Acceptable Use Policy
This Acceptable Use Policy (“AUP”) is applicable to all members of and visitors to New Life Christian Church (“NLCC”) site at Emsworth, and users of NLCC owned and provided equipment (“Equipment”), the NLCC website and the NLCC on site data network (“Network”)(“Users”). This policy also applies to use of Users’ own mobile devices, computing and gaming equipment (“Devices”) whilst on the NLCC site.
ACCEPTABLE USE POLICY
This AUP is intended to ensure that all Users access and use Devices, Equipment and the Network in an ethical and lawful manner. Any violations or attempted violations of this AUP by a User on the NLCC site or a user of the NLCC website or Network may lead to immediate suspension of access to the NLCC website and Network as well as legal and financial liability for any consequences of that violation.
(b) You must not use Devices, Equipment, the NLCC website or the Network for unlawful, immoral or unethical purposes or to further or promote unlawful, immoral or unethical activities. This includes, without limitation, use of Devices, Equipment, the NLCC website, or the Network that:
(i) infringes any copyright, trademark, or other intellectual property right;
(ii) is, or may be perceived as, obscene, threatening, bullying, abusive, harassing, defamatory, deceptive, fraudulent, or invasive of another person’s privacy;
(iii) violates the NLCC safeguarding policy;
(iv) stores, distributes or propagates viruses, worms, trojan horses or other data or code that has a destructive or harmful intent;
(v) generates, distributes, publishes or facilitates unsolicited mass email, promotions, advertisings or other solicitations (“spam”); or
(vi) violates domestic or international laws, regulations orders, or treaties.
(c) You must not use Devices, Equipment or the Network for any unauthorized access to or use of the data, systems and networks of others.
(d) You must not use Devices, Equipment or the Network to interfere with the NLCC website, the Network or any other device, host or network, including deliberate attempts to overload a server, network connected device, or network component, including DDoS attacks.