hotkey google
Acceptable Usage Policy Print

This is Hotkey.s Acceptable Use Policy. It applies to you if you are a Hotkey subscriber or user ("you"). It is intended to ensure that your use of Hotkey.s service is trouble free and that you have due regard to the law and the needs of other users.

Please read it carefully. It is a condition of your use of our service that you comply with the terms of this Policy.

From time to time we will make amendments to it by giving you notice of the change and you will then be obliged to comply with the policy as amended.

1. General Principles

1.1 Hotkey is not responsible for the content of user originated traffic

We exercise no direct supervision or control whatsoever over the content of the information passing through our network. We do not assume any responsibility for information not sent or authorised by us. The responsibility for traffic that does not conform with this policy and all possible consequences lie with the sender of the traffic.

   1.2 You are responsible for use of your account

You are responsible for the actions of other users of your account. In this policy, references to you include other users of your account, where the context allows.

   1.3 You are responsible for complying with conditions of use of other networks

If we provide you with access to a network outside our service you must comply with any acceptable use conditions which apply to that network.

2 Acceptable uses

2.1 You have responsibilities

It is your responsibility to:
use our service and services in a manner which does not violate any applicable laws or regulations; respect the conventions of the newsgroups, lists and networks that you use; respect the legal protection afforded by copyright, trade marks, license rights and other laws to materials accessible via our service; respect the privacy of others; use the service in a manner which does not interfere with or disrupt other network users, services or equipment; and refrain from acts that waste resources or prevent other users from receiving the full benefit of our services.

   2.2 Use must be ethical

Your use of our services should be ethical and in accordance with accepted community standards.

3 Unacceptable uses

  3.1 You must comply with the Law

You must not use our service for any purpose, which violates local, State, Federal or international laws or which may impose criminal or civil legal liability on you or on us or on any other person.

   3.2 Specific kinds of use are not allowed

It is not acceptable to use our service to, amongst other things:

violate any intellectual property rights; illegally store, use or distribute software; access, search for, copy, publish or transmit threatening, obscene or offensive materials; engage in electronic "stalking" or other forms of harassment such as using abusive or aggressive language; misrepresent or defame others; commit fraud; gain unauthorised access to any computing, information, or communications devices or resources, including but not limited to any machines accessible via the Internet; damage, modify or destroy the files, data, passwords, devices or resources of Hotkey, other users or third parties; engage in misleading or deceptive conduct; conduct any business or activity or solicit the performance of any activity that is prohibited by law; make an unauthorised transmission of confidential information or material protected by trade secrets; or attempt to do any of these things.

  3.3 Disruption of the network is not allowed

You may not use the service to interfere with or disrupt other network users, services or equipment. In particular, for example, you must not:

propagate computer worms, viruses and other types of malicious programs; make transmissions of any type or quantity which adversely affect our operation or jeopardise the use of our service, or its performance for other subscribers; and harass or impersonate Hotkey or other users.

  3.4 Soliciting subscribers to other services is not allowed

It is also not acceptable to use our service to solicit subscribers to become subscribers of other competitive information services.

   3.5 Resale of our services is not allowed

Resale of our services to others is strictly forbidden under all circumstances.

  3.6 Copyright infringement

You must not be knowingly involved in, or allow, copyright infringement.

Without being obliged to do so, we may delete or restrict access to material which we reasonably suspect infringes copyright. You must not use a file-locating system if it infringes copyright.


"Spam" includes one or more unsolicited commercial electronic messages with an Australian link for purposes of the Spam Act, and derivations of the word "Spam" have corresponding meanings.Spam Act. means the Spam Act 2003 and includes regulations made under it. You may not use or allow any Service to be used to:

send, allow to be sent, or assist in the sending of Spam; use or distribute any software designed to harvest email addresses; or otherwise breach the Spam Act.

  3.8 Child pornography and child abuse material

You must not use our service for accessing, hosting or searching for material involving child pornography or child abuse material. We are obliged by law to report any material which we have reasonable grounds to believe or suspect is child pornography or child abuse material, which can be accessed through our service. Strict criminal penalties apply.

4 What we may do to ensure that this Policy is being followed

4.1 We may monitor your account but will respect your privacy

If we have cause, we may monitor the conduct of your account to determine whether this policy is being followed. If we monitor the conduct of your account we will safeguard your privacy unless to do so would involve us in concealment of a criminal offense or inhibit the enforcement of this policy.

  4.2We may suspend any Service:

if the Service provided to you is being used to host any device or service that allows email to be sent by or to third parties, whether or not under your authority or control; or if you are in breach of this policy; but we will first make reasonable attempts to contact you and give you the opportunity to address the problem within reasonable time period. What is reasonable in this context will depend on the severity of the problems. Our right to suspend a Service applies regardless of whether the open service is provided or the breach is committed intentionally, through misconfiguration, or by other means whether or not authorised by you, including but not limited to, through a Trojan horse or virus. If the Service is suspended and the grounds upon which it was suspended are not, to our reasonable satisfaction, corrected by you within 7 days, we may terminate the Service. In the event the Service is terminated under this clause, you may apply for a pro rata refund of any pre-paid charges for the Service, but we will have the right to levy a reasonable fee for any costs incurred as a result of the conduct that resulted in suspension.You agree to use your reasonable best endeavours to secure any device or network within your control against being used by third parties, including where appropriate:
the installation and maintenance of Email Spam Protection and Email Virus protection the installation and maintenance of general antivirus software; the installation and maintenance of firewall software; and the application of operating system and application software patches and updates. We may scan any IP address ranges allocated to you for your use with the Service in order to detect the presence of open or otherwise misconfigured mail and proxy servers.

Updated 17 Nov. 06