy.

We make no warranty of any kind concerning the Internet services which we provide. In the event of any dispute the liability of the Jubilee Group or any Member of the Group will be limited to the amount paid by the customer to the Group or Group Member for the period to which the dispute relates.

In the event that a customer breaches this Acceptable Use Policy, or permits anyone using a service which we provide so to do, the service to our customer will be discontinued without notice.

We charge at hourly rates when dealing with breaches of our policies. Details of our charges are available on request.

Feedback.

If you have comments or questions about our policies, please send them to us at one of the addresses listed on the 'contacts' page.

Mail specifically about abuse of our resources or of the Internet in general should be sent to our abuse address image of abuse address.

Definitions.

In this document terms such as "we", "you" and "the customer" have the obvious meanings, and only those meanings. You are expected to accept the spirit of this policy in addition to its wording.