Datum Acceptable Use Policy

1. General

Datum (“Datum”) provides carrier neutral colocation and datacentre services, delivered from secure and energy efficient facilities (each, a “Service” and collectively the “Services”). A “Client” is any party who purchases a Service from Datum. The “Client Personnel” consists of its employees, agents, sub-contractors (other than Datum) and the Client’s own customers.

This document defines the Acceptable Use Policy (“AUP”) of the Services with a view of ensuring the integrity, security and reliability of Datum network, systems, products, services, server hosting facilities and data contained therein (collectively, the “Datum Network”).

2. Prohibited Activities

It is contrary to Datum policy for any of its Clients or other Service user to effect or participate in any of the activities listed below (whether actual or attempted and whether directly or indirectly) through a Service.

Each of the below practices (each, a “Prohibited Activity”) and any other similar activities constitutes abuse of Datum’s Services, network and facilities and interferes with other Service users. Accordingly, the Client shall not and shall ensure that the Client Personnel shall not:

  1. 2.1Unauthorised Use: Obtain or attempt to obtain unauthorised access to any account, network, internet service, computer or computer resource not belonging to that user, end user or user account;
  2. 2.2Alteration of Information: Engage in or attempt unauthorised access, alteration, corruption or destruction of information belonging to Datum and/or any Datum Client or falsifying user or other Service related information;
  3. 2.3Interference to Network etc: Use Datum Services to interfere with or degrade any service to any user, end user, user account, host or network, deliberately attempting to overload a service and/or attempting to crash a host, including but not limited to flooding networks, sending unsolicited bulk e-mail, denial of service attacks and mail bombing;
  4. 2.4Interference to Communications: Use any kind of program, script or command, or send messages of any kind, that are designed to or that cause any other party to interfere with a user’s data communications, regardless of means, whether locally or via the Internet;
  5. 2.5Covert Transmissions: Intentionally omit, delete, fraudulently amend or misrepresent information transmitted or to be transmitted through the Services, including but not limited to TCP-IP header information, return-address information and Internet Protocol addresses (“spoofing”), or taking any other action intended to conceal or misrepresent the identity or contact information of the Client or its users;
  6. 2.6Breach of Security: Store and/or distribute materials and/or tools intended to breach or infiltrate security arrangements or attempt to scan, penetrate, bypass, test the vulnerability of (without Datum’s consent and co-operation) or engage in any activity which may threaten the security or integrity of any network or service (including but not limited to transmission of worms, viruses, logic bombs, Trojan horses, and other malicious codes and accessing any device or data without proper authorisation) whether by passive or intrusive techniques;
  7. 2.7Inappropriate Monitoring: Use the service to store, send or distribute software that covertly gathers information or covertly transmits information about any user or network, including e-mail addresses, screen names or any other personal identifiable information;
  8. 2.8Inappropriate Software Products and Services: Use or allow the Services to be used to promote illegal activities including allowing, permitting or facilitating the transmission, promotion or otherwise making available any software product or service that is either illegal or designed to cause or facilitate the hacking of any site.
  9. 2.9Inappropriate Content: Use or allow the Services to be used for publishing or transmitting content which is inappropriate or otherwise in breach of applicable law. The Client shall immediately implement a “notice and take down” procedure in respect of any content which is or may be reasonably considered to be inappropriate or in breach of applicable law which the Client’s Personnel (other than the Client’s customers) becomes aware and shall notify Datum accordingly. Such inappropriate content shall include, but not be limited to content (or links to content) which Datum reasonably believes:
    1. 2.9.1is illegal or promotes in any way any illegal act;
    2. 2.9.2defames or otherwise violates a person’s privacy;
    3. 2.9.3depicts, promotes or relates in any manner to child pornography, pornography generally or sexual activity of any kind;
    4. 2.9.4is violent, incites violence or threatens violence;
    5. 2.9.5contains content which may be considered abusive, harassing or contain hate speech whether in respect of any individual or group of individuals or in respect of any gender, race, religion or ethnicity;
    6. 2.9.6is deceptive under the appropriate consumer protection laws, including chain letters and pyramid schemes;
    7. 2.9.7creates a risk to a person’s safety or health, creates a risk to public safety or health, compromises national security or interferes with a police investigation or any other lawful investigation;
    8. 2.9.8exposes sensitive commercial data, trade secrets or other confidential or proprietary information of another person, group or organisation;
    9. 2.9.9bypasses or promotes information intended to bypass copyright or license protections;
    10. 2.9.10infringes copyright, trade or service mark, patent or other property right;
    11. 2.9.11promotes illegal drugs, trafficking, money laundering, or violates export control laws;
    12. 2.9.12is otherwise malicious, fraudulent or may result in retaliation against Datum.
  10. 2.10Copyrighted Materials: Use or allow the use of the services to publish, download, distribute or use in any way any image, software, text, data, music, video or other work in contravention of copyright legislation;
  11. 2.11Bulk e-mail: Engage in the despatch of bulk or commercial e-mail, unless approved in advance by Datum, such approval to be dependent on reassurance to Datum that:
    1. 2.11.1the despatch of bulk e-mail is for legitimate commercial use which shall not include anything that may be considered as phishing, scamming, password robbery, spidering, or harvesting;
    2. 2.11.2the intended recipients have given their consent to receive e-mail;
    3. 2.11.3the Client has procedures in place requiring consent from intended recipients to receive bulk or commercial e-mail, including confirmation that where consent to receive e-mail is given, it is given by the owner of the respective e-mail address, that such evidence of consent is retained in a manner that may be produced on request, and that any such consent may be revoked by the intended recipient at any time;
    4. 2.11.4the Client must post an email address for complaints in a conspicuous place within the body of the e-mail or on any website associated with the e-mail, and must promptly respond to messages sent to that address;
    5. 2.11.5data collected regarding e-mail addresses or any other personal identifiable information is used and stored in accordance with the relevant data protection principles;
    6. 2.11.6the Client must not obscure the source of the e-mail in any manner, or purport to represent any other individual, body or organisation;
    7. 2.11.7the Client must not attempt to send any message to an e-mail address if 3 consecutive delivery rejections have occurred and the time between the third rejection and the first rejection is longer than fifteen days;
  12. 2.12IP address abuse: Engage in any activity that results in any assigned IP addresses being listed on an abuse database;
  13. 2.13Accepted internet standards: Engage in any activity that is likely to violate generally accepted standards of the internet, other networks conduct and usages, or codes of conduct including but not limited to any denial of service attacks, web page defacement, port and network scanning and unauthorised system penetrations;
  14. 2.14Applicable laws: Failing to comply with any applicable law or regulation.

3. Rights and Remedies

Datum may suspend and/or terminate a Client’s Service at any time for any failure of Client, or the Client Personnel to comply with this policy or for engaging (or permitting others to engage) in any Prohibited Activity or similar/related activity.

Nothing in this Acceptable Use Policy limits Datum’s rights and remedies (available at law or in equity) in any way with respect to any Prohibited Activity. Datum shall fully co-operate with any law enforcement authorities or court order requesting or directing Datum to disclose the identity or locate anyone posting any material in breach of this policy.

4. Password Protection

Users are responsible for protecting their password and for any authorised or unauthorised use made of their password. Users will not use or permit anyone to use Datum’s Service to guess passwords or access other systems or networks without written authorisation. If a user suspects that their password is known to another person, then they shall contact Datum immediately to arrange for a new password to be issued.

THE CLIENT SHALL INDEMNIFY AND KEEP DATUM INDEMNIFIED AGAINST ALL DAMAGES, CLAIMS, COSTS, LOSSES AND LIABILITIES SUFFERED OR INCURRED BY DATUM AS A RESULT OF ANY BREACH (OR ANY SUSPECTED BREACH) OF THIS POLICY.

5. Modification of This Policy

Datum reserves its sole right to change this policy from time to time and such amended policy shall be enforced from the earlier of fourteen (14) days from the date of publication, or immediately upon its notification to the Client.

IT IS RECOMMENDED THAT YOU PRINT A COPY OF THIS POLICY FOR YOUR OWN REFERENCE PURPOSES.