Acceptable Use Policy
ACCEPTABLE USE POLICY BIT B.V. - VERSION 2013-07-04
This document serves to inform the customers and users of BIT B.V. (hereinafter referred to as “BIT”) of their responsibilities when using BIT’s services. Should any provisions of this Acceptable Use Policy (AUP) be violated, BIT reserves the right to take measures as outlined in its Abuse Policy to prevent, halt, or mitigate such violations. This Acceptable Use Policy is also available as pdf.
Purpose
The objectives of this Acceptable Use Policy include:
- Providing users with secure and reliable internet services.
- Upholding the open nature of the internet as a platform for free expression.
- Promoting responsible internet use and discouraging practices that harm its usability and value.
- Safeguarding the rights, privacy, and (cyber)security of individuals and organisations.
- Defining the additional rights and obligations BIT imposes on users, beyond those stipulated by law.
Code of Conduct
- Users are expected to act as responsible and conscientious internet users, avoiding any actions that cause disruption to other users or networks.
- Users must comply with reasonable instructions issued by BIT regarding its services.
- Users shall refrain from transmitting or publishing any unlawful, illegal, threatening, discriminatory, defamatory, or otherwise harmful material—in any form—that could encourage criminal behaviour, give rise to civil liability, or violate Dutch or international laws.
- Users shall take all reasonable steps to prevent the distribution of computer viruses or malicious software via BIT’s infrastructure or the internet.
- Users must ensure that only adequately secured systems are connected to the internet.
- BIT treats users’ confidential data (including passwords) with the utmost care and expects the same level of diligence from its users.
- Users must promptly notify BIT if confidential data (whether BIT’s or provided by BIT) is, or is suspected to be, accessed by unauthorised parties.
- Users must immediately inform BIT of any unauthorised access to services or suspected breaches.
Abuse
Users shall not engage in, or attempt to engage in, the following:
- Unauthorised access to third-party systems or accounts.
- Accessing data not intended for the user.
- Executing denial-of-service (DoS) attacks.
- Intercepting or manipulating third-party network traffic without permission.
- Sending spam.
- Tampering with electronic communications (including email headers).
Revisions
BIT reserves the right to unilaterally modify this Acceptable Use Policy in response to societal or technical developments.