Acceptable Use Policy

  1. General
    1. By contracting with Akesa Connect for services, the client agrees, without limitation or qualification, to be bound by this policy and the terms and conditions it contains, as well as any other additional terms, conditions, rules or policies which are displayed to the client in connection with the services.
    2. The purpose of this Acceptable Use Policy “AUP” is to:
      1. ensure compliance with the relevant laws of the Republic;
      2. specify to clients and users of Akesa Connect’s service what activities and online behaviour are considered an unacceptable use of the service;
      3. protect the integrity of Akesa Connect’s network; and
      4. specify the consequences that may flow from undertaking such prohibited activities.
    3. This document contains a number of legal obligations which the client will be presumed to be familiar with. As such, Akesa Connect encourages the client to read this document thoroughly and direct any queries to
    4. Akesa Connect respects the rights of Akesa Connect’s clients and users of Akesa Connect’s services to freedom of speech and expression, access to information, privacy, human dignity, religion, belief and opinion
  2. Unacceptable use
    1. Akesa Connect’s services may only be used for lawful purposes and activities. Akesa Connect prohibits any use of its services including the transmission, storage and distribution of any material or content using Akesa Connect’s network that violates any law or regulation of the Republic. This includes, but is not limited to:
      1. Any violation of local and international laws prohibiting child pornography, obscenity, discrimination (including racial, gender or religious slurs) and hate speech, or speech designed to incite violence or hatred, or threats to cause bodily harm.
      2. Any activity designed to defame, abuse, stalk, harass or physically threaten any individual in the Republic or beyond its borders; including any attempt to link to, post, transmit or otherwise distribute any inappropriate or defamatory material.
      3. Any violation of Intellectual Property laws including materials protected by local and international copyright, trademarks and trade secrets.
      4. Any violation of another’s right to privacy, including any effort to collect personal data of third parties without their consent.
      5. Any fraudulent activity whatsoever, including dubious financial practices, such as pyramid schemes; the impersonation of another client without their consent; or any attempt to enter into a transaction with Akesa Connect on behalf of another client without their consent.
      6. Any violation of the exchange control laws of the Republic. Any activity that results in the sale, transmission or distribution of pirated or illegal software.
  3. Threats to network security
    1. Any activity which threatens the functioning, security and/or integrity of Akesa Connect’s network is unacceptable. This includes:
      1. Any efforts to attempt to gain unlawful and unauthorised access to the network or circumvent any of the security measures established by Akesa Connect for this goal.
      2. Any effort to use Akesa Connect’s equipment to circumvent the user authentication or security of any host, network or account (“cracking” or “hacking”).
      3. Forging of any TCP/IP packet headers (spoofing) or any part of the headers of an email or a newsgroup posting.
      4. Any effort to breach or attempt to breach the security of another user or attempt to gain access to any other person’s computer, software, or data without the knowledge and consent of such person.
      5. Any activity which threatens to disrupt the service offered by Akesa Connect through “denial of service attacks”; flooding of a network, or overloading a service or any unauthorised probes (“scanning” or “nuking”) of others’ networks.
      6. Any activity which in any way threatens the security of the network by knowingly posting, transmitting, linking to or otherwise distributing any information or software which contains a virus, trojan horse, worm, malware, botnet or other harmful, destructive or disruptive component.
      7. Any unauthorised monitoring of data or traffic on the network without Akesa Connect’s explicit, written consent.
      8. Running services and applications with known vulnerabilities and weaknesses, e.g. insufficient anti-automation attacks, any traffic amplification attacks, including recursive DNS attacks, SMTP relay attacks.
      9. Failing to respond adequately to a denial of service attack (DOS / DDOS).
  4. Definitions
    1. Throttling
      Throttling limits the throughput of all services and protocols. Regardless of the line speed, a throttled account will only be able to achieve limited throughput in total whilst using that account on their line. The line itself is not affected, and using an unthrottled account will return line performance to normal. throttling is applied on an individual user basis, based on usage over a 30 day rolling window threshold. Throttling is applied only when demand on the network exceeds available network capacity, and is relieved when demand decreases.
    2. Shaping
      Shaping is the implementation of protocol based priority, to manage demand on the network. When shaping is implemented, realtime, interactive services are given higher priority over non-realtime, non-interactive services, effectively slowing the performance of non-prioritised services in favour of those given priority. Shaping is applied to all users in general (not based on usage thresholds), and the impact to non-priority services is determined by the level of demand and available network capacity. Shaping is applied only when demand on the network exceeds available network capacity, and is relieved when demand decreases.
    3. Contention
      Network capacity and performance is subject to contention for services from users. This means that a significant rise in demand can affect the availability of bandwidth to users. Akesa Connect manages contention through the implementation of quality of service, shaping and throttling (on applicable products). Contention is a function of demand from users and is not strictly within Akesa Connect’s direct control, however Akesa Connect will use the provisions of the AUP and Terms and Conditions to manage contention and minimise the impact to performance to offer the best possible experience at all times.
  5. Akesa Connect Network
    1. The customer acknowledges that Akesa Connect is unable to exercise control over the content of the information passing over the infrastructure and the Internet, including any websites, electronic mail transmissions, news groups or other material created or accessible over its infrastructure. Therefore, Akesa Connect is not responsible for the content of any messages or other information transmitted over its infrastructure.
    2. Akesa Connect’s infrastructure may be used to link into other networks worldwide and the user agrees to conform to the acceptable use policies of these networks.
  6. Home Fibre Links
    1. Home Fibre services are intended for home and personal use. Reselling services or use of home services for business purposes are prohibited.
    2. Uncapped Fibre may not be used to provide or resell services to other individuals, and it is prohibited in the following scenarios (but not limited):
      1. Wireless Internet Service Provision (WISP).
      2. Hosting Shell Accounts.
      3. Providing email, news, download, VPN or sandbox services.
      4. Running of home servers or private servers.
      5. Provision of network services to others.
      6. Running private servers for mail, HTTP, FTP, IRC and multi-user forums.
    3. Services may also not be shared.
  7. Home LTE Links
    1. Home LTE services are intended for home and personal use. Reselling services or use of home services for business purposes are prohibited.
    2. Home LTE packages are subject to a monthly threshold of 1TB. Once you’ve reached your monthly data limit, your connection speed will be limited to 1Mbps for the remainder of the month.
    3. Home LTE may not be used to provide or resell services to other individuals, and it is prohibited in the following scenarios (but not limited):
      1. Wireless Internet Service Provision (WISP).
      2. Hosting Shell Accounts.
      3. Providing email, news, download, VPN or sandbox services.
      4. Running of home servers or private servers.
      5. Provision of network services to others.
      6. Running private servers for mail, HTTP, FTP, IRC and multi-user forums.
    4. Services may also not be shared.
  8. Hosting
    1. Where Akesa Connect offers unlimited bandwidth (web traffic) usage on Shared Hosting platforms. However, this is subject to reasonable and responsible usage, as determined at Akesa Connect’s discretion. Shared Hosting is designed for serving personal hosting requirements or that of small enterprises, and not medium to large enterprises. Akesa Connect reserves the right to move clients deemed to have excessive bandwidth usage to a Cloud product, which will better suit their requirements. Clients will be given notice as such, and will be informed of any cost implications.
    2. Disk space on Shared Hosting may only be used for website content, emails and related system files. General data storage, archiving or file sharing of documents, files or media not directly related to the website content is strictly prohibited. Unauthorised storage or distribution of copyrighted materials is prohibited, via FTP hosts or any other means.
    3. For Shared Hosting and Managed Dedicated solutions, Akesa Connect will implement security updates, software patches and other updates or upgrades from time to time, to maintain the best performance, at their sole discretion. These upgrades include, but are not limited to, PHP, MySQL and CPanel release versions. Akesa Connect is under no obligation to effect such upgrades, or to rectify any impact such changes could potentially have to Hosting clients.
    4. Akesa Connect will not be liable or responsible for the backing up, restoration or loss of data under any circumstances. Clients are solely responsible for ensuring their data is regularly backed up and for restoring such backups in the event of data loss or corruption.
    5. Akesa Connect prohibits clients from doing the following on hosting platforms administered by Akesa Connect:
      1. Running applications that are not production-ready. Any applications on the hosting platform must be optimised with respect to memory usage and must have appropriate data indexing.
      2. Running applications with inadequate security controls.
      3. Generating significant side-channel traffic from an application, whether by design or otherwise. Databases should be stored locally, and remote content should be cached.
      4. Failure to maintain proper “housekeeping” on a shared server including storing or generating useless content, including comment spam, unused cache files, log file and database entries.
      5. Storing malicious content, such as malware or links to malware.
      6. Monopolising server resources, including CPU time, memory, network and disk bandwidth.
      7. Maintaining long-running processes and long-running database queries.
      8. Storing or running back-door shells, mass mailing scripts, proxy servers, web spiders, phishing content, or peer-to-peer software.
      9. Sending bulk mail of any form, particularly mail that cannot be efficiently delivered due to volume or incorrect addresses.
      10. Using poor passwords.
      11. Sharing security credentials with untrusted parties.
      12. Running Torrents for download or Seed Servers.
      13. Running TOR (or other Online Anonymity Services).
      14. Otherwise circumventing the Acceptable Use Policy or intended use of the product.
    6. Akesa Connect strictly prohibits any crypto currency associated activities or mechanisms to be run on any part of our hosting network or servers within our hosting environment.
  9. Spam and unsolicited bulk mail
    1. Akesa Connect regards all unsolicited bulk email (whether commercial in nature or not) as spam, with the following exceptions:
      1. Mail sent by one party to another where there is already a prior relationship between the two parties and the subject matter of the message(s) concerns that relationship;
      2. Mail sent by one party to another with the explicit consent of the receiving party.
      3. Clients should only receive bulk mail that they have requested and/or consented to receive and/or which they would expect to receive as a result of an existing relationship.
    2. Akesa Connect will take swift and firm action against any user engaging in any of the following unacceptable practices:
      1. Sending unsolicited bulk mail for marketing or any other purposes (political, religious or commercial) to people who have not consented to receiving such mail.
      2. Using any part of Akesa Connect’s infrastructure for the purpose of unsolicited bulk mail, whether sending, receiving, bouncing, or facilitating such mail.
      3. Operating or maintaining mailing lists without the express permission of all recipients listed. In particular, Akesa Connect does not permit the sending of “opt-out” mail, where the recipient must opt out of receiving mail which they did not request. For all lists, the sender must maintain meaningful records of when and how each recipient requested mail. Akesa Connect will also monitor Clients deemed to be operating “cleaning lists”, which is using illegally obtained email addresses but removing addresses as complaints arise. Should Akesa Connect, at its discretion, believe that this is the case, it will be treated as SPAM.
      4. Failing to promptly remove from lists invalid or undeliverable addresses or addresses of unwilling recipients or a recipient who has indicated s/he wishes to be removed from such list, or failing to provide the recipient with a facility to opt-out.
      5. Using Akesa Connect’s service to collect responses from unsolicited email sent from accounts on other Internet hosts or e-mail services that violate this AUP or the AUP of any other Internet service provider. Advertising any facility on Akesa Connect’s infrastructure in unsolicited bulk mail (e.g. a website advertised in spam).
      6. Including Akesa Connect’s name in the header or by listing an IP address that belongs to Akesa Connect in any unsolicited email whether sent through Akesa Connect’s network or not.
      7. Failure to secure a Client’s mail server against public relay as a protection to themselves and the broader Internet community. Public relay occurs when a mail server is accessed by a third party from another domain and utilised to deliver mails, without the authority or consent of the owner of the mail-server. Mail servers that are unsecured against public relay often become abused by unscrupulous operators for spam delivery and upon detection such delivery must be disallowed. Akesa Connect reserves the right to examine users’ mail servers to confirm that no mails are being sent from the mail server through public relay and the results of such checks can be made available to the user. Akesa Connect also reserves the right to examine the mail servers of any users using Akesa Connect’s mail servers for “smart hosting” (when the user relays its mail via an Akesa Connect mail server to a mail server of its own or vice versa) or similar services at any time to ensure that the servers are properly secured against public relay. All relay checks will be done in strict accordance with Akesa Connect’s Privacy Policy and the laws of South Africa.
  10. Users outside of South Africa
    1. Where any user resides outside of the Republic, permanently or temporarily, such user will be subject to the laws of the country in which s/he is currently resident and which apply to the user. On presentation of a legal order to do so, or under obligation through an order for mutual foreign legal assistance, Akesa Connect will assist foreign law enforcement agencies (LEAs) in the investigation and prosecution of a crime committed using Akesa Connect’s resources, including the provisioning of all personal identifiable data.
  11. Protection of minors
    1. Akesa Connect prohibits clients from using Akesa Connect’s service to harm or attempt to harm a minor, including, but not limited to, by hosting, possessing, disseminating, distributing or transmitting material that is unlawful, including child pornography and cyber bullying.
    2. Akesa Connect prohibits clients from using Akesa Connect’s service to host sexually explicit or pornographic material of any nature.
  12. Privacy and confidentiality
    1. Akesa Connect respects the privacy and confidentiality of Akesa Connect’s clients and users of Akesa Connect’s service. Please review Akesa Connect’s Privacy Policy which details how Akesa Connect collects and uses personal information gathered in the course of operating its services.
  13. User responsibilities
    1. Clients are responsible for any misuse of Akesa Connect’s services that occurs through the client’s account. It is the client’s responsibility to ensure that unauthorised persons do not gain access to or misuse Akesa Connect’s service.
    2. Akesa Connect urges clients not to reply to unsolicited mail or “spam”, not to click on any suggested links provided in the unsolicited mail. Doing so remains the sole responsibility of the client and Akesa Connect cannot be held liable for the client being placed on any bulk mailing lists as a result.
    3. Where the client has authorised a minor to use any of the Akesa Connect’s services or access its websites, the client accepts that as the parent/legal guardian of that minor, the client is fully responsible for: the online conduct of such minor, controlling the minor’s access to and use of any services or websites, and the consequences of any misuse by the minor.
  14. Complaints procedure
    1. Complaints relating to the violation of this AUP should be submitted in writing to Complaints must be substantiated, and unambiguously state the nature of the problem, and its connection to Akesa Connect’s network and services.
  15. Action following breach of the AUP
    1. Upon receipt of a complaint, or having become aware of an incident, Akesa Connect may, in its sole and reasonably-exercised discretion take any of the following steps:
      1. In the case of clients, warn the client, suspend the client account and/or revoke or cancel the client’s service access privileges completely;
      2. In the case of an abuse emanating from a third party, inform the third party’s network administrator of the incident and request the network administrator or network owner to address the incident in terms of this AUP and/or the ISPA Code of Conduct (if applicable);
      3. In severe cases suspend access of the third party’s entire network until abuse can be prevented by appropriate means;
      4. In all cases, charge the offending parties for administrative costs as well as for machine and human time lost due to the incident;
      5. Assist other networks or website administrators in investigating credible suspicions of any activity listed in this AUP;
      6. Institute civil or criminal proceedings;
      7. Share information concerning the incident with other Internet access providers, or publish the information, and/or make available the users’ details to law enforcement agencies; and/or
      8. suspend or terminate the service as provided for in the agreement.
    2. This policy applies to and will be enforced for intended and unintended (e.g., viruses, worms, malicious code, or otherwise unknown causes) prohibited usage.
  16. Reservation and non waiver of rights
    1. Akesa Connect reserves the right to amend or alter this policy at any time, and without notice to the client.
    2. Akesa Connect reserves the right to take action against any individuals, companies or organisations that violate the AUP, or engage in any illegal or unlawful activity while accessing Akesa Connect’s services, to the fullest extent of the law.
    3. Akesa Connect reserves the right, at its sole discretion, to act against other types of abuse not listed in this document and to investigate or prevent illegal activities being committed over Akesa Connect’s network.
    4. Akesa Connect does not waive its right to enforcement of this AUP at any time, or prejudice its right to take subsequent action, should Akesa Connect fail, neglect or elect not to enforce a breach of the AUP at any time.
  17. Breach
    1. Akesa Connect may, in its sole discretion, determine what constitutes a breach of the Acceptable Use Policy.
    2. Upon Akesa Connect becoming aware of an alleged violation of the Acceptable Use Policy, it may:
      1. initiate an investigation into this alleged violation within a reasonable time after becoming aware thereof;
      2. restrict or completely withdraw the Customer’s access to the Akesa Connect Infrastructure and Internet during the investigation in order to prevent further possible unauthorised activity – in these circumstances the Customer is not entitled to service credits for these outages.
    3. If the Customer is found in violation of the Acceptable Use Policy, Akesa Connect may, in its sole discretion, restrict, suspend, or terminate the Customer’s account and/or pursue other civil remedies (including but not limited to any costs associated with the investigation of a substantiated policy violation). Generally, violations will be dealt with as follows, however, Akesa Connect may deviate from this if it determines it necessary:
      1. first violations by the Customer of the Acceptable Use Policy will result in the Customer being liable for a Cleanup Fee of R1,500 and the Customer’s account will be reviewed for possible termination;
      2. second violations by the Customer of the Acceptable Use Policy will result in the Customer being liable for a Cleanup Fee of R3,500 and immediate termination of the Customer’s account.
    4. If a violation is a criminal offence, Akesa Connect will notify the appropriate law enforcement department of such violation.
    5. The Customer will be liable for any and all costs incurred by Akesa Connect as a result of the Customer’s violation of the Acceptable Use Policy. This includes, but is not limited to, legal fees on an attorney-client basis and costs resulting from Postmaster responses to complaints from and the clean-up of unsolicited commercial mailings and/or unauthorized bulk mailings and/or news server violations, and an investigation fee of no more that R1,500 per hour that Akesa Connect personnel must spend to investigate any violations.

Get a Free IT Consultation?

How can we help?