O2 Business Broadband Fair and Acceptable usage policy terms & conditions
The following terms and conditions relate only to your use of the Services.
O2's fair and acceptable usage policy is designed to make sure the Services provided to you are great value, fast and reliable. The following list details all the uses of the Services that we consider unfair or unacceptable ('Policy'). You must ensure that any use of the Services, by yourself or others via your account, complies with this Policy. If you or others using the Services via your account contravene this Policy, we may:
- (a) give you a notice to stop the unacceptable use(s); or
(b) terminate or suspend your Services, with or without notice as we consider appropriate, under the standard terms and conditions for customers.
This Policy is in addition to O2's standard broadband terms and conditions for Business and/or Consumer customers (the 'Terms') for the Services, and terms which are not defined in the Policy will have the meaning set out in the Terms.
If there is any inconsistency between the Policy and the Terms, the Policy will prevail.
Please advise us if you become aware of any violation or suspected violation of this Policy by sending an email to email@example.com
1 What you must not do
You must not use the Services for:
- (a) unlawful, fraudulent, criminal or otherwise illegal activities;
- (b) sending, receiving, publishing, posting, distributing, disseminating, encouraging the receipt of, uploading, downloading or using any material which is offensive, abusive, defamatory, indecent, obscene, unlawful, harassing or menacing or a breach of the copyright, trademark, intellectual property, confidence, privacy or any other rights of any person;
- (c) commercial purposes, unless:
- (i) you are working from home as a sole trader in business on your own account; or,
- (ii) you are a Business Customer and you use the service only in the ordinary course of your business; and provided that in either case, any such use of the Services is always subject to paragraph (j) below:
- (d) sending or uploading unsolicited emails, advertising or promotional materials, offering to sell any goods or services, or conducting or forwarding surveys, contests or chain letters, except if you are working from home as a sole trader in business on your own account or you are a Business Customer and in either case you are permitted to send marketing communications in accordance with the Privacy and Electronic Communications Regulations 2003;
- (e) knowingly or negligently creating, transmitting, storing, publishing or uploading any electronic material (including, without limit, files that contain viruses, corrupted files, Trojans or any other similar software or program) which is known or likely to cause, interrupt, damage, destroy or limit the functionality of any computer software, hardware or telecommunications equipment owned by us or any other Internet user or person;
- (f) activities that invade another's privacy, cause annoyance, inconvenience or needless anxiety to any person;
- (g) activities that are in breach of any other third party's rights, including downloading, installation or distribution of pirated software or other inappropriately licensed software, deletion of any author attributions, legal notices or proprietary designations or labels in any file that is uploaded, falsification of the origin or source of any software or other material;
- (h) anything that may disrupt or interfere with our network or Services or cause a host or the network to crash;
- (i) launching 'denial of service' attacks; 'mailbombing' attacks; or 'flooding' attacks against a host or network;
- (j) granting access to the Services to others not located at the premises at which the Services are connected, or, in any way reselling or re-providing the Services to third parties;
- (k) making excessive use of, or placing unusual burdens on, the network, for example by sending or receiving large volumes of email or excessively large email attachments; or
- (l) circumventing the user authentication or security process of a host or network.
2 What about security?
- 2.1 You are responsible for ensuring that security information remains confidential so that the network cannot be used by any unauthorised person.
- 2.2 The security information includes, but is not limited to, information controlling access to:
- (a) any equipment, computer hardware systems or networks;
- (b) any computer software or applications; or
- (c) any other services accessed by you in the use of either of the above.
- 2.3 You shall not disclose any security information to any third party, or use the same for any purpose connected with the improper use of the network including accessing or attempting to access other parts of the services for which you do not have access rights.
- 2.4 You are responsible for taking all reasonable steps necessary to prevent a third party obtaining access to the network.
3 What about usage by kids, employees and others without you knowing?
- 3.1 You are responsible for all uses made of the Services through your account and for any breach of this Policy whether an unacceptable use occurs or is attempted, whether you knew or should have known about it, whether or not you carried out or attempted the unacceptable use alone, contributed to or acted with others or allowed any unacceptable use to occur by omission. You agree that we are not responsible for any of your activities in using the network.
- 3.2 It is your responsibility to determine whether any of the content accessed via the Services is appropriate for children or others in your household or office to view or use.
4 What about excessive network usage?
There is no limit on the monthly network usage. However if we feel that your activities are so excessive that other customers are detrimentally affected, we may give you a written warning (by email or otherwise). In extreme circumstances, if the levels of activity do not immediately decrease after the warning, we may terminate or suspend your Services.