Acceptable use image.jpg

Acceptable Use Policy

Version: 2.0

The purpose of this Acceptable Use Policy is to establish appropriate and acceptable practices regarding the use of the Service and to protect users from illegal, inappropriate or damaging actions by individuals, either knowingly or unknowingly.

The Policy forms part of the any licence agreement (including the End User Licence Agreement).

For the purpose of this Policy, the term Service is a reference to MICROHUB.


1           Your Obligations and Prohibited Use

1.1       You must not access, nor permit any other party to access, the Service for any purpose or activity of an illegal, fraudulent or defamatory nature or any other nature contrary to law or statute.

1.2       You must not use the Service other than in accordance with any applicable licence agreement including the End User Licence Agreement.

1.3       It is the responsibility of every user to know and understand the terms of this Policy and to conduct their activities accordingly.

1.4       You must not use the Service:

(a)        to make available any material that is illegal;

(b)        to provide unrestricted access to material that is unsuitable for minors;

(c)        to transmit or display (or permit any other party to use the Service to transmit or display) threatening, obscene, offensive or abusive materials, or engage in any form of harassment when using the Service (or when permitting any other party to use the Service);

(d)        to attempt to access any data, documents, email correspondence, and program for which you do not have access;

(e)        to send messages to any individual who has indicated that he/she does not wish to receive messages from you;

(f)         in a way which causes or is likely to cause significant network congestion, disruption or otherwise adversely affect a supplier’s network;

(g)        to send, allow to be sent, or assist in the sending of Spam;

(h)        to use or distribute any software designed to harvest email addresses;

(i)         to otherwise breach the Spam Act 2003 (Cth) or the Spam Regulations 2004 (Cth);

(j)         to adversely affect another person’s use of or access to the Service, or a supplier’s network; or

(k)        to be used to host any device or service that allows email to be sent between third parties not under your authority or control.

1.5       You will not act through the Service, or use the Service, to block or disrupt access by other users, service providers, their computers, software or hardware. Such actions include, but are not limited to attempting to gain unauthorised access to another computer system, unauthorised copying, monitoring, modification or destruction of information held on another computer system, unauthorised copying or dissemination of material protected by copyright or propagating computer viruses, worms and other types of malicious programs, probing, scanning or testing the vulnerability of a system or network, breaching any security or authentication measures for a system or network, accessing the account or private information of any other user, accessing any server in violation of any acceptable use policy of that server, denial of service attacks, flooding of a network, overloading a service, improper seizing and abuse of operator privileges and attempts to "crash" a host.

1.6       You will not reproduce, distribute, transmit, publish, copy, transfer or commercially exploit any information or material of any kind (including but not limited to information or material accessed through or received from the Service) that infringes any copyright, patent, trade mark, design or other intellectual property right or, in our reasonable opinion, is likely to mislead or deceive any person accessing the relevant information or material.

1.7       You must respect the privacy of others when accessing and using the Service.

1.8       You must, in accessing and using the Service, only use software that you are legally entitled to use and such use must not infringe any third party intellectual property rights.

1.9       You must not use the Service for any fraudulent activities, including impersonating any person or entity or forging anyone else’s digital or manual signature.

1.10    You must not use (or attempt to use) or distribute tools designed for compromising security (such as password guessing programs, cracking tools, packet sniffers or network probing tools).

1.11    You must not share your account details or passwords or similar information used for identification and authorisation purposes.

1.12    You are responsible for any content you store, send or distribute on or via our Service and systems including, but not limited to, content you place or post on web pages, email, chat or discussion forums, bulletin boards, instant messaging and SMS.

1.13    Commonwealth legislation allows the Australian Communications and Media Authority (ACMA) to direct us to remove from our network and servers any content which is classified, or likely to be classified, as 'prohibited' content. You must not hinder or prevent us from taking all steps necessary to comply with any direction from ACMA or any other law enforcement or security agency.

2           Our Rights

2.1       We reserve the right to remove any information, data or materials, in whole or in part (or limit, suspend or terminate your use of and access to the Service), regardless of whether such material or its dissemination is unlawful:

(a)        that we, in our sole discretion, deem to be offensive, obscene, indecent, illegal or otherwise inappropriate; or

(b)        if your use of the Service and/or the data you have uploaded using the Service is subject to any investigation by law enforcement or regulatory authorities.

2.2       We are under no obligation to monitor transmissions or published content on the Service. However, we or our agents have the right to monitor such transmissions or published content from time to time.

2.3       For security and network maintenance purposes, authorised individuals or Microhub may:

(a)        monitor equipment, network traffic and Service usage;

(b)        view any material on the system, including material that a user has deleted; or

(c)        monitor and record a user’s information input or output, or other use, of the system, at any time without notice to users.

2.4       We reserve the right to:

(a)        audit networks and systems on a periodic basis to ensure compliance with this Policy;

(b)        scan any IP address ranges allocated to you for your use with the Service in order to detect the presence of open or otherwise misconfigured mail/proxy/other servers; and

(c)        limit, suspend or terminate your:

(1)       access to the Service; and/or

(2)       project account storage,

if you engage in Excessive Use or if necessary (in our absolute discretion).

2.5       This Policy is supplementary to and does not limit any of our rights under any licence agreement (including the End User Licence Agreement).

2.6       We reserve the right to suspend, limit or terminate your access to the Service if you are in breach of this Policy. This right applies regardless of whether the breach is committed intentionally, through misconfiguration, or by other means not authorised by you including but not limited to through a Trojan horse or virus.

2.7       We may vary this Policy by posting a revised version on the website or by otherwise notifying you in accordance with your licence agreement (or End User Licence Agreement). The modified terms will become effective upon posting, or, if we notify you by email, as stated in the email message. By continuing to use the Service after the effective date of any modifications to this Policy, you agree to be bound by the modified terms.

2.8       In the event of any inconsistency between this Policy and any licence agreement (including an End User Licence Agreement), the licence agreement (or End User Licence Agreement) will prevail to the extent of the inconsistency.

3           DEFINITIONS

3.1       In this Policy:

Excessive Use is a continuing and unreasonably disproportionate use of the Service or storage of data or information (in connection with a project account) when compared to other users.

Spam includes one or more unsolicited commercial electronic messages with an Australian link for purposes of the Spam Act 2003 (Cth), and derivations of the word “Spam” have corresponding meanings.