Skip to Main Content
Become a Microsoft 365 Superhero 🦸 Let Geekee help you get the most out of your Microsoft 365

Fair and Acceptable Use Policy

What’s this all about?

In a nutshell, the following list details all the uses of Geekee Limited's ("Geekee") Internet services that we consider unacceptable - in other words, unfair usage. Geekee maintains and promotes a policy of fair and acceptable usage at all times, so please ensure that any use of Geekee’s services, by yourself or anyone in your organization, doesn't in any way contradict the restrictions listed below. You will also find your responsibilities to help keep our network secure listed at the end of this Fair and Acceptable Usage Policy (the ‘Policy').

Please ensure that anyone using your account to access Geekee’s Internet services agrees with this Policy and is aware of their obligations under it. This extends your employees or office workers or any one accessing the network through your office.

So what can’t Geekee’s services be used for?

  • Unlawful, fraudulent, criminal or otherwise illegal activities
  • Sending, receiving, publishing, posting, distributing, disseminating, encouraging the receipt of, uploading, downloading, recording, reviewing, streaming or using any material which is offensive, abusive, defamatory, indecent, obscene, unlawful, harassing or menacing or a breach of the copyright, trademark, intellectual property, confidence, privacy or any other rights of any person
  • Sending or uploading unsolicited emails, advertising or promotional materials, offering to sell any goods or services, or conducting or forwarding surveys, contests or chain letters except in accordance with the Privacy and Electronic Communications Regulations 2003 if sent in batches of no more than fifty (50) emails at any time, each individual campaign being sent to no more than five hundred (500) recipients, with no more than five (5) campaigns per month
  • Knowingly or negligently transmitting or uploading any electronic material (including, without limit, files that contain viruses, corrupted files, or any other similar software or programmes) which is known or likely to cause, interrupt, damage, destroy or limit the functionality of any computer software, hardware or telecommunications equipment owned by Geekee or any other Internet user or person
  • Activities that invade another's privacy, cause annoyance, inconvenience or needless anxiety to any person
  • Activities that are in breach of any other third party's rights, including downloading, installation or distribution of pirated software or other inappropriately licensed software, deletion of any author attributions, legal notices or proprietary designations or labels in any file that is uploaded, falsification of the origin or source of any software or other material
  • Anything that may disrupt or interfere with Geekee’s network or services or cause a host or the network to crash
  • Launching "denial of service" attacks; "mailbombing" attacks; or "flooding" attacks against a host or network
  • Granting access to your Geekee services to others not residing at or located at the premises at which these Internet services are provided
  • Making excessive use of, or placing unusual burdens on, the network, for example by sending or receiving large volumes of email or excessively large email attachments
  • Circumventing the user authentication or security process of a host or network
  • Creating, transmitting, storing or publishing any virus, Trojan, corrupting programme or corrupted data
  • Monitoring or recording the actions of any person entitled to be in your business premises without their knowledge or any person or thing outside of your premises including, without limitation, any public highway or roadway or another person's business premises
  • Collecting, streaming, distributing or accessing any material that you know, or reasonably should know, cannot be legally collected, streamed, distributed or accessed.

What about security?

You are responsible for ensuring that any member ID and/or password selected by you remain confidential so that the network cannot be used by any unauthorised person.

The member ID and/or password referred to include, but are not limited to, those controlling access to (a) any computer hardware systems or networks; (b) any computer software or applications; or (c) any other services accessed by you in the use of either of the above.

You shall not disclose any member ID or password to any third party, or use the same for any purpose connected with the improper use of the network including accessing or attempting to access other parts of the services for which you do not have access rights.

You are responsible for taking all reasonable steps necessary to prevent a third party obtaining access to the network.

You must immediately advise us if you become aware of any violation or suspected violation of these Security provisions.

What about usage by others without your knowing?

No excuse. You are responsible for all uses made of Geekee’s Internet services through your account (whether authorised or unauthorised) and for any breach of this Policy whether an unacceptable use occurs or is attempted, whether you knew or should have known about it, whether or not you carried out or attempted the unacceptable use alone, contributed to or acted with others or allowed any unacceptable use to occur by omission. You agree that Geekee are not responsible for any of your activities in using the network. Although the Internet is designed to appeal to a broad audience, it's your responsibility to determine whether any of the content accessed via Geekee’s Internet service is appropriate for others in your office to view or use.

Anything else you should know?

Spam is evil. Geekee reserves the right to block any emails that have the characteristics of spam. You will be contacted by Geekee if any emails sent by you are blocked for this reason. Any spamming activity may result in suspension or termination of your service at Geekee’s option and sole discretion.

What about excessive network usage?

If it's felt that any Geekee member's Internet activities are so excessive that other members are detrimentally affected, Geekee may give the member generating the excessive web traffic a written warning (by email or otherwise). In extreme circumstances, should the levels of activity not immediately decrease after the warning, Geekee may terminate that member's services.

What happens is this policy is breached?

If any member's use of these services constitute a breach of this Policy, Geekee may, at its option and discretion, either give the member notice to stop the unacceptable use(s) or terminate that member's services (with or without notice as Geekee considers appropriate).

To report any illegal or unacceptable use of Geekee services, please send an email to support@geekee.co.uk.

Our super-friendly team provide businesses and schools with all-inclusive Managed IT support and connectivity. We specialise in cyber security to protect your organisation.
bubble linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram