| Acceptable Use Policy

PLEASE READ THE TERMS OF THIS POLICY CAREFULLY BEFORE USING THE SITE

GENERAL

​Equipment and services provided by LiveLink may only be used for lawful purposes. Each Customer is solely responsible for all stored and transmitted data of the equipment provided to them by LiveLink and all actions which emanate from that equipment. The Customer must take adequate measures which comply with the current state of technology to ensure that any misuse of the equipment is effectively prevented. Any use which contravenes national, European or international law which may apply to LiveLink, the Customer's local jurisdiction, or any jurisdiction that the Customer or the Customer's site may be subject to, is strictly prohibited.

  1. LiveLink, in so far as is permitted by law, maintains logs of actions and may preserve the content of equipment as well as hand over such logs or content in accordance with legislation, on Order of the Court or orders from any other body appointed by law.

  2. LiveLink reserves the right to block any equipment at any time which causes a loss of network integrity, affects the network operation of other equipment or restricts or inhibits any other user from using and enjoying the Internet without prior warning including those actions which are not specifically referred to below.

  3. LiveLink further reserves the right to remove access to the Internet if it is deemed to be causing excessive load or traffic over an unacceptably long period.

IP SPOOFING

IP spoofing refers to the falsification of the IP sender address for outgoing IP packages. This technology is generally used to conceal the origin of IP packages. LiveLink has installed anti-spoofing filters in order to prevent IP spoofing. All attempts at IP spoofing are automatically logged. Any attempt at IP spoofing will lead to the immediate blocking of the equipment without prior warning.

MAC SPOOFING AND MAC FLOODING

MAC spoofing refers to the falsification of a sender address of an Ethernet framework. This technology is often used to give a false identity in the local network or for a router. MAC flooding refers to the sending of Ethernet frameworks with a number of different sender addresses for the purpose of flooding MAC databanks of switches thus causing a malfunctioning of these switches. LiveLink has put in place measures which, in the event of any attempt at MAC spoofing or MAC flooding, trigger an immediate and automatic blocking of the equipment without prior warning. All attempts at MAC spoofing and MAC flooding are automatically logged.

ARP SPOOFING AND ARP FLOODING

ARP spoofing refers to the falsification of an ARP entry on a router by unsolicited ARP replies. This technology is often used to prepare a man-in-the-middle attack. ARP flooding refers to the mass transmission of ARP replies for the purpose of flooding the ARP databank of a router and thus causing a malfunctioning of this switch. All attempts at ARP spoofing and ARP flooding are logged and will lead to the immediate blocking of the equipment without prior warning.

TRANSMISSION OF SWITCH PROTOCOL FRAMEWORKS

The transmission of switch protocol frameworks, in particular spanning tree protocol frameworks (BPDUs), will lead to the immediate and automatic blocking of the equipment without prior warning. All attempts to transmit switch protocol frameworks are logged.

TRANSMISSION OF SPAM AND MALWARE

Spam refers to the mass transmission of unsolicited or unrequested email advertisements. Malware refers to any type of injurious software e.g. viruses, worms, trojans, backdoors, spyware or illegal dialers. The sending of spam can lead to a warning being sent to the equipment operator or to the immediate blocking of the equipment without prior warning depending upon the gravity of the infringement. The sending of Malware will lead to the immediate blocking of the equipment without prior warning.

PHISHING

Phishing refers to illegal attempts to release access data for security areas to an unauthorised user or users. Well known websites are often imitated so as to appear deceptively genuine for this purpose. The websites are reached under domain names which are similar to the original domain names. Users are invited by misleading emails to enter their access data on such hoax websites. Phishing will lead to the immediate blocking of the equipment without prior notice.

DENIAL OF SERVICE ATTACKS

Denial of Service attacks (DoS) refers to an attack on a equipment with the purpose of disabling one or more of its services. This generally occurs by overloading e.g. by attacks with a number of small UDP packages or TCP-SYN packages. Where the attack is coordinated by a larger number of other systems this is referred to as a Distributed Denial of Service (DDoS). LiveLink has put in place measures which permit the empirical recognition of DoS attacks. All DoS attacks are logged and will lead to the immediate blocking of the equipment without prior warning.

SCANNING OF EXTERNAL COMPUTERS

​The scanning of computers refers to the systematic searching for services on a computer with the purpose of detecting weaknesses in the services in order to utilise them for hacking at a later time. Scanning can lead to a warning being sent to the operator of the service or to the immediate blocking of the equipment without prior notice, according to the seriousness of the infringement.

HACKING OR ATTEMPTS AT NON AUTHORISED ACCESS

All non-authorised or illegal access to IT systems (e.g. "hacking") will lead to the immediate blocking of the equipment without prior warning.

OFFERING OF UNLAWFUL INFORMATION

The offering of unlawful or abusive, pornographic, racist, politically radical, defamatory or offensive information of any kind (as well as information which contravenes the rights of third parties in whatever form) including without limitation any transmissions constituting or encouraging conduct that would constitute a criminal offence, give rise to civil liability, or otherwise contravene national, European or international law(s) including, trademark, trade secret, misappropriation and anti-dilution laws. Infringement will lead to the immediate blocking of the equipment without prior warning.​

BREACH OF COPYRIGHT ETC

The Customer is prohibited either from offering or distributing any intellectual property, such as that which is protected by copyright, without lawful authority. The operating of so called P2P exchanges, download services or streaming services over which copyright protected information could be distributed without lawful authority is not permitted. It is also prohibited to make available links which connect to P2P exchanges, download services, streaming services or information provided by them. In case of infringement, ‘LiveLink reserves the right to remove the equipment’s access to the Internet and to terminate the agreement without prior warning.