Acceptable Use Policy for Business Internet
This policy and you
- We want your business and the other customers of broadband services to enjoy these services to the full. This means that your use of CBL’s REVNET services should respect the rights of others, and here we set out a few rules for your business to follow. We also explain what we may do if you don’t follow them.
- By using our services, your business agrees to follow these rules. We may update them from time to time, and we’ll give you one month’s notice of any changes. If you don’t agree to this policy or the changes, you must let us know and stop using our services.
- This policy applies to your business’s employees and any other people who use your broadband equipment, services and connections, and your business will be responsible for ensuring that they follow this policy. You are also responsible for all content that your business uses or puts online and for the materials and data on your devices, as well as for your own websites and your pages on other peoples’ websites. We do not take any responsibility for such content.
- While using our services, your business must comply with the laws of The Bahamas. For example, your business must not:
• carry out, promote or assist illegal activities, such as terrorism, fraud, pyramid schemes, human trafficking or child pornography
• promote or threaten violence towards anyone
• host, post, transmit or disseminate any unlawful material or any material considered harmful to minors or vulnerable people
• abuse or harass anyone, for example, by making offensive, libellous, obscene, misleading or menacing comments
• encourage hatred, for example, by making racist, sexist, discriminatory or ethnically offensive comments
• infringe other people’s or organisations’ copyright or intellectual property.
- You’ll want to keep the equipment which your business uses for our services secure and safe, and you should help other people do the same. So your business must:
• ensure your devices have the right firewall, anti-virus protection and appropriate password protection
• keep your passwords secure, including those used to access our services
• prevent unauthorised access to your equipment or network, or to our services
• not hack, send viruses, spyware, malware or corrupted files to other people’s (including our) devices, servers or networks
• not use or distribute tools that compromise the security of other people’s equipment, systems or networks
• prevent your devices from being used to monitor, overload, interfere with, gain unauthorised access to, or deny service on other people’s accounts, websites, applications, servers or networks
• not impersonate someone else, or misrepresent who you are (like using fake email headers, signatures, sender names or address, or caller identification details)
• not falsify user or transmission information, such as email headers, Internet Protocol addresses, or contact information
• not claim to represent us in communications with others
• comply with the licence conditions applying to any software which comes with our services.
Protect other people’s privacy
- People don’t like their privacy being invaded. So your business must not:
• send unsolicited communications to people or groups without their agreement (such as spam, mailbombs, chain letters and nuisance calls)
• intentionally distress, offend or worry anyone (through things like hoax calls or upsetting emails)
• use our services contrary to the generally accepted moral standards in The Bahamas
• intercept other people’s data or obtain information from them fraudulently
• behave deliberately in a way that might harm children or other vulnerable people
• interfere with people’s rights to privacy and their legal enjoyment of broadband services.
Share our network fairly
- CBL’s business packages give you access to world-class broadband services. To help us to provide these services:
• you must not restrict or degrade our ability to deliver or monitor our services
• unless you have our agreement, you must not distribute, resell or provide broadband or network services to other businesses or people.
Making this policy work
- If we think your business has breached this policy, we may:
• look into the breach
• monitor your business’s bandwidth, usage or content
• contact you to discuss the apparent breach (using your personal details to make contact with you)
• issue your business with a formal warning
• restrict your access to any material or data, including websites and email accounts
• remove any unacceptable content, or suspend or delete your web pages
• block, limit or suspend your access to or consumption of any or all of our services
• terminate your agreement with us and your access to our services (with or without notice)
• recover from your business the costs that we have reasonably incurred as a result of the violation
• take any other legal or technical action that we deem appropriate.
If you agree in writing to stop committing the breach, we may lift the restrictions or restore your service.
- In serious cases, we may report your business to the police or another law enforcement agency, and give them your personal information. Sometimes, we might be asked by public bodies such as law enforcement agencies to give information about you. If those requests are lawful, we obey them. We may also cooperate with other internet, computer facilities or network providers to enforce this policy and their policies.
- If you think that someone else has breached this policy and you want to report them to us, you should get in touch with us at: firstname.lastname@example.org
- If you want to understand more about any of the points in this policy, please do contact us at: email@example.com