1st June Internet Access Service Provider (IASP) Sub-Code for the Communications and Multimedia Industry Malaysia
|
|
|
- Preston Bryan
- 10 years ago
- Views:
Transcription
1 1st June 2005 for the Communications and Multimedia Industry Malaysia
2
3 TABLE OF CONTENTS PART 1 - INTRODUCTION...2 PART 2- GENERAL RULES OF THE CODE FOR INTERNET ACCESS SERVICE PROVIDERS...6 PART 3- REVIEW AND AMENDMENTS...14
4
5 PART 1 INTRODUCTION 1. Background 1.1 The Communications and Multimedia Act 1998 (CMA 1998) seeks to establish a regime of industry self-regulation, supported by fallback regulatory standards that may be administered by the Malaysian Communications and Multimedia Commission (MCMC). 1.2 Pursuant to section 189 of CMA 1998, MCMC had designated the Communications and Multimedia Consumer Forum of Malaysia (Consumer Forum) as the consumer forum in March The Consumer Forum has been given the responsibility to develop sub-codes for dealing with matters relating to the protection and promotion of consumer interests in relation to specific services including, but not limited to, the matters listed in the CMA (a) The Consumer Forum has identified the Internet Access Service Provider Sub-Code (hereinafter referred to as the IASP Code ) as being one of the important sub-codes for the Consumer Forum to be developed at this juncture. (b) A permanent working committee appointed pursuant to Article 19 of the Constitution of Forum Pengguna Komunikasi dan Multimedia Malaysia made up of relevant parties from both the demand and supply side of the communications and multimedia services drafted the following IASP Code. 2. Preamble 2.1 This IASP Code is cognizant of the constant state of profound technological change that is characteristic of the communications and multimedia industry.
6 2.2 As technologies innovate new operating conditions, this IASP Code may need to be updated to nurture, conserve and protect the objectives of this IASP Code. Objectives of the Code 3.1To promote the free-flow of information and communications over the Internet; 3.2To set out a code of practice for Internet Access Service Providers. 3.3 To improve the standard of conduct within the industry. 4. Definitions 4.1 All capitalised terms in this IASP Code shall bear the same definition as contained in the General Consumer Code of Practice for the Communications and Multimedia Industry Malaysia (GCC) unless specifically otherwise provided herein. 4.2 For the purpose of this Code: Acceptable Use Policy or AUP means a policy defined by the Service Provider as to the acceptable nature of use of a service subscribed. Child means all persons under the age of 18 years as defined by the Child Act Code means this IASP Code. Consumer Forum means the Consumer Forum of Malaysia set up pursuant to the CMA
7 CMA 1998 means the Communications and Multimedia Act 1998 including any amendments thereto from time to time. Consumer means a person who receives, acquires, uses or subscribes to the Internet access service provided by any Service Provider. This includes a Customer. Customer means a person who, for consideration, acquires or subscribes to the Internet access service provided by any Service Provider. GCC means General Consumer Code of Practice for the Communications and Multimedia Industry Malaysia. Guardian means natural parent or any person having care and control over a child. Internet means a global information system that is able to support communications using the Internet Protocol (IP) suite or its subsequent extensions/follow-ons, and/or other IP-compatible protocols. Internet Access Service means an applications service whereby a person is able to access Internet services and applications. Internet Access Service Provider or IASP means a person who provides Internet Access Service. MCMC means the Malaysian Communications and Multimedia Commission established under the Malaysian Communications and Multimedia Commission Act
8 Personal Information means any information collected by the Service Provider from the Customer that identifies the Customer. Service Provider means the service provider as set out in Section 5.1 (Part 1). Spam means unsolicited electronic messages sent through various communication modes including but not limited to s, mobiles short message (SMS) or instant messaging services where there is no prior relationship between the sender and the recipient regardless of content whether commercial or non-commercial messages including malicious program and/or data. Website means a file that contains text, audio and/or visual data accessible on the World Wide Web by a single Uniform Resource Locator (URL). World Wide Web means the network of websites accessible on the Internet using including, but not limited to, the Hypertext Transfer Protocol ( http ). 5. Scope 5.1 This Code shall be applicable to the following:- (a) IASPs; (b) Other persons or class of persons as may be directed by MCMC; and (c) Members of the Consumer Forum. (For the purposes of this IASP Code, the code subjects shall be referred to as Service Providers.) 5.2 This IASP Code may be amended from time to time. 4
9 5.3This IASP Code is developed pursuant to Clause 6.2, Part 1of the GCC to address the specific needs of the Internet services industry. 5.4This IASP Code is to be read in addition to and not in derogation of the GCC. The GCC will govern all sub-codes unless expressly otherwise provided in the sub-codes. 5.5This IASP Code shall come into effect upon registration in accordance with the CMA However, Service Providers shall be granted a grace period of six (6) months, or such period as may be extended by the Council of the Consumer Forum to comply with the provisions of this IASP Code. 5
10 PART 2 GENERAL RULES OF THE CODE FOR INTERNET ACCESS SERVICE PROVIDERS The IASP Code general rules are as follows:- 1. The IASP Code Guiding Principles 2. Protection of Personal Information 3. Provision of Information 4. Provisioning of Services 5. Anti-Spam Measures 6. Policy on Information Network Security 7. Content 8. Billing 9. Protection of Minor 10. Handling of Customer Complaints and Disputes Principle of Compensation 1. The IASP Code Guiding Principles 1.1 The communications and multimedia industry will strive to achieve the following principles: (a) The National Policy Objectives as set out in the CMA 1998; (b) The Code objectives as set out in Clause 5, Part 1 of the GCC; and (c) The Fundamental Principles for Service Providers as outlined Clause 1(A), Part 2 of the GCC for the communications and multimedia industry of Malaysia. 6
11 2. Protection of Personal Information 2.1 The relevant provisions in the GCC on protection of consumer information (namely the provisions of Clause 2, Part 2 of the GCC) are applicable to the IASP Code. 3. Provision of Information 3.1 Service Providers shall comply with all the relevant provisions contained in the GCC on the provision of information regarding services, rates and performance. 3.2Consumers shall be provided with adequate description of the service offered prior to entering into the contract of sale. All material features of the services such as bandwidth, speed and availability (i.e. coverage) should be described in simple language that is easily understood. 3.3The IASP Code should impose an obligation on all Service Providers to publish and adhere to an acceptable use policy, which in all cases would be a condition of sale. This policy shall, at the minimum, include: (a) Information to Consumers about their legal obligations and liabilities in making use of the services provided by the Service Provider; (b) Information to Consumers about the responsibilities of the Service Providers in ensuring that the Customers adhere to their legal obligations; (c) Information on Internet use etiquette; (d) A description of practice, which are abusive and therefore prohibited; and 7
12 (e) Subject to the anti-spam measures herein provided, an indication of the type of remedial measures that may be taken by the Service Providers in respect of defaulting Customers. 3.4Service Providers shall take reasonable steps to notify all Consumers of their policy on privacy prior to the entering into the contract of sale. 3.5Any changes in policies developed by the Service Providers should also be communicated to the Consumers as soon as practicable. 4. Provisioning of Services 4.1Service Providers will provide services and products in a responsible manner, ensuring that the services that they provide to their Customers meet the service levels as contractually agreed between the Service Providers and the Customers. 4.2Service Providers shall endeavour to provide consistent and reliable access to the services. 4.3Service Providers shall give adequate notice to their Customers of any planned interruptions of service. 4.4Service Providers shall not discriminate unduly between persons or classes of persons in the provision of their services or any related matters and shall provide equal access to all Customers. 5. Anti-Spam Measures 5.1The Service Providers should address concerns about Spam and consider methods of managing such issues in such a way to ensure the protection of the Customers interest. The Service Provider may consider the following measures in dealing with these issues: - 8
13 (a) To articulate a specific definition for Spam so as to be clear what is being addressed. (b) To include the following general principles as contractual conditions in agreements entered into between the Service Providers and Customers who may have the propensity to produce Spam:- (i) The Customer shall not engage in sending Spam messages; (ii) Any breach of conditions shall result in the suspension and/or termination of the Customer account. Such Customer may appeal for reactivation of the said account in accordance with the Service Provider s prevailing policies and procedures; (iii) Service Providers should provide specific guidance (in the form of an Acceptable Use Policy (AUP)) on when sanctions or suspension and termination of account would be imposed. The Acceptable Use Policy should impose an obligation on the Customer to ensure that all commercial e- mails sent out by the Customer are accompanied by or include the following information:- (a) (b) (c) (d) (e) Header information that is not false, deceptive or misleading A valid return address Functional unsubscribe facility (ie "opt out" facility) Identity of sender Message be clearly labeled as commercial communication (eg [ADVERTISEMENT] for advertisements, [COMMERCIALS] for commercials etc.) 9
14 For the purpose of this provision, "commercial electronic message" shall mean any electronic message that can be concluded to be for the purpose of advertising, highlighting, promoting, selling and/or offering to supply any goods, property, service and/or business or investment opportunity. (iv)the Service Providers should also provide their policies and procedures in reactivating the services suspended due to violation of the AUP. 5.2In addition to the terms and conditions outlined above in the service contract with their Customers, Service Providers should also consider implementing some technical measures to assist in curbing Spam. 5.3In addition to Section 5.1(b)(iv), the Service Providers shall have a written procedure for handling incidents of Spam. This procedure should be publicly available either in print and/or on a web site. Examples of such procedure may be as follows:- (a) There shall be an abuse account. Mail sent to this account shall be routed to a responsible person or those who have the ability to investigate and take action on such complaints; (b) All complaints sent to the abuse account shall be replied to. All complaints should be investigated within certain period of time and proper and timely replies should be given to complainants (c) Complaints shall be investigated and action must be taken against users flouting the terms and conditions referring to Spam. Even if investigation reveals no fault on the part of the Service Provider or 10
15 user, the Service Provider is encouraged to help the complainant to resolve their complaint. 5.4 The Service Provider shall make available on its website information on anti-spamming measures regarding its Customers. Such information may include IP addresses suspended and/or blocked by the Service Provider and/or any anti-spamming monitoring bodies such as Spamhaus and Spamcop. The said information shall be updated on a weekly basis. 6. Policy on Information Network Security 6.1Service Providers should have a guideline on how to implement security in their network and there must be some level of standard procedures to be (a) Business Continuity Planning There must be a business continuity plan in place to counteract interruptions to business activities and to critical business processes from the effects of major failures or disasters. (b) (c) followed. The policy may cover the following areas:- System Access Control Access Control System should be in place to ensure the following:- (i) to control access to information (ii) to prevent unauthorised access to information systems (iii) to ensure the protection of networked services (iv) to prevent unauthorized computer access (v) to detect unauthorised activities. System Development and Maintenance Service Providers should also put in place policies on system development and maintenance so as to ensure the following:- (i) security is built into operational systems; 11
16 (ii) (iii) (iv) (v) to prevent loss, modification or misuse of user data in application systems; to protect the confidentiality, authenticity and integrity of information; to ensure IT projects and support activities are conducted in a secure manner; to maintain the security of application system software and data. (d) Physical and Environmental Security Policies must be put in place to prevent: - (i) unauthorised access; (ii) damage and interference to business premises and information; (iii) loss, damage or compromise of assets and interruption to business activities; and (iv) compromise or theft of information and information processing facilities. (e) Compliance The policies in place must clearly set the following:- (i) to avoid breaches of any criminal or civil law, statutory, regulatory or contractual obligations and of any security requirements (ii) to ensure compliance of systems with organizational security policies and standards (iii) to maximize the effectiveness of and to minimize interference to/from the system audit process. (f) Security Organisation The policies in place must clearly set the following: 12
17 (i) (ii) (iii) to manage information security within the Company; to maintain the security of organizational information processing facilities and information assets accessed by third parties to maintain the security of information when the responsibility for information processing has been outsourced to another organization. (g) Computer & Network Management The policies in place must clearly set the following: (i) to ensure the correct and secure operation of information processing facilities; (ii) to minimise the risk of systems failures; (iii) to protect the integrity of software and information; (iv) to maintain the integrity and availability of information processing and communication; (v) to ensure the safeguarding of information in networks and the protection of the supporting infrastructure; (vi) to prevent damage to assets and interruptions to business activities; (vii) to prevent loss, modification or misuse of information exchanged between organizations. (h) Asset Classification and Control To maintain appropriate protection of corporate assets and to ensure that information assets receive an appropriate level of protection. 6.2 Service Providers are required to ensure that their policy on information and network security is in compliance with and subject to other general guidelines such as frameworks and determinations issued as well as framework and determinations to be issued by MCMC and Ministry of Energy, Water and Communications from time to time. 13
18 14
19 7. Content Reference should be made to the relevant provisions of the Content Code in this regard. 8. Billing Reference should be made to the relevant provisions of the GCC in this regard. 9. Protection of Minor 9.1 Service Providers will take reasonable steps to ensure that post- paid Internet access accounts are not provided to any child without the consent a Guardian. For the avoidance of doubt this obligation shall not be applicable to the pre-paid Internet access services. 9.2 Service Providers should take reasonable steps to provide Customers with:- (a) information on supervising and controlling a child s access to Internet content; (b) procedures which Guardians can implement to control a child s access to Internet content, including the availability, use and appropriate application of Internet content filtering software. (c) notifying the Consumers : if you are below 18 years of age prior consent of a guardian is required before you are allowed to subscribe to a post -paid Internet access account prior to the sale of the service. 15
20 10. Handling of Customer Complaints and Disputes Reference should be made to the relevant provisions in the GCC in this regard. 11. Principle of Compensation Reference should be made to the relevant provisions of the GCC in this regard. 16
21 PART 3 REVIEW AND AMENDMENTS 1. Review and Amendments 1.1 A review of this IASP Code shall be conducted by the Consumer Forum: (a) Within 12 months from the date of implementation of this IASP Code; and/ or (b) As and when the Consumer Forum deems it necessary. (In line with the stipulated review at least every three years as stated in Clause 4.1 of the GCC). 1.2 Any amendments to this IASP Code shall go through the process of public consultation for a minimum of 45 days. The Consumer Forum will inform the MCMC of any amendments made to this IASP Code. Any amendments to the IASP Code shall only be effective upon registration by MCMC. 17
Regulatory Policy. Unsolicited Electronic Communications
Regulatory Policy Unsolicited Electronic Communications Version: 1.0 Issue Date: 30 December 2009 Copyright 2009 Telecommunications Regulatory Authority (TRA). All rights reserved. P O Box 26662, Abu Dhabi,
Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
Acceptable Use Policy
Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive
Acceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
How To Make A Contract Between A Client And A Hoster
Web Hosting Terms & Conditions Please read these web-hosting terms carefully, as they set out our and your rights and obligations in relation to our web hosting services. AGREEMENT: Whereas: (1) The Ruby
ELECTRICITY SUPPLY/ TRADE LICENSE KORLEA INVEST A.S
Hamdi Mramori Street, No 1 Prishtina 10000 Kosovo Tel: +381 (0) 38 247 615 ext. 103 Fax: +381 (0) 38 247 620 e-mail: [email protected] www.ero-ks.org ELECTRICITY SUPPLY/ TRADE LICENSE GRANTED TO: KORLEA
Virgin Media Business Acceptable Use Policy (Internet)
Virgin Media Business Acceptable Use Policy (Internet) 1 Introduction 1.1 This Acceptable Use Policy ( AUP ) specifies actions prohibited by Virgin Media Business to users of the Internet Services (in
Internet Services Terms and Conditions
Internet Services Terms and Conditions 1. These terms and conditions These General Terms and Conditions apply to you if you are a business or residential telecommunications customer of Telnet Telecommunication
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224
COUGAR WIRELESS ACCEPTABLE USE POLICY I. INTRODUCTION Cougar Wireless and its various affiliates and subsidiaries (collectively we, us, our ) are committed to being responsible network citizens. To assist
Acceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
7.08.2 Privacy Rules for Customer, Supplier and Business Partner Data. Directive 7.08 Protection of Personal Data
Akzo Nobel N.V. Executive Committee Rules 7.08.2 Privacy Rules for Customer, Supplier and Business Partner Data Source Directive Content Owner Directive 7.08 Protection of Personal Data AkzoNobel Legal
Best Practice Standards for Email Marketing
Best Practice Standards for Email Marketing Updated January 2008 Scope The Marketing Association s emarketing Network (emn) champions the adoption of industrywide standards of best practice and ethical
Data Protection. Processing and Transfer of Personal Data in Kvaerner. Binding Corporate Rules Public Document
Data Protection Processing and Transfer of Personal Data in Kvaerner Binding Corporate Rules Public Document 1 of 19 1 / 19 Table of contents 1 Introduction... 4 1.1 Scope... 4 1.2 Definitions... 4 1.2.1
THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA
Communications and Information Technology Commission THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA Final Version 23/02/2008 Submitted to: Submitted By: Acceptance of Deliverable
General Consumer Code of Practice for the Communications and Multimedia Industry Malaysia
General Consumer Code of Practice for the Communications and Multimedia Industry Malaysia Communications and Multimedia Consumer Forum of Malaysia (CfM) October 2003 TABLE OF CONTENTS Page PART 1 INTRODUCTION
MNI Networks Limited Acceptable Use Policy
This Acceptable Use Policy ("AUP") sets out the actions prohibited to users of the MNINET Network ( MNINET ). Users are defined as anyone who uses or accesses the.ms domain registry, who has responsibility
GUIDELINES FOR THE PROVISION OF INTERNET SERVICE PUBLISHED BY THE NIGERIAN COMMUNICATIONS COMMISSION
GUIDELINES FOR THE PROVISION OF INTERNET SERVICE PUBLISHED BY THE NIGERIAN COMMUNICATIONS COMMISSION These Guidelines apply to all Licensees providing Internet access services or any other Internet Protocol
FAX-TO-EMAIL END-USER LICENSE AGREEMENT
FAX-TO-EMAIL END-USER LICENSE AGREEMENT This Agreement, which governs the terms and conditions of your use of the Fax-to-Email Services, is between you ("you" or "End-User") and ( we, us, our or Company
Standard of Electronic Fundraising Practice
Standard of Electronic Fundraising Practice The Standard of Electronic Fundraising Practice provides practical guidelines for FINZ members for best practice for conducting electronic fundraising activities,
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
Acceptable Use Policy - NBN Services
OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 [email protected] www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:
Service Schedule for Business Email Lite powered by Microsoft Office 365
Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft
Acceptable Use Policy
Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND
SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003
SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003 On December 16, 2003, President Bush signed into law the CAN-SPAM Act of 2003. CAN-SPAM stands for "Controlling the Assault of Non-Solicited Pornography
Website Hosting Agreement
Website Hosting Agreement This Agreement is Between: (1) Tutch Media Limited, a company registered in England whose office is at 121c London Road, Knebworth, Herts, SG3 6EX ( the Host ) and (2) The Client
Special Terms and Conditions for HGC Business email Services
Special Terms and Conditions for HGC Business email Services 1. Description a. The Services are the HGC Business email Services, which is more particularly defined in the Order Form. The Services are provided
Code of Conduct Exemption Request Form
Code of Conduct Exemption Request Form Internet Corporation for Assigned Names and Numbers ( ICANN ) 12025 Waterfront Drive, Suite 300 Los Angeles, California 90094 Attention: New gtld Program Staff RE:
Information Security Policy
Office of the Prime Minister document CIMU P 0016:2003 Version: 2.0 Effective date: 01 Oct 2003 Information 1. statement i) General The Public Service of the Government of Malta (Public Service) shall
FKCC AUP/LOCAL AUTHORITY
FKCC AUP/LOCAL AUTHORITY The information contained in this section has its basis in Public Law 93.380. It is further enhanced however, by Florida State Board of Education Administrative Rule 6A-14.51 and
USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY
USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY CONDITIONS OF USE FOR ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY Between: the Commonwealth of Australia, acting
Acceptable Use Policy ("AUP")
Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while
ZIMPERIUM, INC. END USER LICENSE TERMS
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
AMAA Email Distribution Standards
AMAA Email Distribution Standards Audited Media Association of Australia Limited ACN 163 161 402 (A public company limited by guarantee) June 2014, Release Version 1 Table of Contents 1. INTRODUCTION...
LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY
LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY 1. Introduction LETABA WIRELESS INTERNET CC is committed to complying with legislation and ensuring that all its customers have the ability to use its
Service Schedule for BT Business Lite Web Hosting and Business Email Lite powered by Microsoft Office 365
1. SERVICE DESCRIPTION 1.1 The Service enables the Customer to: set up a web site(s); create a sub-domain name associated with the web site; create email addresses. 1.2 The email element of the Service
Terms of Use of MiMafia.com
Terms of Use of MiMafia.com The website www.mimafia.com (hereinafter referred to as Website ) allows you to manage a text-based online multi-player mafia game (the Game ), and to also play Games managed
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
CHECKLIST ISO/IEC 17021:2011 Conformity Assessment Requirements for Bodies Providing Audit and Certification of Management Systems
Date(s) of Evaluation: CHECKLIST ISO/IEC 17021:2011 Conformity Assessment Requirements for Bodies Providing Audit and Certification of Management Systems Assessor(s) & Observer(s): Organization: Area/Field
region16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
www.echoromeo.co.uk Web Hosting Contract
www.echoromeo.co.uk Web Hosting Contract 47 Glenmoor Road Ferndown Dorset BH22 8QE Ferndown: +44 (0)845 508 96 21 Aldershot: +44 (0)845 154 98 97 E-Mail: [email protected] This Agreement is Between:
Arkansas State Board of Public Accountancy
APPENDIX ONE PHYSICAL ADDRESS The principle office and official address of the Board is as follows: Arkansas State Board of Public Accountancy, 101 East Capitol Avenue, Suite 450, Little Rock, AR 72201.
The Australian Guidelines for Electronic Commerce
The Australian Guidelines for Electronic Commerce March 2006 Commonwealth of Australia 2006 ISBN 0 642 74333 9 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Cablelynx Acceptable Use Policy
Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing
Sure Unlimited and Pro Broadband Service
Sure Unlimited and Pro Broadband Service SURE UNLIMITED AND PRO BROADBAND PRODUCT DESCRIPTION The Sure Unlimited and Pro Broadband services from Sure Jersey Limited are always-on Internet connections.
Acceptable Use and Publishing Policy
1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy
8 Securities Limited ( 8Sec ) reserves the right to update and change the TOS from time to time without notice or acceptance by you.
1. Acceptance of Terms Welcome to s Social Trading (the Social Trading Features ). Social Trading Features provide an integrated solution of equity trading and exploration of interactions among investors
Hotwire Communications High-Speed Internet Acceptable Use Policy
Hotwire Communications High-Speed Internet Acceptable Use Policy Terms of Use This website is an online information and communication service provided by Hotwire Communications. Please read these Terms
STANDARD HOSTING AGREEMENT
Elysium Ltd Head Office Milton House Whitehill Road Crowborough East Sussex TN6 1LB Phone: +44 (0)1892 667411 Fax: +44 (0)1892 667433 Web: www.elysium.ltd.uk Email: [email protected] STANDARD HOSTING
Privacy, Data Collection and Information Management Practice Team November 13, 2003
Overview of Current Anti-Spam Regulations Privacy, Data Collection and Information Management Practice Team The proliferation of unsolicited commercial e-mail, more commonly known as spam, has prompted
DATA PROTECTION LAWS OF THE WORLD. Panama
DATA PROTECTION LAWS OF THE WORLD Panama Date of Download: 19 November 2015 PANAMA Last modified 26 January 2015 LAW IN PANAMA In recent years, Panama has taken significant legislative steps to regulate
We ask that you contact our Privacy Officer in the event you have any questions or concerns regarding this Code or its implementation.
PRIVACY AND ANTI-SPAM CODE FOR OUR DENTAL OFFICE Please refer to Appendix A for a glossary of defined terms. INTRODUCTION The Personal Health Information Act (PHIA) came into effect on December 11, 1997,
Acceptable Use Policy of UNWIRED Ltd.
Acceptable Use Policy of UNWIRED Ltd. Acceptance of Terms Through Use This site provides you the ability to learn about UNWIRED and its products and services as well as the ability to access our network
CODE GOVERNANCE COMMITTEE CHARTER. 1 Functions and responsibilities of the Code Governance Committee
CODE GOVERNANCE COMMITTEE CHARTER 1 Functions and responsibilities of the Code Governance Committee 1.1 Consistent with the Code and the Constitution, the Code Governance Committee shall be responsible
Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012
Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History
Our Customer Relationship Agreement HOSTING & DOMAINS SERVICE DESCRIPTION
Our Customer Relationship Agreement HOSTING & DOMAINS SERVICE DESCRIPTION iinet Limited ACN 068 628 937 Phone: 13 22 58 Westnet Pty Ltd ACN 086 416 908 Phone: 1300 786 068 Adam Internet Pty Ltd ACN 055
TERMS OF SERVICE. This Agreement shall be construed in all respects in accordance with the laws of the province of Ontario and Canada.
TERMS OF SERVICE IMPORTANT NOTICE: *All Payments to Orbit Cloud Inc are Non-Refundable* Orbit Cloud Inc. ("Orbit Cloud", "The Company") agrees to furnish services to the Subscriber, subject to the following
Revelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
How To Use Kendallville Internet For Free
Kendallville Internet High-speed Internet Business Full Speed 3.5 Mbps Download Speed 1.5 Mbps Upload Speed $50 Installation fee with a 2 year commitment* $100.00/month Residential Full Speed 3.5 Download
If you have any questions about any of our policies, please contact the Customer Services Team.
Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting
GOSFIELD NORTH COMMUNICATIONS CO-OPERATIVE LIMITED ( GOSFIELD ) ACCEPTABLE USE POLICY
GOSFIELD NORTH COMMUNICATIONS CO-OPERATIVE LIMITED ( GOSFIELD ) ACCEPTABLE USE POLICY 1. Introduction This acceptable use policy ("Policy") sets out the principles, terms and conditions that govern the
Youngevity Essential Life Sciences & Youngevity International, Inc.
Youngevity Essential Life Sciences & Youngevity International, Inc. Guidelines for Distributor created and maintained websites The following excerpts from Youngevity s Policies and Procedures are compiled
GUIDANCE FOR MANAGING THIRD-PARTY RISK
GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,
How To Respect The Agreement On Trade In Cyberspace
CHAPTER 14 ELECTRONIC COMMERCE Article 14.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial
Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY. Commercial-in-Confidence. Issue Number 1.5, 20 November 2012
Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY Commercial-in-Confidence Issue Number 1.5, 20 November 2012 ACCEPTABLE USE POLICY The following is the Telstra Wholesale Acceptable Use
