i2i Platform Fair Usage Policy
The following Policy relates to your use of our i2i Platform only. It is designed to make sure we can give you a Service that protects third party copyright and remains fast and reliable
You must make sure that any use of the i2i Platform, by yourself or anyone else within your organization, complies with this Policy. If you (or anyone else using the i2i Platform via your account) breach this Policy, we may:
(a) give you a notice to stop or moderate the unacceptable use(s); or
(b) terminate or suspend your Service, with or without notice as we consider appropriate, under the Terms.
This Policy is in addition to the Terms and Conditions for the i2i Platform provided under the Intertek Inform Subscription contract (the ‘Terms’). Terms which are not defined in this Policy will have the meaning set out in the Terms. If there’s any inconsistency between the Policy and the Terms, the Policy will prevail.
1. How to use the Fair Use Policy
1.1 You must not use the i2i Platform for:
(a) unlawful, fraudulent, criminal or otherwise illegal activities;
(b) sending, receiving, publishing, posting, distributing, disseminating, encouraging the receipt of, uploading, downloading or using any material which is offensive, abusive, defamatory, indecent, obscene, unlawful, harassing or menacing or a breach of the copyright, trademark, intellectual property, confidence, privacy or any other rights of any person; ;
(c) sending or uploading unsolicited emails, advertising or promotional materials, offering to sell any goods or services, or conducting or forwarding surveys, contests or chain letters,
(d) knowingly or negligently creating, transmitting, storing, publishing or uploading any electronic material (including, without limit, files that contain viruses, corrupted files, Trojans or any other similar software or program) which is known or likely to cause, interrupt, damage, destroy or limit the functionality of any computer software, hardware or telecommunications equipment owned by us or any other Internet user or person;
(e) activities that invade another’s privacy, cause annoyance, inconvenience or needless anxiety to any person;
(f) activities that are in breach of any other third party’s rights, including downloading, installation or distribution of pirated software or other inappropriately licensed software, deletion of any author attributions, legal notices or proprietary designations or labels in any file that is uploaded, falsification of the origin or source of any software or other material;
(g) anything that may disrupt or interfere with our i2i Platform or Service or cause a host or the network to crash;
(h) launching ‘denial of service’ attacks; ‘mailbombing’ attacks; or ‘flooding’ attacks against a host or network;
(i) granting access to the i2i Platform to others not located at the premises at which the Services are connected, or, in any way reselling or re-providing the Services to third parties;
(j) making excessive use of, or placing unusual burdens on, the network, for example by sending or receiving large volumes of download requests or print requests; or
(k) circumventing the user authentication or security process of a host or network.
2. How to keep secure profiles
2.1 The organization is responsible for ensuring that security information remains confidential, so that the network cannot be used by any unauthorized person.
2.2 The security information includes, but is not limited to, information controlling access to:
(a) any equipment, computer hardware systems or networks;
(b) any computer software or applications; or
(c) any other services accessed by you in the use of either of the above.
2.3 You shall not disclose any security information to any third party, or use the same for any purpose connected with the improper use of the network including accessing or attempting to access other parts of the services for which you do not have access rights.
2.4 You’re responsible for taking all reasonable steps necessary to prevent a third party obtaining access to the network.
2.5 If you share access with others (for example, your associate sites at different locations) any downloads they make will be counted as your use and count towards any monthly download allowance or excessive usage.
3. What about usage by employees?
3.1 The i2i Platform has certain controls to prevent misuse by employees;
(a) document downloads are limited to 150 in an 8 hour period to help prevent against the theft of the licenced information and;
(b) the same document cannot be downloaded more than 5 times in a 5 minute period to help prevent against a denial of the service being performed and;
(c) reporting dashboards highlight the number of times a user accesses the service, views documents, downloads items or orders items.
4. How do we help measure your usage?
4.1 We monitor your usage every week. We can provide reports on usage of the i2i Platform for information and administration purposes to support any resolution to any breeches within this Policy. These reports are protected under our Data Protection Policy and will not be shared with any other organization or other commercial parties.
This Policy is correct as at 10th June 2016