This set of rules and conditions restrict the ways in which our services may be utilised. If you breach the policy or help others to do so, we may suspend or terminate your use of the services.
Definitions
In this policy, the following words have the following meanings:
AUP refers to this acceptable use policy;
Services refers to the web and telecommunications services offered by us;
System refers to any network, computer or communications system, software application, or network or computing device;
User refers to any person, other than Etchmail employees or agents engaged in providing support or implementation services to Resellers or Customers, accessing and/or using the Services
Changes to the policy
We may change the terms of this policy at any time. We will notify you of any changes by placing a notice in a prominent place on the website or by email. If you do not agree with the change, you must stop using the services. If you continue to use the services following notification of a change to the terms, the changed terms will apply to you and you will be deemed to have accepted such terms.
1. No message abuse
You will not publish, send, or facilitate the sending of unsolicited mass e-mails or other messages. You will not collect replies to messages sent from another Internet service provider if those messages breach this policy or the AUP of that provider.
Spam. No user may use the software service in a way that could blacklist the software service as a SPAM or unsolicited message generator. If you don't have proven permission to email the addresses on your mailing lists, you are sending spam. If we suspect or detect such usage, we may restrict, suspend, or terminate any user's use of the software service. If any user breaches these terms, we may immediately terminate the user's use of the software service without giving a refund.
Lists. You must not use lists that you have bought, rented, or otherwise not built yourself. Users may only use the services to send messages that comply with the requirements set out for each service in section 5 of the AUP.
Protection of Personal Information Act (POPI). You must comply with the conditions for processing personal information and special personal information.
2. No illegal, offensive, or harmful use or content
You may not use or help others to use, the services or site for any illegal, harmful, or offensive activities, or distribute or make content available that is illegal, offensive, or harmful. Prohibited activities or content include:
Harmful content. Content or other computer technology that may damage or interfere with any system or data, including viruses, Trojan horses, worms, time bombs, or bots.
Harmful or fraudulent activities. Activities that may be harmful to others, our systems, operations, or reputation, including offering or sharing fraudulent goods, services, or promotions or engaging in other deceptive practices.
Illegal activities. Any illegal activities, including promoting or making available gambling sites or services or sharing, promoting, or facilitating child pornography.
Intellectual property infringement. Content that infringes the intellectual property rights of others (for example their copyright or trademarks).
Offensive content. Content that is defamatory, obscene, abusive, infringes someone’s right to privacy or is otherwise objectionable.
3. Security breaches
You may not use the services to breach the security or integrity of any system including:
Falsification of origin. Forging TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route. This prohibition does not include the use of aliases or anonymous remailers.
4. Network abuse
You may not make network connections to any users, hosts, or networks unless you have permission to communicate with them. Prohibited activities include:
Denial of Service (DoS). Intentionally and maliciously interrupting an authorised user's access by inundating a target with communications requests so the target responds so slowly that it becomes ineffective.
Intentional interference. Interfering with the proper functioning of any system, including any deliberate attempt to overload a system using techniques such as mail bombing or flooding.
Avoiding system restrictions. Using manual or electronic means to avoid any use limitations placed on a system, such as access and storage restrictions.
5. Services
5.1 Permission
Etchmail is a permission-based email marketing platform designed for organisations that wish to manage existing relationships with their customers by email. Our Permission Policy appears as a reminder on the list import process every time new lists are added. Our policy goes beyond the stipulations set forth in the South African Electronic Communications legislation.
The Customer must retain records of any Permission received and shall provide such records to Etchmail immediately upon request. Permission must be obtained in one of the ways described below. A Contact:
5.2 Prohibited Uses
You may not
5.3 Required Content
You may not send emails using the Etchmail service that does not include an “unsubscribe” link, in form and substance satisfactory to Etchmail and that:
Each email must clearly and accurately identify the individual or organisation that authorised the sending of the email. To the extent required by law, identification must include the correct legal name of the Authorising Party, a registered business number, a legitimate physical address, and contact details. All identification information should remain valid for at least 30 days after the email is sent.
6. Our monitoring and enforcement
We reserve the right to take whatever action we deem necessary to preserve the security and reliable operation of our systems and you undertake that you will not do or permit anything to be done which will compromise our security. We may report any activity that we suspect breaks any law to appropriate law enforcement officials or other appropriate third parties. We also may cooperate with law enforcement authorities, regulators, or other appropriate third parties to help with the investigation and prosecution of illegal conduct by providing network and systems information related to alleged violations of this policy.
7. Reporting of breaches of this policy
You must immediately notify us of any breaches of this policy and provide us with assistance, as requested, to stop or remedy the breach. Please contact us and ask for our abuse reporting process.
8. Right to Terminate.
Etchmail may, in its sole discretion, remove your Content, suspend, or terminate (without refund) your use of the Services for any actual breach of this Policy at any time.
Removal, suspension, or termination pursuant to this clause will not terminate your obligation to pay fees owed to Etchmail as set out in the relevant accepted quotation or contract terms.
9. Partners
Partners are responsible for the conduct of their Customers and in accordance with this AUP, acknowledge User adherence to the AUP. Resellers must make their Customers aware of the AUP and the consequences for violation.
10. Customers
Customers are responsible for the conduct of their Users and in accordance with this AUP, acknowledge User adherence to the UAP. Customers must make their Users aware of the AUP and the consequences for violation.
Any questions relating to the above policies should be directed to Etchmail prior to signing up for any of our Services:
Martech (Pty) Ltd t/a Etchmail
60 Mill Street
Paarl
7646
Telephone: +27 (0)12 87 222 80
Email: info@etchmail.com