Acceptable Use Policy
Pie Security's Acceptable Use Policy ("Policy") is intended to help protect the Pie Security service, Pie Security Clients, direct or otherwise, and the Internet community in general from irresponsible or, in some cases, illegal activities, and the Client agrees to be bound by the Policy.
[Company] and their Client shall not, nor shall they permit, enable, or assist others, to use the Services for any breach of any applicable law or generally accepted transmission or application protocols applicable to the Internet or any part of it or to anything connected to it or to any user of it. Such prohibited use includes but is not limited to the following:
- I. civil infringement of and/or criminal offences relating to IPRs; or
- II. commission of any criminal offence (including deliberate transmission of computer viruses) under the Computer Misuse Act 1990 (UK) or any similar legislation in any country; or
- III. knowingly or recklessly transmitting, displaying or posting to a publicly accessible service any material which is unlawful or actionably defamatory or an invasion of privacy, breach of an intellectual property right or breach of a right of publicity in any jurisdiction with which any publicly accessible service reasonably appears to have any connection or from which it may reasonably be apprehended that a publicly accessible service is likely to be significantly accessed; or
- IV. transmitting, transferring, displaying or posting to a publicly accessible service any material in breach of the Data Protection Act 1998 (UK) or similar legislation in any other country or of any material which is confidential or is a trade secret or which affects the national security of the United Kingdom or the said territory or which may expose Pie Security to any retribution or penalty under the laws and/or regulations and/or decrees of the United Kingdom or any other country relating to the export of or dealing with military or potentially military resources; or
- V. use of the Services or the Internet in any manner which is a violation or infringement of any rights of any kind or nature (whether like to any of the foregoing or otherwise) of any person, firm or company; or
VI. any sending of unsolicited email messages or any mass mailing of unsolicited advertising material by the Client; or
- VII. any activity that potentially could harm the Pie Security Network, its clients' networks or other networks, including but not limited to traffic flooding, malicious overflows, etc; or
- VIII. any activity that Pie Security decides at its absolute discretion is an unsuitable use of the Services.
I. The Client as agreed via [Company] is responsible for:
- I. Maintaining email addresses of the forms email@example.com and firstname.lastname@example.org for receiving complaints of network abuse activities, as suggested by Internet Official Protocol Standard RFC 2142. Typically, these email addresses will forward emails to the real user accounts of the responsible persons for treating the network misuse complaints.
- II. The activities of its client base or end-users and, by accepting service from Pie Security, is agreeing to ensure that its clients abide by this Policy. If irresponsible or illegal activity continues, even after attempted communications with the Client, then the Client may be subject to an appropriate action in order to stop those activities.
- III. All complaints related to network misuse - including email abuse - are to be sent to abuse@PieSecurity.com
IV. [Company] will use reasonable endeavours to ensure the Client responds to any Abuse Complaints within 24 hours.