Confronting Code Logo
Confronting Code
  • About
  • Services
  • Blog
  • Contact Us
  • Sign-in
  • Register
  • About
  • Services
  • Blog
  • Contact Us
  • Sign-in
  • Register
  • Acceptable Use
  • Anti-Spam
  • Cookies
  • Copyright
  • Hosting
  • Privacy
  • SLA
  • Terms of Service
Site logo

Acceptable Use

Introduction

This Acceptable Use Policy (AUP) outlines the acceptable and prohibited uses of the technology and resources provided by Confronting Code, a Managed IT and Web Development company, to its third-party users (hereinafter referred to as “Users”). This policy applies to all individuals and entities who utilise the Company’s technology infrastructure and resources through their engagement with Confronting Code.

Purpose

The purpose of this policy is to ensure the proper and secure use of Confronting Code’s technology resources by Users. By adhering to this policy, we aim to protect the integrity, confidentiality, and availability of our systems and data, as well as maintain a productive and professional service environment.

Acceptable Use

Authorised Use: Users are authorised to use Confronting Code’s technology resources for legitimate business purposes only. This includes activities directly related to the services provided by Confronting Code or approved projects.

Compliance with Laws and Regulations: Users must comply with all applicable laws, regulations, and Confronting Code’s policies while using the technology resources. This includes, but is not limited to, copyright laws, data protection laws, and industry regulations.

Respect for Others: Users must respect the rights and privacy of others when using Confronting Code’s technology resources. This includes refraining from engaging in activities that may be considered harassing, discriminatory, or offensive.

Security: Users are responsible for safeguarding the security of Confronting Code’s technology resources that they utilise. This includes not sharing access credentials, promptly reporting any security incidents or vulnerabilities, and following established security procedures.

Software and Licensing: Users must only utilise software that is properly licensed and authorised for use by Confronting Code. Unauthorised installation of software or illegal distribution of licensed software is strictly prohibited.

Data Protection: Users must protect the confidentiality and integrity of any data they handle using Confronting Code’s technology resources. This includes following data handling procedures, avoiding unauthorised access or disclosure of sensitive information, and securely disposing of data when no longer needed.

Resource Conservation: Users should use Confronting Code’s technology resources responsibly and efficiently. This includes avoiding excessive or unnecessary use of bandwidth, storage, and other resources.

Prohibited Activities

Unauthorised Access: Users must not attempt to access or use any Confronting Code’s systems, data, or resources for which they do not have explicit authorisation.

Malicious Software: Users must not introduce or spread malware, viruses, or any other malicious software onto Confronting Code’s systems or networks.

Illegal Activities: Users must not engage in any activities that are illegal, unethical, or in violation of Confronting Code’s policies while using Confronting Code’s technology resources. This includes, but is not limited to, piracy, fraud, and unauthorised access to third-party systems.

Inappropriate Content: Users must not access, create, or distribute any content that is offensive, obscene, or otherwise inappropriate for the business environment.

Network Abuse: Users must not engage in any activities that may degrade the performance or security of Confronting Code’s networks. This includes, but is not limited to, bandwidth-hogging activities, unauthorised monitoring of network traffic, and attempting to bypass network security measures.

Personal Use: While incidental personal use of Confronting Code’s technology resources may be permitted, Users must not engage in excessive or disruptive personal activities that interfere with the services provided by Confronting Code.

Enforcement

Violation of this Acceptable Use Policy may result in the suspension or termination of services provided by Confronting Code to the User. Confronting Code reserves the right to monitor and audit technology usage to ensure compliance with this policy.

Review and Modification

This Acceptable Use Policy is subject to periodic review and may be updated or modified by Confronting Code as necessary. Users will be notified of any changes to the policy, and it is their responsibility to review and understand the updated policy.

By utilising Confronting Code’s technology resources, Users agree to comply with the terms of this Acceptable Use Policy.

  • Signup to Confronting Code's Newsletter


      By subscribing to this newsletter, I consent to Confronting Code sending me monthly blog emails in accordance with Confronting Code's Privacy Policy. I may opt-out at anytime by clicking "unsubscribe" in the email footer or by visiting our Communications Preference Center.

    • Confronting Code
      • Confronting Code Limited
      • Rugby
      • Warwickshire
      • CV22 7PL
      • +44 (0)7591 747301
      • info@confrontingcode.com
      Company
      • About
      • Blog
      • Contact Us
      Legal Stuff
      • Acceptable Use
      • Anti-Spam
      • Cookies
      • Copyright
      • Privacy
      • SLA
      Services
      • Consultancy
      • Cyber Security
      • Development
      • Hosting
      • Managed IT
      • Helpdesk Support

      Copyright © 2025 | Confronting Code | All Rights Reserved