Acceptable use Policy

Acceptable use Policy

This Acceptable Use Policy (AUP) has been created by Exceed IT Systems Limited (Exceed IT) to promote the integrity, security and reliability of Exceed IT's network, facilities, and customers.

Exceed IT reserves the sole right to modify this AUP at any time and in any way it deems necessary. Notification of changes or amendments to this document will be posted on this site.

This policy shall be effective upon the establishment of the Customer account and will remain binding until the cessation of services by either parties. Throughout the term of its Agreement with Exceed IT, the Customer must ensure that the use of any service, product, or resource offered, owned, or controlled by Exceed IT conforms to Exceed IT's current AUP as well as Exceed IT's Terms and Conditions. The Customer will be held responsible for its use, its systems, the users of its systems and offerings, and or any third-party use. These policies supersede any agreements previously made with Exceed IT be it written or oral.

The use of Exceed IT's products and services as well as the receipt of any payments made for services provided by Exceed IT constitutes the acceptance of this agreement as well as Exceed IT's Terms and Conditions.

Acceptable Use:

In addition to the other requirements of this AUP, the Service may be used only in a manner that, in Exceed IT's sole discretion, is consistent with the purposes of such Service. Exceed IT's services are specifically designed for and can only be utilised for standard business and home use.

Customers should contact Exceed IT if unsure of whether any contemplated use or action is permitted.

  1. The usage of Exceed IT products and services must comply with current laws and regulations;
  2. Including but not limited to regulations pertaining to copyright, license agreements and patents
  3. Must adhere to rules and regulations in Exceed IT's Terms and Conditions
  4. Mail Services The following mail limits are designed to enable Exceed IT's mail server to operate at optimal efficiency therefore ensuring that all Exceed IT clients receive the highest quality mail service possible.

    • Maximum Mailbox Size: 150 MB - All mailboxes will be capped at 150 MB per mail box.
    • Warning Message for mailbox quota: 140 MB - To ensure clients are aware that they are reaching the 150 MB limit. A warning message will be sent to clients once their mailboxes have reached 140MB. This will allow the client a chance to clear mail from the server.
    • Maximum Message Size: 40Mb - The maximum size of a single message will be set to 40Mb in line with the mailbox size. You will be able to receive a message up to 40960Kb provided you have adequate space on your mailbox.
    • Message Lifetime: 90 Days - In order to maintain the performance of our mail server guarantee new mail can be received as well as service standards mail left on the server for more than 90 days will automatically be deleted from the server.
    • Mail checking frequency - The maximum frequency of checking for new messages on the Exceed IT mail server should be no more than every 5 minutes. Our preferred frequency of checking mail is every 10 - 15 minutes. Our anti abuse system will block your IP for a set time if your mail checking frequency is to high.

Unacceptable Use:

By way of example, and not limitation, the following sections outline activities that are expressly prohibited. The Service shall not be used to post, transmit, re-transmit or store material which, in the judgment of Exceed IT:

  • Violates local, state, federal, foreign, or International Law;
  • Could be considered threatening, obscene, indecent, defamatory, threatening or that otherwise could adversely affect any individual, group or entity.
  • Deceptive or fraudulent practices.
  • Any activity infringing on the intellectual property rights of others, including, but not limited to, copyrights, trademarks, service marks, trade secrets, patents. Actions that restrict or inhibit any Person, whether a customer, Exceed IT, or otherwise, in its use or enjoyment of any Exceed IT Service.
  • Advertising, transmitting, or otherwise making available any software, program, product, or service that is designed to violate this AUP, which includes the facilitation of the means to spam, initiation of pinging, flooding, mailbombing, denial of service attacks, and piracy of software.
  • Sending unsolicited bulk messages (spam), via any means, including, but not limited to, email, instant messenger services, and newsgroup postings. Exceed IT reserves the right to determine in its sole discretion and based on the information available what constitutes spam as well as what measures are necessary in response to spamming complaints. Clients should be aware of the UK Spam Act 2003. More information can be viewed at http://spamlinks.net/legal.htm#eu-uk
  • Sending solicited bulk messages, including but not limited to, the utilisation of services not designed to manage this functionality or where the FROM or REPLY TO email address is managed by Exceed IT, or any such actions which Exceed IT deems to potentially compromise or adversely affect service standards.
  • The engagement of Exceed IT services to promote deceptive and or illegal marketing practices, products or services.
  • In the case of the utilisation of Exceed IT's Online Services which operate in a shared environment, we specifically prohibit the use of these services for development purposes. Exceed IT's Online Services are designed specifically and should only be utilised for production purposes.

System and Network:

  • The deliberate transmission of computer viruses, worms, trojan software, or other malicious programs.
  • Interfering with, disrupting, or denying service including, but not limited to, using any technique to intentionally degrade or disable the delivery of any legitimate data (e.g., denial of service attacks).
  • Attempting to gain unauthorized entry to any site or network including, but not limited to, executing any form of network probing, monitoring or other information gathering on someone else's site or network.
  • Attempting to circumvent host or user authentication or other security measures of any host, network or account.
  • Maintaining an Open Email Relay/Open Data Relay or allowing any data to be sent through one's system by an unrelated third party, including, but not limited to, via open email gateways and open proxy servers.
  • Manipulate or bypass Exceed IT's usage limits.

Mail Server Facilities:

  • Sending unsolicited mail messages.
  • Harassment including, but not limited to, language, frequency or size of messages.
  • Unauthorized use, or forging, of mail header information.
  • Solicitation of mail for any other E-mail address other than of the poster's account or service with the intent to harass or to collect replies.
  • Creating or forwarding "chain letters" or other "schemes" of any type.
  • Use of unsolicited E-mail originating from within Exceed IT's network, or networks of other Internet Service Providers, on behalf of, or to advertise any service hosted by Exceed IT, or connected via Exceed IT's network.
  • Infringement of mail service restrictions as outlined in above in this document

Usenet Newsgroups:

  • Posting the same or similar messages to large numbers of Usenet newsgroup ("Newsgroup spam").
  • Posting excessive numbers of identical or similar messages to any number of Usenet newsgroups from Exceed IT's network or networks of other Internet Service Providers on behalf of, to advertise, any service hosted by Exceed IT or sites hosted within, or via Exceed IT's network.
  • Posting chain letters of any type.
  • Posting encoded binary files to newsgroups not named for that purpose
  • Cancellation or superseding of posts other than your own
  • Forging of header information of the poster's account or service.

Additional Obligations:

Bulk Email:
Bulk email must provide recipients with an easy and effective mechanism for removal from bulk email lists. The source of the addressee's address must be included in each bulk email message. Senders of bulk email must take effective steps to confirm that the actual owner of each email address on a list has agreed to receive bulk mailings from the sender before sending email to that list. Bulk Email facilities are catered for by Exceed IT's List Manager product. The utilization of mail server SMTP services for the use of sending bulk emails is expressly prohibited.

Service Resale:
Service or any portion of Service cannot be resold unless authorized by Exceed IT in an executed Reseller account.

Password Protection:
The Customer is responsible for protecting passwords and for any authorized or unauthorized use of its systems and/or networks. All actions resulted from passwords being compromised will remain the sole responsibility of the Customer.

Content Protection:
The Customer must provide appropriate protection to prevent minors (persons under 18 years of age) from accessing any unsuitable material published via any Service.

Content Ownership:
The Customer is responsible for all content or information residing on, obtained or transmitted via the Service.

Vulnerable Systems:
Exceed IT reserves the right, without prior notice, to perform vulnerability tests on systems residing on its IP address range, which may be allocated for Customer use. The purpose of such testing includes, but is not limited to, testing of mail servers or proxy servers for unrestricted third party relaying. Exceed IT will employ all reasonable efforts to ensure that such testing

  • will be non-intrusive in nature, and
  • will not adversely affect Service provided to Customer or compromise the security of Customer's network.

The Customer is responsible for correcting any system vulnerability upon notification. Customer must terminate operations of a known compromised system.

Service Provided Equipment:
Customer is responsible for any modification of, alteration to, or other tampering with any hardware provided with the Service.

It is the client's sole responsibility to ensure that they maintain regular backups of their data. However Exceed IT do backup all data and will restore files if lost due to Exceed IT's actions. Exceed IT can restore files for the customers, however their will be a charge.

AUP Enforcement

Violation of this AUP may subject Customer to international, federal, and/or state civil and/or criminal liability. Customer activity that facilitates a violation of this AUP by any party constitutes a violation of this AUP by Customer.

  • Exceed IT reserves the right to immediately, and without prior notice, filter, block, suspend, and/or terminate access to the Service at any time for any conduct that Exceed IT, in its sole discretion, determines violates, or may violate, this AUP and/or Terms and Conditions or is otherwise harmful to Exceed IT's interests or the interests of others.
  • If access is terminated, Exceed IT, in its sole discretion, may refuse to accept all new e-mail sent to the terminated e-mail address and delete all or part of Customer's data stored on Service.

Third Party Complaint Process:

If Customer, or the public, wishes to notify Exceed IT of a potential violation of this AUP they should do so by sending an e-mail to abuse@exceedit.co.uk

Exceed IT will review such communication as quickly as possible and take action as deemed appropriate by Exceed IT.