Acceptable Use Policy
It is a requirement of the TGIS Terms of Service that all users of its network or services accept and adhere to the company’s Acceptable Use Policy. TGIS may change this policy to include changes in the law or in the acceptable practice of internet use and reserves the right to make such changes without notice and whenever required.
Compliance with this Acceptable Use Policy is a contractual requirement. If you fail to observe the terms of this policy your account or service may be liable to termination or suspension. In the event that an account is suspended, TGIS may be prepared, at its sole discretion, to restore the account on receipt of a written statement that the user will not commit any further abuse of the service.
TGIS’ relationship with its clients, its partners and other network providers depends on responsible conduct from all users. TGIS will not hesitate to protect itself and other clients and networks should any form of abuse be found to be occurring.
The following is the entire Acceptable User Policy (“AUP”) agreement between TGIS and the personal or corporate account holder (you). TGIS provides World Wide Web Hosting, web design tools and script installation. TGIS has certain legal and ethical responsibilities that co-exist with the use of its servers and equipment involved in deployment of these services. TGIS’ general policy is to act as a provider of Internet presence. TGIS reserves the right to suspend or cancel any customer’s access to any or all services provided by TGIS if we decide that the account has been inappropriately used.
Use of Networks and the Internet in general
- You must not use the service for the transmission of illegal material. The user agrees to refrain from sending or receiving any materials which may be deemed to be offensive, abusive, indecent, hard-core or paedophile pornography, defamatory, obscene, menacing or otherwise as prohibited by current and future statutes in force. The user agrees to refrain from sending or receiving any material which may be in breach of copyright (including Intellectual Property Rights), confidence, privacy or other rights.
- If you are in any doubt as to the legality of what you are doing, or propose to do, you should either take independent legal advice or cease that usage.
- You should be aware that the storage, distribution of or transmission of illegal materials may lead to investigation and possible prosecution by the UK authorities.
- You must not gain or attempt to gain unauthorised access to any computer systems for any purpose. In addition to being a breach of this AUP, such action may lead to criminal prosecution under the Computer Misuse Act.
- You must not send data to the internet using forged addresses or data which is deliberately designed to adversely affect remote machines (including but not limited to denial of service, ping storm, trojans, worms and viruses).
- You must ensure that local PCs and network connected servers are not configured to allow open relay and must not participate in the sending of unsolicited commercial or bulk email (commonly referred to as ‘spam’ or ‘UCE’) including hosting or allowing the hosting of sites or information that are advertised (‘spamvertised’) by UCE from a third party network or supplier.
- You are prohibited from running ‘port scanning’ or other software intended to probe, scan, test the vulnerability of or access remote systems or networks except in circumstances where the remote user has given express permission for this to be done.
- You may not divulge your network passwords to third parties and should take all reasonable steps to ensure that such information remains confidential.
Sending and receiving Email involves the same responsibilities and approach as would be used when sending or receiving any other form of communication – written or printed mail, fax, telephone call etc. Most users fully understand what would be considered appropriate and acceptable when communicating with others and apply these considerations to their use of Email. There are occasions when some users send mail or engage in online communication that others consider unacceptable – generally regarded as abuse by the online community.
If you find it difficult to determine what might be considered ‘abuse’ with online communication you should realise that, in general terms, anything that might be unacceptable, and possibly illegal, in other forms of communication will be equally unacceptable and possibly illegal online.
- You should not send Emails that might cause annoyance, inconvenience or anxiety to a recipient.
- You should not send any Emails likely to cause distress or any material which is offensive, indecent, obscene, menacing or in any way unlawful.
- You must not use TGIS’ mail services or network to send Email to any user who does not wish to receive it.
- You must not use TGIS’ mail services or network to send unsolicited commercial Email, in bulk (commonly known as ‘SPAM’) or individually.
- You must not use TGIS’ mail services or network with intent to deprive others of service (e.g. ‘mail bomb’).
- You must not use false mail headers or alter the headers of mail messages in such a way as to conceal the identity of the sender.
- You must not use any Email address that you are not authorised to use.
- You must ensure that any Email servers connected to the TGIS network and operated by you are not configured to allow ‘open relay’.
Customers who abuse the TGIS Email service will be notified that their behaviour is unacceptable and may have their accounts suspended, terminated or blocked.
The Company reserves the right to restrict or block internet traffic to or from a Customer server, without prior notification, in the event of a failure to abide by the published terms of the Acceptable Use Policy. This may include, but not exclusively, the transmission of unsolicited Email or the presence of an open mail relay.
If a customer account or service is suspended or blocked due to abuse, then service may be restored at TGIS’ sole discretion and generally will only be restored on receipt of a written assurance of future compliance with this policy and on payment of an administrative charge for restoration of service.
Web usage includes the use of web space provided with client accounts, web hosting on TGIS’ servers and the use of web services and space on customer colocated servers.
TGIS cannot and does not proactively monitor content on any web space maintained by customers (whether customer space, web hosted or co-located services) and cannot and does not guarantee that such sites are free of illegal content or other materials that may be considered unacceptable.
- You undertake sole responsibility for the content of web pages owned and or operated by you – whether on client pages, web hosted space or colocated servers – within the TGIS domain or other domains hosted within the TGIS network.
- You undertake sole responsibility to ensure that all materials on any web site owned or operated by you contains material that you have created or have permission to use.
- You undertake sole responsibility for any dispute involving Copyright or Intellectual Property Rights associated with your site or service.
- You must not use your website or web service to promote or distribute any material or content that is illegal (under any current or future legislation). You should be aware that the internet is a global communications network and what may be legal in the UK may be illegal elsewhere and leave you liable to prosecution in another country.
- You must not host or allow the hosting of sites or information advertised (‘spamvertised’) by UCE, including UCE from third party network(s) or supplier(s).
TGIS may undertake investigation of content services if potential abuse is brought to its attention and reserves the right to remove any web page on our servers at any time and for any reason.
Abuse of TGIS Services
Please address all complaints about abuse of TGIS services to email@example.com.
TGIS reserves the right to investigate suspected or potential abuse of its Acceptable Use Policy. If we become aware of possible abuse, either through our own investigations or through referral by another user or by a third party, we may begin an investigation that may include gathering information from all potential parties and materials on our servers. TGIS reserves the right to suspend accounts or access during such investigations and/or to remove materials from servers (on a temporary or permanent basis). All actions will be determined on an individual basis and will not be taken to form any precedent.
TGIS customers who engage in abuse of the network and/or the internet will be notified that their behaviour is unacceptable and may have their accounts suspended or terminated. If a customer account or service is suspended or blocked due to abuse, then such service may be restored at TGIS’ sole discretion and generally will only be restored on receipt of a written assurance of future compliance with this Policy and on payment of an administrative charge for restoration of service.
All TGUS customers acknowledge that the Company may be required by current or future legislation to access, store, copy or otherwise Customer data stored within or transmitted by our service. By accepting this Acceptable Use Policy you expressly agree that we may access and use your personal data or other account information in connection with any such investigation and may disclose such data to any third party who has a legitimate interest in the data, investigation or outcome of that investigation.
TGIS reserves the right to terminate services, with immediate effect and without further obligation or liability to Customers, as required by any law enforcement authority or by the Courts of the United Kingdom.
TGIS does not tolerate abusive behaviour from anyone and reserves the right to terminate, without further notice or refund, the services of any customer or user who demonstrates abusive, intolerant, violent, verbally abusive or threatening behaviour towards TGIS, its staff, contractors, customers or other users.
Regulation of Investigatory Powers Act 2000, Terrorism Act 2006
TGIS undertakes to take action required under the provisions of the Regulation of Investigatory Powers Act 2000, Terrorism Act 2006 and or other relevant legislation and will fully cooperate with the appropriate UK authorities.
Here you can create the content that will be used within the module.
What our customers say
Second to none!
D & G Noble Ltd have been using TGIS for more than 17 years. The help and advice offered by the TGIS staff has been second to none over this period.
TGIS has provided the Barwood Group with Server Hosting, Email and other Internet services for many years. We would not hesitate to recommend them. Their service over the period has been consistently outstanding.
Recommended - 100%
Taylor and Co have used TGIS for many years and have consistently been serviced very well by their team of experts. We would recommend them 100%.
We like their approach
Metal Signs cc selected TGIS for web design and hosting and the result has been a significant increase in our site visitors and turnover. We liked their approach to the problem - TGIS took control and resolved the problem. I would recommend TGIS to companies who need professional and efficient IT services to run their business.
Metal Signs cc (South Africa)
First class service
We have been using TGIS for almost a decade now and in that time we have always received a very responsive and friendly service. The value for money of this service is outstanding, and we would not hesitate to recommend them as they were, indeed, recommended to us.
Gary daLuz Viera
Director - Shore And Pour Limited
We would be lost without them
When you consider how important a fast, reliable and efficient email host and service is to any business, it says a lot that tangerine have used TGIS as our sole provider and support partner for over 20 years! The TGIS team are knowledgeable, responsive and delivers every time. We would be lost without them, and I cannot recommend their invaluable support highly enough.
Tangerine - Direction And Design