NWET Disclaimers, Terms and Code of Conduct

E-MAIL CONFIDENTIALITY NOTICE AND DISCLAIMER

Nwet Mail SecurityThe provisions of Section 11 of the Electronic Communications and Transactions Act 25 of 2002 apply to this email notice and make it enforceable and binding on the recipient/addressee.

This email message (including attachments) contains information which may be confidential and/or legally privileged. Unless you are the intended recipient, you may not use, copy or disclose to anyone the message or any information contained in the message or from any attachments that were sent with this email, and If you have received this email message in error, please advise the sender by email, and delete the message. Unauthorized disclosure and/or use of information contained in this email may result in civil and criminal liability.

Everything in this e-mail and attachments relating to the official business of Network Embedded Technologies, is proprietary to the company.

Caution should be observed in placing any reliance upon any information contained in this e-mail, which is not intended to be a representation or inducement to make any decision in relation to Network Embedded Technologies. Any decision taken based on the information provided in this e-mail, should only be made after consultation with appropriate legal, regulatory, tax, technical, business, investment, financial, and accounting advisors.

The e-mail address of the sender may not be used, copied, sold, disclosed or incorporated into any database or mailing list for spamming and/or other marketing purposes without the prior consent of Network Embedded Technologies.

Neither the sender of the e-mail, nor Network Embedded Technologies shall be liable to any party for any direct, indirect or consequential damages, including, without limitation, loss of profit, interruption of business or loss of information, data or software or otherwise.

No warranties are created or implied that an email user of Network Embedded Technologies is authorized to create and send this e-mail.

NETWORK EMBEDDED TECHNOLOGIES ACCEPTABLE USE POLICY (AUP)

AUPNETWORK EMBEDDED TECHNOLOGIES ACCEPTABLE USE POLICY (AUP)
Download PDF

NETWORK EMBEDDED TECHNOLOGIES PRIVACY POLICY

Privacy PolicyNETWORK EMBEDDED TECHNOLOGIES PRIVACY POLICY

Download PDF

NETWORK EMBEDDED TECHNOLOGIES STANDARD TERMS & CONDITIONS

TermsNETWORK EMBEDDED TECHNOLOGIES STANDARD TERMS & CONDITIONS

Download PDF

PROTECTING MINORS FROM PROBLEMATIC ONLINE CONTENT:

SecurityWEBSITES with information on protecting minors are listed below:

WiredSafety.org: The world’s largest Internet safety and help group
Cyberangels: World’s oldest and largest Internet safety organisation
GetNetwise: Educating parents and children about how to use the Internet safely
KidShield: Tools and information to create a safety net for your children online
ProtectKids.com: Protecting children in cyberspace

More information may be found at ISPA's PROTECTING MINORS page.

TAKE-DOWN NOTIFICATION PROCEDURE:

take Down PolicyIn terms of section 75 of the Electronic Communications and Transactions Act, NETWORK EMBEDDED TECHNOLOGIES has designated the INTERNET SERVICE PROVIDERS' ASSOCIATION as its agent to receive notifications of infringements as defined in SECTION 77 of the act.

DETAILS:

Internet Service Providers' Association (ISPA)
P.O. Box 3423
Parklands, 2121
Contact: +27 11 314 7751
email: complaints@ispa.org.za

Take Down Web Page

FAIR USE POLICY (Applicable to all Uncapped Services):

Fair UseThe usage is monitored on a rolling 15 day period and does not reset at the beginning of each month. All service options are Unshaped. Should usage remain less than 75% of the average user for each product, the service will remain unaffected. However should individual usage exceed 75% of the average user for each product, then the first level of moderation will be implemented, moving the service to a Shaped service. Shaping or moderation is implemented via download throttling and user relative priority control will first be applied to all file sharing protocols. Should the connection usage remain above the 70% average threshold, additional shaping will be managed via manipulation of throttling and priority control. This can be implemented by sending an email to the client warning him/her about the misuse of the network.

We currently do not allow P2P(Peer to Peer) network connections on our network.

Network Embedded’s servers may be used only for lawful purposes. Transmission, distribution or storage of any material in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property right used without proper authorization, and material that is obscene, defamatory, constitutes a legal threat, or violates export control laws. Examples of unacceptable content or links: "Pirated software", "Hackers programs or archives", "Warez Sites", "Irc Bots", "Illegal Mp3's" etc. We will be the sole arbiters as to what constitutes a violation of this provision with guidance taken from the Internet Service Provider's Association, our governing body.

CODE OF CONDUCT

ISPAThis Code of Conduct and the related documents were formally adopted by ISPA during its Annual General Meeting on 2002-09-12. Significant revisions were made by the Code of Conduct working group on 2007-01-31, 2007-12-04, 2008-02-21 and again on 2008-07-13 in order for the Code of Conduct to comply with the guidelines for the recognition of an Industry Representative Body in terms of the ECT Act. This revised Code of Conduct was formally adopted by ISPA on 2008-08-22.

Read More

Copyright [2009] by NWET | Terms Of Use | Privacy Statement | WoW Interactive | | Login