fbpx
Skip to content

D. Grant Crawley Limited

ACCEPTABLE USE POLICY

1. GENERAL

“Company” means D. Grant Crawley Limited, whose registered office is at 26 Darent Road, Haydock, St Helens, Merseyside, WA11 0HH and whose registered company number is 2705666;
“Customer” means a business or a consumer (as the case may be) who is receiving Goods or Services from the Company;
“Legislation” means any applicable laws, statutes and regulations; and
“Third Parties” includes any person or organisation that might be affected by our business activities, irrespective of whether they are directly aware or involved in those activities;

Each Customer who subscribes to a service provided by the Company is solely responsible for all stored and transmitted data of the service and all actions which emanate from the service. The Customer must take adequate measures which comply with the current state of technology to ensure that any misuse of the service is effectively prevented. The Company reserves the right to block any service at any time which causes a loss of network integrity or affects the network operation of other services or servers without prior warning including those actions which are not specifically referred to below. The Company further reserves the right to deactivate a service if it is deemed to be causing excessive load or traffic over an unacceptably long period. The Company further reserves the right so far as permitted by law to maintain logs of impermissible actions and to preserve the contents of servers as well as the right to hand over such logs or contents in accordance with legislation, on Order of the Court or orders from any other body appointed by law.

PROHIBITED ACTIONS AND CONSEQUENCES OF INFRINGEMENTS

2. IP SPOOFING

IP spoofing refers to the falsification of the IP sender address for outgoing IP packages. This technology is generally used to conceal the origin of IP packages. The Company has installed anti-spoofing filters in order to prevent IP spoofing. All attempts at IP spoofing are automatically logged. Any attempt at IP spoofing will lead to the immediate blocking of the service without prior warning.

3. MAC SPOOFING AND MAC FLOODING

MAC spoofing refers to the falsification of a sender address of an Ethernet framework. This technology is often used to give a false identity in the local network or for a router. MAC flooding refers to the sending of Ethernet frameworks with a number of different sender addresses for the purpose of flooding MAC databanks of switches thus causing a malfunctioning of these switches. The Company has put in place measures which in the event of any attempt at MAC spoofing or MAC flooding trigger an immediate and automatic blocking of the service without prior warning. All attempts at MAC spoofing and MAC flooding are automatically logged.

4. ARP SPOOFING AND ARP FLOODING

ARP spoofing refers to the falsification of an ARP entry on a router by unsolicited ARP replies. This technology is often used to prepare a man-in-the-middle attack. ARP flooding refers to the mass transmission of ARP replies for the purpose of flooding the ARP databank of a router and thus causing a malfunctioning of this switch. All attempts at ARP spoofing and ARP flooding are logged and will lead to the immediate blocking of the service without prior warning.

5. TRANSMISSION OF SWITCH PROTOCOL FRAMEWORKS

The transmission of switch protocol frameworks, in particular spanning tree protocol frameworks (BPDUs) will lead to the immediate and automatic blocking of the service without prior warning. All attempts to transmit switch protocol frameworks are logged.

6. TRANSMISSION OR PROPAGATION OF SPAM AND MALWARE

Spam refers to the mass transmission of unsolicited or unrequested email advertisements. Malware refers to any type of injurious software e.g. viruses, worms, trojans, backdoors, spyware or illegal diallers. The sending of spam can lead to a warning being sent to the service operator or to the immediate blocking of the service without prior warning depending upon the gravity of the infringement. The sending of Malware will lead to the immediate blocking of the service without prior warning.

7. PHISHING

Phishing refers to illegal attempts to release access data for security areas to a wide distribution of users. Well known websites are often imitated so as to appear deceptively genuine for this purpose. The websites are reached under domain names which are similar to the original domain names. Users are invited by misleading emails to enter their access data on such hoax websites. Phishing will lead to the immediate blocking of the service without prior notice.

8. DENIAL OF SERVICE ATTACKS

Denial of Service attacks (DoS) refers to an attack on a server with the purpose of disabling one or more of its services. This generally occurs by overloading e.g. by attacks with a number of small UDP packets or TCP-SYN packets. Where the attack is coordinated by a larger number of other systems this is referred to as a Distributed Denial of Service (DDoS). The Company has put in place measures which permit the empirical recognition of Denial of Service attacks. All Denial of Service attacks are logged. A Denial of Service attack will lead to the immediate blocking of the service without prior warning.

9. SCANNING OF EXTERNAL COMPUTERS

The Scanning of computers refers to the systematic searching for services on this computer with the purpose of detecting weaknesses in the services in order to utilise them for hacking at a later time. The scanning of external computers can lead to a warning being sent to the operator of the service or to the immediate blocking of the service without prior notice according to the seriousness of the infringement.

10. NON AUTHORISED ACCESS OR ATTEMPTS OF HACKING

All non-authorised or illegal access to IT systems (e.g. “hacking”) are logged and will lead to the immediate blocking of the service without prior warning.

11. OFFERING OF UNLAWFUL INFORMATION

The offering of unlawful or abusive, pornographic, racist, politically radical, defamatory or offensive information as well as information which contravenes the rights of third parties in whatever form will lead to the immediate blocking of the service without prior warning.

12. BREACH OF COPYRIGHT ETC.

The Customer is prohibited either from offering or distributing any information which is protected by copyright without lawful authority. The operating of so called P2P exchanges, download services or streaming services over which copyright protected information could be distributed without lawful authority is not permitted. It is also prohibited to make available links which connect to P2P exchanges, download services, streaming services or information provided by them. In case of infringement the Company reserves the right to discontinue the service without prior warning and to terminate the agreement.


ABUSE REPORTING

If you become aware of any breach of our Acceptable Use Policy please report it with as much detail as possible via our Contact Us form or email the abuse email address associated with the domain name or server IP address WHOIS entry.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.