The Cyprus mobile operators Code of Practice for the responsible and secure use of mobile services. Final version for publication
|
|
|
- Prosper Taylor
- 9 years ago
- Views:
Transcription
1 The Cyprus mobile operators Code of Practice for the responsible and secure use of mobile services. Final version for publication
2 The Cyprus mobile operators code of practice for the responsible and secure use of mobile services Introduction Cyta and MTN have developed this Code of Practice for application in the Cyprus market with regards to their mobile operations. Mobile services for the purpose of this Code refer to voice, data, messages, multimedia, mobile Internet access and video telephony services. The Code establishes the standards which the operators will adhere to on the issues of: Controls Malicious or offensive person to person communications Unsolicited commercial communications (Spam) Internet access Premium Rate Services Access Controls for Content Services Legislative Context Enforcement Implementation and administration Information and advice The Code represents the minimum agreed common commitment of the mobile industry. Individual operators may introduce additional measures that are consistent with the Code.
3 1. Controls The operators shall maintain measures permissible by law that will give visibility of the mobile phone usage and the services used. The operators shall facilitate on receipt of a valid and lawful request access to a mobile phone account subject to all applicable data protection and privacy laws. This shall allow among others access to the records held by the mobile operator regarding the account, including: numbers called, account balances, and the services available on the mobile phone. Additionally, mobile providers shall allow capabilities to subscribers to customize access to mobile services. These may include specific services, phones, barring or filtering, and/or billing control. Internet Content Access Controls Operators have no control over the content that is offered or is available on the internet oρ through unrecognised third parties, therefore are unable to ensure that such content is classified in accordance with the common classification framework referred to in this Code. 2. Person to Person communications Person to person communications refers to the sending or receiving of communications between two mobile phone/customers. The operators shall make their malicious or offensive communications reporting procedures and policies available to their customers. The operators shall respond to all customer reports of malicious or offensive person to person communications in a prompt and responsible manner and advise customers of the next appropriate steps. The operators shall advise and encourage these customers to forward any complaints to the appropriate authorities. The operators shall fully co-operate with the appropriate authorities in investigating and prosecuting offences. 3. Unsolicited Commercial Communications (Spam) Spam is any unsolicited, unwelcome and/or indiscriminate commercial communication used for direct marketing purposes, including the bulk distribution of messages, where the recipient has no existing or prior relationship with the sending third party. In the case of mobile phone customers, such messages may take the form of unwanted voice, video, sms, mms and s. The operators shall maintain reporting lines for customers to report or forward suspected cases of Spam to them. The operators shall encourage customers to report cases of indiscriminate commercial communication, including bulk distribution of messages, to the appropriate authorities for further investigation where appropriate.
4 4. Internet Access The operators provide a means of access to the Internet; however, they have no control over the content or services accessed by mobile phone users through such access to the Internet. 5. Premium Rate Services The commissioner of electronic communication and post office regulation (CECPR) authorises and supervises the premium rate services within the Cyprus market. In addition, Commissioner classifies the numbering categories of these Premium Rate Services (PRS) which are generally used for the purchase of value-added services such as ringtones, entry to competitions and various types of promotions. Costing more than standard calls and Messages, PRS are run on special number ranges (900-XXX- XX and 909-XXX-XX for calls and 1XXX to 9XXX for Messages). All providers of PRS must adhere to the Regulation of the Commissioner. The operators through their commercial contracts will enforce this Regulation. 6. Access Controls for Content Services offered by the Operators This section sets out the access controls, which will apply to commercial content offered via the operator. Commercial content is any content that involves a discrete commercial arrangement between the mobile operator and the party contracting with the mobile operator (the Content Provider) for the provision of content over the mobile network other than merely by the content provider s consent of access by mobile to its Internet site. The operators will establish an internal procedure that will classify the commercial content offered via their services. The mobile operators through their commercial contracts will enforce these classifications and offering of all Commercial Content Each operator will either independently or with the assistance of Content Providers, place commercial content classified as Age Restricted behind access controls. This content will only be accessible to those customers that are verified as being 18 years of age or over. Mobile operators will introduce a process by which reasonable and practical steps are taken to verify that a customer is 18 or over. The way in which the code is implemented by each of the mobile operators may vary as different technical solutions may be required to suit its specific network structure. 7. Legislative Context The operators remain subject to all relevant legislation, regulatory and statutory requirements that govern the provision of mobile services within Cyprus and the EU. 7a. Classification of Commercial Content The Operators classify their commercial content offered via their services based on national societal standards and consistent with the approach in equivalent media. Classification of content, whether accessible through telecommunications or not, should be consistent with national societal standards regarding decency,
5 appropriateness and legislation. Classification frameworks should consist of at least two categories: content which is suitable only for adult customers and other content. Operators shall ensure that their own brand commercial content is appropriately classified based on existing national classification standards (Cyprus Radio Television Authority). Through their contractual relationships with professional third party content providers, mobile operators shall demand that these providers classify their commercial content under the same national classification approach. 7b. Illegal content Mobile operators shall work with law enforcement agencies to deal with the reporting of content that may break the law. Where operators providing telephony services are hosting messaging content, such an operator shall have in place notify and take down provisions. 8. Enforcement To be compliant with this Code of Practice, the operators must adhere to the following commitments: Publish this Code on their website Maintain and revise appropriate controls Establish and/ or maintain a malicious or offensive communications reporting line for person to person communications Maintain reporting processes for suspected cases of Spam in conjunction with assisting the appropriate bodies Review and update this code as an industry when appropriate over time Provide assistance to law enforcement agencies in the pursuit of criminal investigations. Introduce appropriate access controls for content services in accordance with the provisions set out in the Code of Practice. 9. Implementation and Administration The mobile operators take responsibility for the implementation and administration of this Code. They will keep the Code under review and make changes, where this is deemed necessary, for the Code to remain relevant to customers. Each mobile operator will enforce the terms of the Code through its agreements with content providers. The Code will be implemented on March 01, Information and advice Mobile operators will provide advice to customers - including children and parents - on the nature and use of new mobile devices and services and support other relevant media literacy activities designed to improve the knowledge of consumers. Information on the Code will be available on the web site of each mobile operator. Photios Savvides Chief Executive Officer Cyta Bassel Jamaleddine Chief Executive Officer MTN Cyprus Ltd
Regulatory Policy. Unsolicited Electronic Communications
Regulatory Policy Unsolicited Electronic Communications Version: 1.0 Issue Date: 30 December 2009 Copyright 2009 Telecommunications Regulatory Authority (TRA). All rights reserved. P O Box 26662, Abu Dhabi,
Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012
Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History
GUIDELINES FOR THE PROVISION OF INTERNET SERVICE PUBLISHED BY THE NIGERIAN COMMUNICATIONS COMMISSION
GUIDELINES FOR THE PROVISION OF INTERNET SERVICE PUBLISHED BY THE NIGERIAN COMMUNICATIONS COMMISSION These Guidelines apply to all Licensees providing Internet access services or any other Internet Protocol
University of Birmingham. Closed Circuit Television (CCTV) Code of Practice
University of Birmingham Closed Circuit Television (CCTV) Code of Practice University of Birmingham uses closed circuit television (CCTV) images to provide a safe and secure environment for students, staff
THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA
Communications and Information Technology Commission THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA Final Version 23/02/2008 Submitted to: Submitted By: Acceptance of Deliverable
Data Protection Policy
Data Protection Policy 1. INTRODUCTION 1.1. The Data Protection Act gives you as an individual the right to know what information is held about you. It provides a framework to ensure that personal information
Network Service, Systems and Data Communications Monitoring Policy
Network Service, Systems and Data Communications Monitoring Policy Purpose This Policy defines the environment and circumstances under which Network Service, Systems and Data Communications Monitoring
UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes
INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most
Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY. Commercial-in-Confidence. Issue Number 1.5, 20 November 2012
Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY Commercial-in-Confidence Issue Number 1.5, 20 November 2012 ACCEPTABLE USE POLICY The following is the Telstra Wholesale Acceptable Use
Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:
Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury
Acceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
COBAR SHIRE COUNCIL FILE:P5-90
COBAR SHIRE COUNCIL WORKPLACE SURVEILLANCE POLICY FILE:P5-90 Table of Contents POLICY STATEMENT... 3 INTRODUCTION 3 POLICY RESPONSIBILITIES 4 DEFINITIONS.. 5 REASONS AND REQUIREMENTS FOR SURVEILLANCE...
ELECTRONIC MAIL (E-MAIL) September 2014. Version 3.1
ELECTRONIC MAIL (E-MAIL) September 2014 Version 3.1 Western Health and Social Care Trust Page 0 of 6 E-mail Policy V3.1 Policy Title ELECTRONIC MAIL (E-MAIL) POLICY Policy Reference Number CORP09/006 Original
Unsolicited Electronic Messages Act 2007
Unsolicited Electronic Messages Act 2007 Prohibiting Spam and promoting good business practice This guide provides practical information so businesses can ensure they meet the requirements of the Unsolicited
Consumer Code of Practice on Complaint Handling and Dispute Resolution
Consumer Code of Practice on Complaint Handling and Dispute Resolution Introduction to our company and services: Hive Telecom provides telecoms services to residential customers and businesses. As Hive
Mobile Communication Device
Policy Mobile Communication Device Please note this policy is mandatory and staff are required to adhere to the content Summary Access to mobile communication devices must be properly administered and
Conditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
STATUTORY INSTRUMENTS. S.I. No. 336 of 2011
STATUTORY INSTRUMENTS. S.I. No. 336 of 2011 EUROPEAN COMMUNITIES (ELECTRONIC COMMUNICATIONS NETWORKS AND SERVICES) (PRIVACY AND ELECTRONIC COMMUNICATIONS) REGULATIONS 2011 (Prn. A11/1165) 2 [336] S.I.
Parliamentary Security Camera Policy
Parliamentary Security Camera Policy Introduction 1) Security cameras are employed in various parts of the Palace of Westminster and its surrounding estate. They are a vital part of the security system
INTERNET, E-MAIL USE AND
INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this
If you have any questions about any of our policies, please contact the Customer Services Team.
Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting
To summarise some of the key points of the Regulations are as follows:
Guidance letter to all political parties regarding European and Local Elections Polling day 24th May 2014 Restrictions on Electronic Direct Marketing / Canvassing I am taking the opportunity to write to
YORK REGION DISTRICT SCHOOL BOARD
WORKING DOCUMENT YORK REGION DISTRICT SCHOOL BOARD Policy and Procedure #194.0, Use of Technology Procedure #194.1, Use of Non-Board Devices Procedure #194.2, Password Management The Use of Technology
Compliance and Enforcement Policy. November 2013
Compliance and Enforcement Policy November 2013 Contents 1. Context... 3 2. VBA compliance and enforcement public value... 3 2.1 Purpose...3 2.2 Outcome...3 2.3 Authority...3 2.4 Capability...3 2.4.1 Building...
The Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
AUSTRALIA. Peter Le Guay Cowley Hearne Lawyers Pty Limited [email protected] www.cowleyhearne.com.au
AUSTRALIA Peter Le Guay Cowley Hearne Lawyers Pty Limited [email protected] www.cowleyhearne.com.au 1. Legislation Electronic Marketing Code of Practice Regulating e-marketing activities When:
SMS SERVICE PROVISION
SMS SERVICE PROVISION Terms and Conditions and Privacy Policy Version 2.01 Aug 2015 Page 1 Contents TERMS & CONDITIONS... 3 Registration... 3 Your Personal Information... 3 Our Obligations to SMS Service
Acceptable Use Policy - NBN Services
OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 [email protected] www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:
2.1 It is an offence under UK law to transmit, receive or store certain types of files.
Website Hosting Acceptable Use Policy 1. Introduction 1.1 Jarrett & Lam Consulting s Acceptable Use Policy for hosting customers to protect our resources, the resources of our customers and to ensure that
Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law
Terms and Conditions Acceptable Use Policy Introduction (hereafter called Hosted Developments) has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources, and the resources
Nova ADSL Broadband Service Application Form
Nova ADSL Broadband Service Application Form User ID (your access login; in lowercase, no more than 30 characters & no punctuation): Contact: Surname: Given Name: Company (optional): Charge Company Address:
any Service that involves gambling, betting, adult, sex or over 18 services or information;
emobile Bulk Text Services Terms and Conditions of Use These terms and conditions apply to the supply of the emobile Bulk Text service (the "Service") and are in addition to and form part of the emobile
STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
A PARENT S GUIDE TO MOBILE PHONES
A PARENT S GUIDE TO MOBILE PHONES 1 Preface Currently, nine out of ten Irish people have a mobile phone, and over the last five years, we have become increasingly dependent on the new and evolving mobile
Junk Email Filtering System. User Manual. Copyright Corvigo, Inc. 2002-03. All Rights Reserved. 509-8282-00 Rev. C
Junk Email Filtering System User Manual Copyright Corvigo, Inc. 2002-03. All Rights Reserved 509-8282-00 Rev. C The Corvigo MailGate User Manual This user manual will assist you in initial configuration
ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )
ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
INFORMATION SECURITY INCIDENT REPORTING POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Information Security Incident Management Policy and Procedure
Information Security Incident Management Policy and Procedure Version Final 1.0 Document Control Organisation Title Author Filename Owner Subject Protective Marking North Dorset District Council IT Infrastructure
Marion County School District Computer Acceptable Use Policy
Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through
Rules for the use of the IT facilities. Effective August 2015 Present
Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.
Cablelynx Acceptable Use Policy
Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing
PRIVACY POLICY. comply with the Australian Privacy Principles ("APPs"); ensure that we manage your personal information openly and transparently;
PRIVACY POLICY Our Privacy Commitment Glo Light Pty Ltd A.C.N. 099 730 177 trading as "Lighting Partners Australia of 16 Palmer Parade, Cremorne, Victoria 3121, ( LPA ) is committed to managing your personal
TERMS OF SERVICE TELEPORT REQUEST RECEIVERS
TERMS OF SERVICE These terms of service and the documents referred to in them ( Terms ) govern your access to and use of our services, including our website teleportapp.co ( our site ), applications, buttons,
Niagara County Community College
Niagara County Community College NCCCnet Computer Usage Policy Document: NCCCnet Computer Usage Policy Owner: Chief Information Officer Version: 2.0 NCCCnet Policy Page 1 of 7 NCCCnet Use Policy Introduction:
1st June 2005. Internet Access Service Provider (IASP) Sub-Code for the Communications and Multimedia Industry Malaysia
1st June 2005 for the Communications and Multimedia Industry Malaysia TABLE OF CONTENTS PART 1 - INTRODUCTION...2 PART 2- GENERAL RULES OF THE CODE FOR INTERNET ACCESS SERVICE PROVIDERS...6 PART 3- REVIEW
1. Introduction. 2. Sectoral Areas Affected. 3. Data Security. 4. Data Breach Requirements. 5. Traffic Data
1. Introduction Special data protection rules apply to the protection of Personal Data by Data Controllers in the electronic communications sector. These are in addition to the general obligations that
Memorandum of understanding between the Gambling Commission ( the Commission ) and PhonepayPlus
Memorandum of understanding between the Gambling Commission ( the Commission ) and PhonepayPlus This memorandum provides a framework for cooperation between the Commission and PhonepayPlus ( the Parties
City of Cleveland Social Media Policy
City of Cleveland Social Media Policy Mayor s Office of Communications October 2012 City of Cleveland Social Media Policy and Guidelines for Public Use The City of Cleveland is participating in social
Acceptable Use of Information and Communication Systems Policy
Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help
Regulatory Practices. Australia, New Zealand, UK, Germany, US, Canada and France
Regulatory Practices in Australia, New Zealand, UK, Germany, US, Canada and France (Updated on 19 November 2008) Australia The Australian National Classification Scheme is established by the Classification
SURVEILLANCE AND PRIVACY
info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act
Client Agreement for Investments & Insurances
17 Hamble Road, Swindon, SN25 3PF T: 01793 978184 M: 07984415189 E: [email protected] for Investments & Insurances This document must be read in conjunction with our Service Proposition
Covered California. Terms and Conditions of Use
Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products
Virgin Media Business Acceptable Use Policy (Internet)
Virgin Media Business Acceptable Use Policy (Internet) 1 Introduction 1.1 This Acceptable Use Policy ( AUP ) specifies actions prohibited by Virgin Media Business to users of the Internet Services (in
Terms and Conditions for the Supply of Goods and Services WestOne Virtual Office Group Ltd
Terms and Conditions for the Supply of Goods and Services WestOne Virtual Office Group Ltd 1. General Website Usage 1.1. Welcome to our website. If you continue to browse and use this website you are agreeing
Taking care of what s important to you
A v i v a C a n a d a I n c. P r i v a c y P o l i c y Taking care of what s important to you Table of Contents Introduction Privacy in Canada Definition of Personal Information Privacy Policy: the ten
An overview of UK data protection law
An overview of UK data protection law Our team Vinod Bange Partner +44 (0)20 7300 4600 [email protected] Graham Hann Partner +44 (0)20 7300 4839 [email protected] Chris Jeffery Partner +44
Number 3 of 2011 COMMUNICATIONS (RETENTION OF DATA) ACT 2011 ARRANGEMENT OF SECTIONS
Number 3 of 2011 COMMUNICATIONS (RETENTION OF DATA) ACT 2011 ARRANGEMENT OF SECTIONS Section 1. Interpretation. 2. Non-application of Act. 3. Obligation to retain data. 4. Data security. 5. Access to data.
Computer Technology: Literacy and Usage KINDERGARTEN. Standard 1.0 Students will understand basic operations and concepts of technology.
Computer Technology: Literacy and Usage KINDERGARTEN Standard 1.0 Students will understand basic operations and concepts of technology. 1.1. Students will demonstrate an understanding of the nature and
region16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
Insurance Regulatory Authority
Insurance Regulatory Authority MARKET CONDUCT GUIDELINES FOR INSURANCE INTERMEDIARIES JUNE 2011 THE INSURANCE ACT (CAP 487) MARKET CONDUCT GUIDELINES FOR INSURANCE INTERMEDIARIES TABLE OF CONTENTS 1.0
Zinc Recruitment Pty Ltd Privacy Policy
1. Introduction Zinc Recruitment Pty Ltd Privacy Policy We manage personal information in accordance with the Privacy Act 1988 and Australian Privacy Principles. This policy applies to information collected
Click here for Explanatory Memorandum
Click here for Explanatory Memorandum AN BILLE CUMARSÁIDE (SONRAÍ A CHOIMEÁD) 2009 COMMUNICATIONS (RETENTION OF DATA) BILL 2009 Section 1. Interpretation. Mar a tionscnaíodh As initiated ARRANGEMENT OF
Credit Reporting Privacy Policy of Baybrick Pty Ltd
Credit Reporting Privacy Policy of Baybrick Pty Ltd Introduction 1. This Credit Reporting Privacy Policy is the official privacy policy of Baybrick Pty Ltd and its subsidiaries which includes JBS Australia
2 Easynet Code of Practice for Premium Rate Services and NTS Calls... 7
Table of Contents 1 Easynet Code of Practice for Domestic and/or Small Business Customers... 2 1.1 Introduction to our company and services.... 2 1.2 Purpose of this Code of Practice... 2 1.3 How to contact
