
Business Connectivity & Internet
This Acceptable Use Policy (“Policy”) applies to all Connectivity & Internet Services supplied by technologE Ltd under
Schedule 2 – Business Connectivity & Internet and the Master Terms and Conditions. It forms part of the Agreement and should be read alongside the Price List/Rate Card.
1. General Principles
1.1 Connectivity & Internet Services are supplied for the legitimate business use of the Customer and its End Users only.
1.2 Use must remain fair, reasonable and proportionate compared with typical business usage on the relevant Service.
1.3 technologE reserves the right to monitor usage and take reasonable steps where usage breaches this Policy, Applicable Law, Ofcom rules, or impacts network integrity.
2. Fair Usage
2.1 “Unlimited” or unmetered bandwidth/data Services are subject to fair usage. technologE may act where usage is:
materially higher than that of a typical business customer of comparable size and sector; degrading or threatening the performance of the network for other users; orinconsistent with ordinary business use (e.g. running public-facing
hosting platforms on business broadband).
2.2 Indicative thresholds (e.g. 1TB/month on broadband; 95th percentile monitoring on leased lines) may be published in the Price List/Rate Card. Persistent excessive use above these thresholds may result in traffic management, migration to a more appropriate tariff, or, in extreme cases, suspension.
3. Prohibited Use
Customers and End Users must not:
Use the Services for unlawful, fraudulent, harmful or criminal activity.
Send, receive, store or distribute defamatory, obscene, discriminatory, threatening, harassing, or otherwise offensive
material.
Infringe third-party Intellectual Property Rights.
Send bulk unsolicited email (“spam”), automated messages, or chain communications in breach of PECR.
Operate open mail relays, or servers allowing unauthorised third-party use.
Introduce or distribute viruses, malware, trojans, worms, spyware or other harmful code.
Attempt unauthorised access to any system, account, or network, or launch denial-of-service (DoS/DDoS) attacks.
Resell, share, or otherwise commercially exploit Services without technologE’s prior written consent.
Use peer-to-peer (P2P) file sharing or high-volume traffic applications in a way that degrades Service quality for others.
Breach Applicable Law, including UK GDPR, PECR, Computer Misuse Act 1990, Copyright, Designs and Patents Act 1988, or Ofcom rules.
4. Customer Responsibilities
The Customer shall:
Ensure End Users are made aware of and comply with this Policy.
Implement appropriate security controls (firewalls, anti-virus, access restrictions).
Remain responsible for all use of the Services, whether authorised or unauthorised.
Promptly notify technologE of any suspected misuse, security incident, or Policy breach.
Comply with all vendor licence terms, industry standards, and Applicable Law.
5. Enforcement
5.1 technologE may take proportionate action if this Policy is breached, including:
(a) issuing warnings;
(b) applying traffic management, speed restrictions, or service migration;
(c) charging out-of-bundle or excess usage rates;
(d) suspending or restricting Services;
(e) terminating the affected Service(s) in accordance with the Agreement.
5.2 Charges will continue to accrue during any suspension.
6. Updates
This Policy may be updated from time to time. The latest version will always be published with the Price List/Rate Card
.png)