top of page
Acceptable Use Policy ("AUP")
This AUP forms part of the Agreement applicable to all services and products offered by JOODLE TECHNOLOGIES and contracted for by customers and is designed to ensure compliance with the relevant laws of South Africa and protect JOODLE TECHNOLOGIES network, its services and products, customers and the internet community as a whole from improper and/or illegal activity over the internet. This AUP describes the conduct and practices that JOODLE TECHNOLOGIES regards as unacceptable on the part of the customer and/or visitor to our website and explains the rights that JOODLE TECHNOLOGIES has to respond to such unacceptable conduct and practices. Please take the time to review this AUP, as all service and product agreements will be subject to the provisions of this AUP. By accessing our website, or using our services and products, you agree to be bound without limitation or qualification to the rules, terms and conditions set out in this AUP.
2. Unacceptable Use and Prohibited Activities
2.1 JOODLE TECHNOLOGIES product and services may only be used for lawful purposes and activities. JOODLE TECHNOLOGIES prohibits any use of its services and products, including the transmission, distribution and storage of any material or content using JOODLE TECHNOLOGIES network that transgress, violate or are in non-compliance with any laws of South Africa, including, but not limited to:
2.1.1 any violation of with local and international laws prohibiting child pornography, obscenity, discrimination (including racial, gender or religious slurs), hate speech, speech designed to incite violence, intimidation or hatred and exchange control ;
2.1.2 any activity designed to defame, abuse, stalk, harass or physically threaten any individual in South Africa or beyond its borders; including any attempt to link to, post, transmit or otherwise distribute any inappropriate or defamatory material;
2.1.3 any infringement on intellectual property rights and copyright laws including materials protected by local and international copyright, trademarks and trade secrets and furthermore including any sale, transmission or distribution of pirated or illegal software, video and/or voice content and recordings;
2.1.4 any violation of another’s right to privacy, including any effort to collect personal data of third parties without their consent or contrary to the applicable data privacy laws;
2.1.5 any fraudulent activity, including dubious financial practices, such as pyramid schemes; the impersonation of another customer without their consent; or any attempt to enter into a transaction or agreement with JOODLE TECHNOLOGIES on behalf of another customer without their consent; and
2.1.6 any activity which threatens the functioning, security or integrity of JOODLE TECHNOLOGIES network and services including, but not limited to:
188.8.131.52 any efforts to attempt to gain unlawful and unauthorised access to the network or circumvent any of the security measures established by JOODLE TECHNOLOGIES;
184.108.40.206 any effort to use JOODLE TECHNOLOGIES services, equipment and products to circumvent the user authentication or security of any host, network or account (“cracking” or “hacking”);
220.127.116.11 forging of any TCP/IP packet headers (“spoofing”) or any part of the headers of an email or a newsgroup posting;
18.104.22.168 any effort to breach or attempt to breach the security of another customer or attempt to gain access to any other person’s computer, software, or data without the knowledge and consent of such person;
22.214.171.124 any activity which threatens to disrupt the services offered by JOODLE TECHNOLOGIES through “denial of service attacks” (“DOS”/“DDOS”), flooding of a network, overloading a service or any unauthorised probes (“scanning” or “nuking”) of others’ networks;
126.96.36.199 any activity which in any way threatens the security of JOODLE TECHNOLOGIES network by knowingly posting, transmitting, linking to or otherwise distributing any information or software, which contains a virus, trojan horse, worm, lock, mailbom, cancelbot, malware, botnet or other harmful, destructive or disruptive component;
188.8.131.52 unauthorised access, use, probe, scan of monitoring of a systems security or authentication measures, data or traffic, without JOODLE TECHNOLOGIES explicit, written consent;
184.108.40.206 running services and applications with known vulnerabilities and weaknesses, e.g. insufficient anti-automation attacks, any traffic amplification attacks, including recursive DNS attacks and SMTP relay attacks; and
220.127.116.11 employing posts or programs which consume excessive CPU time or storage space, permits the use of mail services, mail forwarding capabilities, POP accounts, or auto responders other than for their own account; or resale of access to CGI scripts installed on our servers.
2.2 Spam and Unsolicited Electronic Mail
It is contrary to JOODLE TECHNOLOGIES policy for customers to use our servers to effect or participate in any of the following activities:
2.2.1 sending unsolicited bulk mail for marketing, commercial or any other purposes (political, religious or commercial) to persons (natural and juristic) who/which have not consented to receiving such mail;
2.2.2 using any part of JOODLE TECHNOLOGIES infrastructure for the purpose of unsolicited bulk mail, whether sending, receiving, bouncing, or facilitating such mail;
2.2.3 operating or maintaining mailing lists without the express permission of all recipients listed. In particular, JOODLE TECHNOLOGIES does not permit the sending of “opt-out” mail, where the recipient must opt out of receiving mail which they did not request. For all lists, the sender must maintaining meaningful records of when and how each recipient requested mail. JOODLE TECHNOLOGIES may also monitor customers deemed to be operating “cleaning lists”, which is using illegally obtained email addresses, but removing addresses as complaints arise. Should JOODLE TECHNOLOGIES, at its discretion, believe that this is the case, it will be treated as SPAM.
2.2.4 failing to promptly remove from lists invalid or undeliverable addresses or addresses of unwilling recipients or a recipient who has indicated s/he wishes to be removed from such list, or failing to provide the recipient with a facility to opt-out;
2.2.5 using JOODLE TECHNOLOGIES service to collect responses from unsolicited email sent from accounts on other Internet hosts or e-mail services that violate this AUP or the AUP of any other Internet service provider;
2.2.6 advertising any facility on JOODLE TECHNOLOGIES infrastructure in unsolicited bulk mail (e.g. a web site advertised in spam);
2.2.7 including JOODLE TECHNOLOGIES name in the header or by listing an IP address that belongs to JOODLE TECHNOLOGIES in any unsolicited email whether sent through JOODLE TECHNOLOGIES network or not; and
2.2.8 failure to secure a customer’s mail server against public relay as a protection to themselves and the broader Internet community. Public relay occurs when a mail server is accessed by a third party from another domain and utilised to deliver mails, without the authority or consent of the owner of the mail-server. Mail servers that are unsecured against public relay often become abused by unscrupulous operators for spam delivery and upon detection such delivery must be disallowed.
2.3 Public Space and Third Party Content and sites
2.3.1 JOODLE TECHNOLOGIES has no power to control the content of the information passing over the internet and its applications, including third party websites (whether accessible through the JOODLE TECHNOLOGIES network websites; contained within a directory of links on the JOODLE TECHNOLOGIES network or sites displayed as search results); e-mail; chat rooms; news groups; or other similar fora and our network is merely a conduit or means of access and transmission. JOODLE TECHNOLOGIES will not be held liable, whether directly or indirectly, for any loss or damage of any kind incurred as a result of, or in connection with your use of, or reliance on, any of the above-mentioned content.
2.3.2 Access to public internet spaces, such as bulletin boards, Usenet groups, chat rooms and moderated forums, is entirely voluntary and at your own risk. It remains your responsibility to review and evaluate any such content, and that any and all risk associated with the use of, or reliance on, such content rests with you.
2.3.3 JOODLE TECHNOLOGIES employees do not moderate any of these services, or your communications, transmissions or use of these services. We do not undertake any responsibility for any content contained therein, or for any breaches of your right to privacy that you may experience as a result of accessing such spaces.
2.4 Usenet Newsgroups
The customer is responsible for determining and familiarising himself with the written policies of a newsgroup before posting to it or participating in any discussions. The customer must abide by these rules at all times, which can be obtained from the group’s administrators/moderators, upon request. The following are prohibited practices with regard to Usenet newsgroups and JOODLE TECHNOLOGIES reserves the right to delete and/or cancel posts which violate the following conditions:
2.4.1 excessive cross-posting of the same article to multiple newsgroups;
2.4.2 posting of irrelevant or off-topic material to newsgroups (also known as USENET spam);
2.4.3 posting binaries to a non-binary newsgroup; and
2.4.4 posting adverts, solicitations, or any other commercial messages unless the guidelines of the newsgroup in question explicitly permit them.
2.5 Protection of Minors
JOODLE TECHNOLOGIES prohibits customers from using JOODLE TECHNOLOGIES services to harm or attempt to harm a minor, including, but not limited to, by hosting, possessing, disseminating, distributing or transmitting material that is unlawful, including child pornography.
3. Determination of breach of this AUP
JOODLE TECHNOLOGIES reserve the right in its sole and unfettered discretion for determining what constitutes a violation of this AUP, provided that such decisions will be taken in line with the applicable legislation concerning the protection of consumer rights in force at the time, as applicable.
3.1 JOODLE TECHNOLOGIES has a procedure in place for the notice and take-down of illegal material. In compliance with section 77 of the Electronic Communications and Transactions Act (No. 25 of 2002) JOODLE TECHNOLOGIES will handle this process and can be reached at +27-87-160-0268 or email@example.com.
3.2 Customers are also notified of the content and procedures of the JOODLE TECHNOLOGIES Code of Conduct which may be used against any Internet service provider who fails to comply with the code of conduct.
4. Complaints and procedures
4.1 JOODLE TECHNOLOGIES cannot handle complaints concerning networks or users that do not have service contracts with us or our affiliates, or are outside of our control. It is the customer’s responsibility to familiarise himself or herself with the procedure set out below and report any cases of violation of this AUP to JOODLE TECHNOLOGIES designated complaints handling agent. In order for JOODLE TECHNOLOGIES to thoroughly investigate the complaint and take appropriate action, all complaints must be in writing, sent via fax or e-mail and contain as much information as possible, including, but not limited to:
4.1.1 the origin of abuse or offense, including the website, full mail headers, relevant log file extracts etc.;
4.1.2 any contact details for the source of the complaint;
4.1.3 a brief explanation why the incident is considered to be an offense.
4.2 JOODLE TECHNOLOGIES discourages anonymous complaints being made via this service, and urges complainants to supply their name and contact details to us. Such information will not be released, except where required by law enforcement. Anonymous complaints will however be acted upon as long as sufficient detail as outlined above is supplied.
5. Consequences of breach of the AUP
5.1 In order to enable JOODLE TECHNOLOGIES to monitor adherence to this AUP by customers and their users and upon receipt of a complaint, or having become aware of an incident, JOODLE TECHNOLOGIES reserves the rights to take any of the following steps:
5.1.1 examine customers’ mail servers to confirm that mails are not being sent from such mail servers through public relay and the results of such checks can be made available to the customer;
5.1.3 intercept and/or block any incoming or outgoing electronic mail sent to or from JOODLE TECHNOLOGIES network or through the use of any services provided by JOODLE TECHNOLOGIES to the customer should such electronic mail be identified as possible spam or be in contravention of JOODLE TECHNOLOGIES General and/or applicable Specific Terms and Conditions;
5.1.4 suspend or terminate any and all services or limit portions thereof provided to the customer should it be determined that the customer has engaged in the transmission of spam, whether done so knowingly or otherwise and or has used the services and network of JOODLE TECHNOLOGIES for any purpose or activities in violation of this AUP;
5.1.5 pursue any civil legal remedies at its disposal in terms of the General Terms and Condition applicable Specific Terms and Conditions and in law, in addition to any of the remedies set-out hereunder;
5.1.6 if such violation is suspected to be a criminal offence, JOODLE TECHNOLOGIES may notify the appropriate law enforcement department of such violation and provide them with all such necessary information and records, as required by law;
5.1.7 in the case of a network issue, inform the user’s network administrator of the incident and request the network administrator or network owner to address the incident in terms of this AUP;
5.1.8 in the case of individual users, warn the user; suspend the user’s account and/or revoke or cancel the user’s network access privileges completely;
5.1.9 assist other networks or website administrators in investigating credible suspicions of any activity listed in this AUP;
5.1.10 institute civil or criminal proceedings;
5.1.11 share information concerning the incident with other Internet access providers; and
5.1.12 in all cases, charge the offending parties for administrative and legal costs, including machine and human time lost due to the incident, attorney fees, costs resulting from Postmaster responses to complaints from and the clean-up of unsolicited commercial mailings and/or unauthorised bulk mailings and/or news server violations, cleanup and investigation fees.
6. Interception of Communications
JOODLE TECHNOLOGIES is required in terms of the Regulation of Interception and Provision of Communication-related Information Act 17 of 2003 to intercept communications. Any interception of communications shall be done strictly in accordance with the requirements of this Act, as and when required by this Act.
7. Amendment of Policy
JOODLE TECHNOLOGIES reserves the right to make changes to this AUP or update it from time to time. Where a major change is made, customers will be informed through a notice on our website. Customers and website visitors bear the responsibility to ensure that they have read the changes or updates as the case may be.
If there are any questions regarding this Acceptable Use Policy you may contact us using the information below:
bottom of page