Definitions
The following words and phrases have these meanings in this document:
”Malicious Code” means anything that contains any back door, time bomb, trojan horse, worm, drop dead device, computer virus or other computer software routine or code intended or designed to:
permit access to or the use of a computer system by an unauthorised third party, or
disable, damage, erase, disrupt or impair the normal operation of a computer system.
“User” is the legal entity making use of services offered by the service provider through this website.
General Principles
Users must comply with the terms of this Acceptable Use Policy, and must ensure that its employees, officers, agents or any other person that accesses the Interface for or on behalf of the User also does so. The User is responsible for the conduct of any person who accesses the User Interface login credentials assigned to the User.
The User must act fairly, in good faith and with due consideration to the Website Operator and other users and the User Interface when making use of it.
The User must not use the User Interface in such a way as to cause inconvenience to the Website Operator or other users of the User Interface. Such use includes without limitation the submission of bulk transactions that make excessive demands on system resources.
The User must not use the User Interface to in any way infringe any third party’s copyright, patent, trade mark or other intellectual property right.
Use of the Interface
The User may not use the User Interface to engage in unlawful, abusive, or irresponsible behaviour, including:
Unauthorised access to or use of data, services, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures;
Monitoring data or traffic on any network or system without the Website Operator’s authorisation;
Interference with service to any user, host or network including, without limitation, sending of or causing the sending of, numerous duplicate automated and / or excessive, similar emails, flooding, deliberate attempts to overload a system and broadcast attacks;
Identity theft, including, but not limited to Internet scanning (tricking other people into releasing their passwords), phishing, pharming, password robbery, security hole scanning, and port scanning;
Collection of personal information about third parties without their consent;
The intentional dissemination of any Malicious Code; or
Transmission of any bulk unsolicited email, whether of a commercial or non-commercial nature.
Personal Information
The User must not use the User Interface to obtain personal information which it is not mandated to hold in terms of any agreement entered into between itself and the Website Operator. Such activities include without limitation forms of data mining.
The User must not use the User Interface to change any records unless mandated in terms of any agreement entered into between itself and the Website Operator.
Security
The User must take reasonable security precautions in its interactions with the User Interface.
The User’s passwords should consist of at least 8 mixed alpha and numeric characters with case variations. The User should not permit a common word to be used as a password. The User must protect the confidentiality of its passwords, ensure that passwords are not shared, and should change passwords regularly.
Offensive content
The User may not make use of the User Interface to obtain, distribute (directly or indirectly) any content that the Registrar reasonably believes is unlawful, and in particular:
constitutes child pornography or is otherwise obscene, sexually explicit or morally repugnant;
is excessively violent, incites violence, threatens violence, or contains harassing content or hate speech;
is unfair or deceptive under the consumer protection laws of any jurisdiction, including chain letters and pyramid schemes;
is defamatory or violates a person’s privacy;
creates a risk to a person’s safety or health, creates a risk to public safety or health, compromises national security, or interferes with an investigation by law enforcement;
improperly exposes trade secrets or other confidential or proprietary information of another person;
is intended to assist others in defeating technical copyright protections;
clearly infringes another person’s trade or service mark, patent, or other intellectual property right;
promotes illegal drugs, violates export control laws, relates to illegal gambling, or illegal arms trafficking;
is discriminatory in any way, including by way of sex, race, or age discrimination; or
is otherwise unlawful or solicits conduct that is unlawful under laws applicable to the User or to the Registrar.
Consequences of violation of AUP
The Website Operator may, without notice to the User, suspend the User’s access to the User Interface if the Website Operator reasonably believes the User is using the User Interface in breach of this AUP. The User must cooperate with the Website Operator reasonable investigation of any suspected breach of the AUP.
Should the User’s violation of the AUP be sufficiently serious, or if the User consistently breaches the AUP, then the Website Operator may at its sole instance treat such breach as a material breach with regards to any agreement entered into between the User and the Website Operator, and act accordingly.
Disclaimer
Nothing in this document shall be interpreted as placing a duty upon the Website Operator to monitor or enforce the User’s activities and the Website Operator disclaims any liability as a result of a failure to do so, and consequent misuse of the User Interface is disclaimed.
Amendment of the AUP
Given the rapid changes inherent in the Domain Name sector, the Website Operator reserves the right to amend this document at any time.