Acceptable Usage Policy

Thank you for reading 360 Communication System’s Acceptable Use Policy (AUP). By accessing this website, or by contracting with us for service, you agree, without limitation or qualification, to be bound by this policy and the terms and conditions it contains, as well as any other additional terms, conditions, rules or policies which are displayed to you in connection with this service/website.

The purpose of this AUP is to comply with the relevant laws of the Republic; to specify to clients and users of our service/website what activities and online behaviour are considered an unacceptable use of the service/website; to protect the integrity of our network and to specify the consequences that may flow from undertaking such prohibited activities.

This document contains a number of legal obligations which you are presumed to be familiar with. As such, we encourage you to read this document thoroughly and direct any queries to our client services/legal department at info@360comz.com

360 Communication Systems respects the rights of our clients and users of our services to freedom of speech and expression; access to information; privacy; human dignity; religion, belief and opinion in accordance with our constitution. We undertake not to interfere with any of those rights unless required to do so by law; unless those rights are exercised for unlawful purposes; or unless the exercise of those rights threatens to cause harm to another person or affect the integrity of our network.
Unlawful Use

360 Communication System’s services/website may only be used for lawful purposes and activities. We prohibit any use of our website/network including the transmission, storage and distribution of any material or content using our network that violates any law or regulation of the Republic.

This includes:

Any violation of local and international laws prohibiting child pornography; obscenity; discrimination (including racial, gender or religious slurs) and hate speech; or speech designed to incite violence or hatred, or threats to cause bodily harm.
Any activity designed to defame, abuse, stalk, harass or physically threaten any individual in the Republic or beyond its borders; including any attempt to link to, post, transmit or otherwise distribute any inappropriate or defamatory material.
Any violation of Intellectual Property laws including materials protected by local and international copyright, trademarks and trade secrets. Moreover 360 Communication Systems cannot be held liable if you make any unlawful use of any multimedia content accessed through the search facility provided by 360 Communication System’s network, or otherwise available through access to our network, whether for commercial or noncommercial purposes.
Any violation of the individual’s right to privacy, including any effort to collect personal data of third parties without their consent.
Any fraudulent activity whatsoever, including dubious financial practices, such as pyramid schemes; the impersonation of another subscriber without their consent; or any attempt to enter into a transaction with 360 Communication Systems on behalf of another subscriber without their consent.
Any violation of the exchange control laws of the Republic.
Any activity that results in the sale, transmission or distribution of pirated or illegal software.
Failing to respond to a request by a recipient of unsolicited mail to be removed from any mailing or direct marketing list and continuing to send unsolicited mail following such a request for removal. Where any user resides outside of the Republic, permanently or temporarily, such user will be subject to the laws of the country in which s/he is currently resident and which apply. On presentation of a legal order to do so, or under obligation through an order for mutual foreign legal assistance, 360 Communication Systems will assist foreign law enforcement agencies (LEA) in the investigation and prosecution of a crime committed using 360 Communication System’s resources, including the provisioning of all personal identifiable data.

Prohibited Activities

The following sections outline activities that are considered an unacceptable use of Company’s services/network/website and also detail the guidelines for acceptable use of certain facilities/services, as the case may be.
Threats to Network Security

Any activity which threatens the functioning, security and/or integrity of 360 Communication System’s network is unacceptable.

This includes:

Any efforts to attempt to gain unlawful and unauthorised access to the network or circumvent any of the security measures established by 360 Communication Systems for this goal;
Any effort to use 360 Communication System’s equipment to circumvent the user authentication or security of any host, network or account (“cracking” or “hacking”);
Forging of any TCP-IP packet header (spoofing) or any part of the header information in an email or a newsgroup posting;
Any effort to breach or attempt to breach the security of another user or attempt to gain access to any other person’s computer, software, or data without the knowledge and consent of such person;
Any activity which threatens to disrupt the service offered by 360 Communication Systems through “denial of service attacks”, flooding of a network, or overloading a service or any unauthorised probes (“scanning” or “nuking”) of others’ networks;
Any activity which in any way threatens the security of the network by knowingly posting, transmitting, linking to or otherwise distributing any information or software which contains a virus; Trojan horse; worm, lock, mail bomb, cancelbot or other harmful, destructive or disruptive component.
Any unauthorised monitoring of data or traffic on the network without 360 Communication System’s explicit, written consent.
Any unsolicited mass mailing activity including direct marketing; spam and chain letters for commercial or other purposes, without the consent of the recipients of those mails.

Public Space & Third Party Content & sites

In reading this AUP or in signing a service contract with 360 Communication Systems, you acknowledge that 360 Communication Systems has no power to control the content of the information passing over the Internet and its applications, including e-mail; chatrooms; news groups; or other similar fora, and that 360 Communication Systems cannot be held responsible or liable, directly or indirectly, for any of the abovementioned content, in any way for any loss or damage of any kind incurred as a result of, or in connection with your use of, or reliance on, any such content.

Our services also offer access to numerous third party webpages. You acknowledge that we exercise absolutely no control over such third party content, or sites and in such cases, our network is merely a conduit or means of access and transmission. This includes, but is not limited to, third party content contained on or accessible through the 360 Communication Systems network websites and web pages or sites displayed as search results or contained within a directory of links on the 360 Communication Systems network. It remains your responsibility to review and evaluate any such content, and that any and all risk associated with the use of, or reliance on, such content rests with you.

Access to public Internet spaces, such as bulletin boards, Usenet groups, chat rooms and moderated forums is entirely voluntary and at your own risk.

360 Communication Systems employees do not moderate any of these services, or your communications, transmissions or use of these services. We do not undertake any responsibility for any content contained therein, or for any breaches of your right to privacy that you may experience as a result of accessing such spaces.

Unsolicited, Spam and Junk mail

Spam and unsolicited bulk mail are highly problematic practices. They affect the use and enjoyment of services by others and often compromise network security. 360 Communication Systems will take swift and firm action against any user engaging in any of the following unacceptable practices:

Sending unsolicited bulk mail for marketing or any other purposes (political, religious or commercial) to people who have not consented to receiving such mail;
Operating or maintaining mailing lists without the express permission of all recipients listed;
Failing to promptly remove from lists invalid or undeliverable addresses or addresses of unwilling recipients;
Using 360 Communication System’s service to collect responses from unsolicited e-mail sent from accounts on other Internet hosts or e-mail services, that violate this AUP or the AUP of any other Internet service provider;
Including 360 Communication System’s name in the header or by listing an IP address that belongs to 360 Communication Systems in any unsolicited email sent through 360 Communication System’s network or not;
Failure to secure a client’s mail server against public relay as a protection to themselves and the broader Internet community. Public relay occurs when a mail server is accessed by a third party from another domain and utilised to deliver mails, without the authority or consent of the owner of the mail-server. Mail servers that are unsecured against public relay often become abused by unscrupulous operators for spam delivery and upon detection such delivery must be disallowed. 360 Communication Systems reserves the right to examine users’ mail servers to confirm that no mails are being sent from the mail server through public relay and the results of such checks can be made available to the user. 360 Communication Systems also reserves the right to examine the mail servers of any users using 360 Communication System’s mail servers for “smarthosting” (when the user relays its mail via a 360 Communication Systems mail server to a mail server of its own) or similar services at any time to ensure that the servers are properly secured against public relay. All relay checks will be done in strict accordance with 360 Communication System’s privacy policy.

Spam/Virus Filtering

360 Communication Systems provides a spam and virus filtering system to protect clients from unsolicited mail and viruses. The client acknowledges that this system might incorrectly identify a valid message as spam or as a virus and consequently this message might not be delivered to the client. The client acknowledges and agrees that 360 Communication Systems shall without limitation have no responsibility for, or liability in respect of any data lost as a result of this system.

Webmail

Webmail and other web based email services made available by 360 Communication Systems are provided on an “as is” basis without representations, warranties or conditions of any kind, and the client acknowledges and agrees that 360 Communication Systems shall have no responsibility for, or liability in respect of, any aspect of the Webmail services, including without limitation for any lost or damaged data or any acts or omissions of 360 Communication Systems. As webmail storage space is limited, some Webmail messages may not be processed due to space constraints or message limitations.

Uncapped Services

It is our goal to protect the integrity of our network, in order to provide the best possible internet experience for all of our clients using all Uncapped services and as such we reserve the right to manage uncapped users who are deemed to be causing an unusually large burden on the network. We are committed to managing our network in a way that allows us to provide all users with the best experience possible, however we cannot guarantee that the allocated capacity will always be available.

Uncapped
Home Uncapped services are best suited for average home users who make little to no use of high bandwidth services such as NNTP, Peer-to-Peer and Torrents (and similar but not limited to). Home Uncapped services are proactively managed by the 360 Communication Systems Protocol Manager.

Uncapped (DSL and Fibre) – 360 Communication Systems Protocol Manager
The 360 Communication Systems Protocol Manager is used to provide all uncapped users on our network with the best possible internet experience. During peak network times, we give priority to real time services (such as browsing, email, commercial streaming such as Netflix, Showmax etc), high bandwidth services such as NNTP, Peer-to-Peer and Torrents (and similar but not limited to) will receive less priority.

Clients deemed to be continuously uploading/downloading or using the service for unattended automated processes will be managed by the 360 Communication Systems Protocol Manager. The 360 Communication Systems Protocol Manager may be used to manage clients by rate limiting (slowing down speed) and limiting or preventing service using specific protocols or ports. We reserve the right to use the 360 Communication Systems Protocol Manager to manage the integrity of our network should network capacity not be available at any time, we assure our clients that we will do this in a responsible manner should the need arise. Any user that is found attempting to bypass or circumvent the 360 Communication Systems Protocol Manager will be suspended and could have their service cancelled.

Home Uncapped (DSL and Fibre) – 360 Communication Systems Protocol Manager
Home Uncapped services are managed according to the last 7 days usage projected to 30 days as well as the available capacity on the network at all times.

Any user that is found attempting to bypass or circumvent the 360 Communication Systems Protocol Manager will be suspended and could have their service cancelled.

Premium Plus Uncapped (DSL and Fibre)
Clients deemed to be continuously uploading/downloading or using the service for unattended automated processes or non-typical business protocols (such as but not limited to NNTP, Peer-to-Peer, Https Downloading and Torrents) will be managed by the 360 Communication Systems Protocol Manager. The 360 Communication Systems Protocol Manager may be used to manage clients by rate limiting (slowing down speed) and limiting or preventing service using specific protocols or ports. 360 Communication Systems reserves the right, to at its discretion manage non typical business protocols such as but not limited to NNTP, Peer-to-Peer, Https Downloading and Torrents and/or rate limit service speed.

We reserve the right to use the 360 Communication Systems Protocol Manager to manage services in order to protect the integrity of our network according to the available network capacity, we assure our clients that we will do this in a responsible manner should the need arise.

Any user that is found attempting to bypass or circumvent the 360 Communication Systems Protocol Manager will be suspended and could have their service cancelled.

Hosting

Disk Space on Shared Hosting may only be used for Website Content, Emails and related System Files. General data storage, archiving or file sharing of documents, files or media not directly related to the website content is strictly prohibited. Unauthorised storage or distribution of copyrighted materials is prohibited, via FTP hosts or any other means.

For Shared Hosting, 360 Communication Systems will implement security updates, software patches and other updates or upgrades from time to time, to maintain the best performance, at their sole discretion. 360 Communication Systems is under no obligation to effect such upgrades, or to rectify any impact such changes could potentially have to Shared Hosting Clients.

360 Communication Systems will not be liable or responsible for the backing up, restoration or loss of data under any circumstances. Clients are solely responsible for ensuring their data is regularly backed up and for restoring such backups in the event of data loss or corruption.

360 Communication Systems prohibits Clients from doing the following on hosting platforms administered by 360 Communication Systems:

Running applications that are not production-ready. Any applications on the hosting platform must be optimized with respect to memory usage and must have appropriate data indexing.
Running applications with inadequate security controls.
Generating significant side-channel traffic from an application, whether by design or otherwise. Databases should be stored locally, and remote content should be cached.
Failure to maintain proper “housekeeping” on a shared server including storing or generating useless content, including comment spam, unused cache files, log file and database entries.
Storing malicious content, such as malware or links to malware.
Monopolizing server resources, including CPU time, memory, network and disk bandwidth.
Maintaining long-running processes and long-running database queries.
Storing or running back-door shells, mass mailing scripts, proxy servers, web spiders, phishing content, or peer-to-peer software.
Sending bulk mail of any form, particularly mail that cannot be efficiently delivered due to volume or incorrect addresses.
Using poor passwords.
Sharing security credentials with untrusted parties.
Running Torrents for download or Seed Servers.
Running TOR (or other Online Anonymity Services).
Otherwise circumventing the Acceptable Use Policy or intended use of the product.

Protection of Minors

360 Communication Systems prohibits clients from using 360 Communication System’s service to harm or attempt to harm a minor, including, but not limited to, by hosting, possessing, disseminating, distributing or transmitting material that is unlawful, including child pornography.

Privacy and Confidentiality

360 Communication Systems respects the privacy and confidentiality of our clients and users of our service. Please review our privacy policy which details how we collect and use personal information gathered in the course of operating this service.

User Responsibilities

Clients are responsible for any misuse of Company’s services that occurs through the client’s account. It is the client’s responsibility to ensure that unauthorised persons do not gain access to or misuse 360 Communication System’s service.

360 Communication Systems urges clients not to reply to unsolicited mail or “spam”, not to click on any suggested links provided in the unsolicited mail. Doing so remains the sole responsibility of the client and 360 Communication Systems cannot be held liable for the client being placed on any bulk mailing lists as a result.

Where the client has authorised a minor to use any of the 360 Communication System’s services or access its websites, you accept that as the parent/legal guardian of that minor, you are fully responsible for: the online conduct of such minor; controlling the minor’s access to and use of any services or websites; and the consequences of any misuse by the minor, including but not limited to transactions entered into by the minor using such access.

360 Communication Systems cannot be held liable for any business dealings you have with any third parties on the Internet, including any vendors, or advertisers found on, or through, the 360 Communication Systems network. Further, 360 Communication Systems assumes no responsibility whatsoever for any charges you or any user of your account incurs when making purchases or other transactions in this manner. Further, the responsibility for ensuring compliance with all applicable customs and exchange control laws in connection with any such transactions shall be the client’s.

Notice and Take-down Procedures

360 Communication Systems confirms that it has a procedure in place for the notice and take-down of illegal material. In compliance with section 77 of the Electronic Communications and Transactions Act (No. 25 of 2002) 360 Communication System’s designated agent for this process can be reached at: support@360comz.com

Take-down notice email: support@360comz.com
Take-down notice information and form: https://ispa.org.za/tdn/

Clients are also notified of the content and procedures of the ISPA Code of Conduct (https://ispa.org.za/code-of-conduct/) which may be used against any Internet service provider who fails to comply with the code of conduct. We urge you to familiarise yourselves with this code.

It is the client’s responsibility to familiarise himself or herself with the procedure set out below and report any cases of violation of this AUP to 360 Communication System’s designated complaints handling agent.

Please note that 360 Communication Systems cannot handle complaints concerning networks or users that do not have service contracts with us or our affiliates, or are outside of our control.

In order for 360 Communication Systems to thoroughly investigate the complaint and take appropriate action, all complaints must be in writing, via fax or e-mail and contain as much information as possible, including, but not limited to:

the origin of abuse or offence, including the website, full mail headers, relevant logfile extracts etc;
any contact details for the source of the complaint;
A brief explanation why the incident is considered to be an offence.

360 Communication Systems discourages anonymous complaints being made via this service, and urges complainants to supply their name and contact details to us. Such information will not be released, except where required by law enforcement. Anonymous complaints will however be acted upon as long as sufficient detail as outlined above is supplied.

Action following breach of the AUP

Upon receipt of a complaint, or having become aware of an incident, 360 Communication Systems may take any of the following steps:

In the case of a network, inform the user’s network administrator of the incident and request the network administrator or network owner to deal address the incident in terms of this AUP and the ISPA Code of Conduct;
In severe cases suspend access of the user’s entire network until abuse can be prevented by appropriate means;
In the case of individual users, warn the user; suspend the user’s account and/or revoke or cancel the user’s network access privileges completely;
In all cases, charge the offending parties for administrative costs as well as for machine and human time lost due to the incident;
Assist other networks or website administrators in investigating credible suspicions of any activity listed in this AUP;
Institute civil or criminal proceedings;
Share information concerning the incident with other Internet access providers, or publish the information, and/or make available the users’ details to law enforcement agencies

Reservation and Non Waiver of Rights

360 Communication Systems reserves the right to amend or alter this policy at any time, and without notice to you.

360 Communication Systems reserves the right to take action against any individuals, companies or organizations that violate any of the prohibited activities set out herein, or engage in any illegal or unlawful activity while accessing our services, to the fullest extent of the law.

360 Communication Systems reserves the right, at its sole discretion, to act against other types of abuse not listed in this document and to investigate or prevent illegal activities being committed over our network.

360 Communication Systems reserves the right to monitor user and network traffic for site security purposes and prevent any unauthorised attempts to tamper with our site or cause damage to our property.

360 Communication Systems reserves the right to suspend, revoke or cancel 360 Communication System’s services to the client/user if the safety and integrity of 360 Communication System’s resources are placed at risk in continuing to provide service to the subscriber/user.

360 Communication Systems reserves the right to remove any information or materials in whole or in part, that, in 360 Communication System’s sole discretion, is deemed to be offensive, indecent, or otherwise objectionable.

360 Communication Systems does not undertake to guarantee the security of any data passing through its networks. Although 360 Communication Systems will provide a “best effort” service, including regular updates on computer viruses and other threats to security of data, it is the responsibility of the communicating parties to safeguard their data, and 360 Communication Systems cannot be held liable for any loss or damage arising as result of the failure to do so.

360 Communication Systems does not waive its right to enforcement of this AUP at any time, or prejudice its right to take subsequent action, should 360 Communication Systems fail, neglect or elect not to enforce a breach of the AUP at any time.