Acceptable Usage Policy

So that our services are used in a lawful, safe and appropriate way, we have to set out some rules about how they can be used. This Acceptable Usage Policy sets out these rules.

Download our Acceptable Usage Policy in PDF format.

  1. When this policy applies
    • As a Link Solutions customer you will have signed up to receive one or more of our products. These products are collectively referred to as our ‘Services’. Any interaction with Link Solutions or use of our Services will be subject to this policy.
    • If you allow other individuals to use our Services, you will be responsible for any breach of this policy or our terms and conditions committed by those individuals. If you allow individuals under the age of 18 to use our Services, we recommend that you take the reasonable precautions to ensure that they use the Services appropriately.
    • This policy applies to both Link Solutions residential and business services.
    • You will only make use of the Services for a legitimate and lawful purpose.

 

  1. Illegal and appropriate activities
    • While using any of our Services you must comply with all relevant and applicable laws.
    • You must not use any part of our Services to;
      • download, possess or transmit in any way, illegal material (for example indecent images of children);
      • obtain, offer, permit to be offered for any reason, send, publish, distribute, circulate, obtain or otherwise propagate any material, images, displays or services that are illegal, immoral, threatening, invasive of privacy, discriminatory, defamatory, racist, obscene, indecent, offensive, abusive, harmful, malicious or which are in breach of any legal obligation;
      • ensure that any end-user submitted content such as forum posts or chat room entries meet with the standards defined within this Policy;
      • gain or attempt to gain unauthorised access to any computer systems for any unauthorised or prohibited purpose;
      • prevent other users of our Service from accessing the Service;
      • cause critical disruption to our Services (for example using the Services to launch or receive a deliberate denial of service (DDOS) attack);
      • execute, for malicious purposes, any form of network monitoring or data interception that may affect third parties;
      • intentionally impair or attempt to impair the operation of any computer, prevent or hinder access to any program or data held in any computer or to impair the operation of any such program or the reliability of any such data (for example deleting files or changing the desktop settings);
      • knowingly transmit any data, send or upload any material that contains viruses, Trojan horses, worms, time-bombs, keystroke loggers, spyware, adware or any other harmful programs or similar computer code designed to adversely affect the operation of any computer software or hardware;
      • in a manner which infringes any other third party’s copyright or other intellectual property rights, or infringe the legal rights of others including, but not limited to, privacy rights; or to commit fraud, or for any other unlawful or fraudulent purpose or effect.
    • Any use of any part of our Services as described in paragraph 2.2 will be seen as a breach of this policy and we may take any of the actions as set out in section 4.
    • You must only use safe and appropriate equipment or software when using our Service and if we discover, or are informed, that any equipment or software which you use to access to our Services has been compromised and is likely to cause harm or damage to our services, network or other customers, we reserve the right to request that you cease use of such equipment or software immediately.
  2. Interacting with us
    • We understand that people can become annoyed or frustrated when they feel strongly about matters that are not being dealt with as they wish. If this escalates into behaviour towards our staff via phone, letter, online chat or otherwise that may cause them to feel afraid, threatened or abused, or the making of vexatious complaints or unreasonable demands are made of our staff, we reserve the right to terminate a call or an online chat. Repeated behaviour of this type will be seen as a breach of this policy and we may take any of the actions set out in paragraph 4.
  3. Breach of this policy
    • If we reasonably believe you, or an individual who you have knowingly or unknowingly allowed to access our Services, breaches or intends to breach this policy, we may at our discretion:
      • temporarily suspend your access to any of our Services;
      • immediately, temporary or permanently remove or archive any content in breach of this Acceptable Use Policy uploaded to our servers;
      • terminate your account or our agreement to provide our Service;
      • commence legal proceedings against you;
      • disclose such information to law enforcement authorities as we reasonably feel is necessary; and /or
      • take any other reasonable action.
    • We will warn you if we discover that you are in breach of this policy and request you comply with its terms before taking any action under section 4.1. However, we may not do this if there is a real risk of loss or harm to us, our staff, our network or our other customers.
    • Reports of breaches of this policy can be sent to misuse@link-solutions.co.uk
    • We reserve the right to investigate any suspected violation(s) of our policy.
    • We are not responsible for any consequences of your failure to employ appropriate security measures to prevent unauthorised access by any third party to the Services.
  4. Our obligations
    • We are obliged, under the certain applicable laws, to disclose certain information to law enforcement and other public authorities. Similarly, we must comply with court orders to disclose information. We are committed to assisting, and cooperating with, all law enforcement and government agencies in helping to reduce Internet Crime
    • We are not responsible for the content of any of our customers’ web spaces or chat rooms, instant messages, emails, newsgroups, community posts or any other communications sent or communicated via our Services. We cannot and do not guarantee that all of these are free of illegal material or other content that may be considered as unacceptable by others.
  5. Notifications
    • We regularly send out notifications by email and/or post. You are expected and required to review all these messages. This will enable us to advise you of any significant issues that may affect your use of the Services.
  6. Broadband and Direct Internet Access
    • This section 7 of this policy will apply if you take one of our broadband products.
    • You are responsible for ensuring that your broadband connection is secure.
    • If you subscribe to a broadband product that has a data usage cap, you are responsible for monitoring the usage of your product and liable for any usage costs that are incurred should you exceed your usage cap.
    • You will be solely responsible for your use of the Internet and any web pages that you host through your broadband service (see section 10 below for more information on hosting).
    • We recommend you use and continue to update anti-virus and malware scanners to ensure that your computer is kept secure.
  7. Phone
    • This section 8 will apply if you take one of our phone products (which includes line rental, call plans and call features).
    • You are expected to use the phone line we provide for personal use only (but limited use for home working is acceptable), and you should not use the phone line for business purposes unless you have subscribed to a Link Solutions Business product.
    • You shall not use our phone products to engage in any of the following actions:
      • use of your phone line to run call diallers;
      • use of your phone line to engage in call forwarding to premium and business rate numbers;
      • impacting other customers by keeping their line engaged, forwarding their phone number;
      • fax bombing; or malicious calls, criminal acts, or harassment.
    • You are responsible for all call charges. The following calls are not included in any of our call plans (and will be chargeable):
      • calls to indirect access numbers, which includes calling cards;
      • calls to obtain dial-up Internet access;

 

  1. Hosting
    • This section 10 will apply if you take one of our hosting products or if you use one of our broadband products for your own hosting purposes.
    • You must ensure that:
      • the content you are hosting does not disrupt other services used on your residential line by other users or customers;
      • your hosted content does not breach any law of any jurisdiction; and
      • the activities that you undertake through your hosted service are not in any way in breach of the obligations outlined in paragraph 2.2.
      • It is your responsibility to back up any contents placed on the hosted service or hosted by you using our broadband service.
      • Any use of our hosted service which results in an excessive use of data transfer volumes and/or has an adverse impact on our systems may result in the hosted service being removed with or without prior notice.
  1. Mobile (EE and O2)
    • This section will apply if you take a mobile phone SIM card from us (either with or without a mobile phone).
    • To ensure that our mobile phone service isn’t being misused no more than five SIM cards can be:
      • registered in the same individual’s name; or
      • registered at one address.
    • The service or any mobile phone we provide can’t be used:
      • for automatic communication between two devices (sometimes known as ‘machine to machine communication’ or ‘M2M’). For example, you must not insert a SIM card into any smart appliance, such as a thermostat in your home, or into a connected vehicle;
      • with any device that routes, re-routes, forwards, or diverts calls, data, text messages, multimedia (picture) messages or other services from or to our network, to avoid charges, make money or for any other purpose. These types of devices include a ‘GSM gateway’, a ‘SIM box’ or a ‘repeater’;
      • with equipment that we haven’t authorised you to use with the service including (but not limited to):
        • mobile broadband devices such as dongles or USB modems; or
        • mobile Wi-Fi devices that use our service to provide internet access to other Wi-Fi enabled devices;
      • for making calls and/or sending texts to more than 300 different numbers in a month; or
      • to make send offensive or nuisance communications in whatever form, or to make or receive reverse charge calls.
      • You mustn’t use more than one SIM card in the same mobile phone in any one month unless we’ve provided you with a replacement SIM card for any reason (for example, if the SIM card is faulty or if you’ve lost it).
      • You mustn’t carry out organised resale of EE or O2 mobile SIM cards that are provided to you by Link Solutions. Organised resale includes reselling a number of EE or O2 mobile SIM cards to people not mainly residing in or having stable links in the UK.
  1. Changes to this policy
    • We may change this policy from time to time and we’ll update this document when we do so.
    • It is your responsibility to regularly check our website for changes and updates to the policy.
    • Your continued use of any of our Services after any change to our policy shall constitute acceptance of the changes.
    • Our policy was last updated on 25th May 2018

Testimonials

“Link Solutions manage our email and internet systems, servers, cloud storage, internet security and backup. Our arrangement with them covers all computers, laptops and email infrastructure. We have an agreement which provides a fast response to all problems and issues. Having Link Solutions working with BML provides an insurance and assurance for our business”.

Ray Gollop
Burwell Maintenance Ltd

Latest News

What is a Trojan virus

The story of the Trojan Horse is one of the most well-known in history. In 1188BC the Greeks, locked in a gruelling siege of Troy for over ten years with the Trojans, deceived their enemies by pretending to quit the battlefield and ...

Call us
Get quote