Internet Data Fair Use (Acceptable Use Policy)
We all like having lots of data and Wildanet has designed its network so you can have as much as you want as fast as you need. There is no data limit on your internet usage. Well, up to a point. While we don't set a data limit if your usage is so high it interferes with the network then we will have to have a word to let you know you're being unfair.
That doesn't mean we'll cut you off, the first thing we will do is contact you to say you're breaching our fair use policy. So, if you've never been contacted you know your usage is fine. If we do contact you then we will be asking you to wind it back a bit.
If our informal contact doesn't make you act more fairly then we will take action to reduce your usage. Again, we won't cut you off. What we'll do is put traffic shaping in place. Traffic shaping will give priority to fair users and put some of your data requests behind them in the queue.
As to what you can download. As a matter of course we installed your internet connection with an adult filter on this is a requirement of being an ISP in the UK, in short, we block all adult content including porn unless you ask us not to. If you want us to remove the adult filter just email
firstname.lastname@example.org with your name and account number and we'll be happy to turn it off. Of course, we won't unblock sites that UK Courts have told us to block (e.g. Pirate Bay) nor will we unblock illegal sites (please see our Blocking Policy).
The Legal Words
By taking service from Wildanet you agree to our Acceptable User Policy.
Wildanet's services may not be used by the user for any activity that may reasonably be regarded as unlawful or potentially so. This includes, but is not limited to, any of the following activities.
- Creation or transmission, or causing the transmission, of any offensive, obscene or indecent images, data or other material, or any data capable of being resolved into obscene or indecent images or material.
- Creation or transmission of material with the intent to cause annoyance, inconvenience or needless anxiety.
- Creation or transmission of material with the intent to defraud.
- Creation or transmission of defamatory material.
- Creation or transmission of material such that this infringes the copyright of another person.
- Creation or transmission of unsolicited bulk or marketing material to users of networked facilities or services, save where that material is embedded within, or is otherwise part of, a service to which the user or their User has chosen to subscribe.
- Deliberate unauthorised access to networked facilities or services.
- Deliberate or reckless activities having, with reasonable likelihood, any of the following characteristics:
- wasting staff effort or Wildanet resources, including time on end systems on another User's network, and the effort of staff involved in the support of those systems;
- corrupting or destroying other users' data;
- violating the privacy of other users;
- disrupting the work of other users;
- denying service to other users (for example, by overloading of access links or switching equipment, of Wildanet services, or of services or end systems on another network);
- continuing to use an item of software or hardware after the Wildanet Network Operations Centre (NOC) or its authorised representative has requested that use cease because it is causing disruption to the correct functioning of Wildanet' Networks;
- other misuse of Wildanet' Network, such as the introduction of "viruses" or other harmful software via Wildanet to resources on Wildanet Network, or on another User's network.
Access to Other Networks via Wildanet
Where Wildanet is being used to access another network, any deliberate or persistent breach of the acceptable use policy of that network will be regarded as unacceptable use of Wildanet. Any activity as described in clause 16 above, and where applied either to a user of that network, or to an end system attached to it, will also be regarded as unacceptable use of Wildanet.
Any deliberate or persistent breach of industry good practice (as represented by the current standards of the London Internet Exchange) that is likely to damage the reputation of Wildanet will also be regarded prima facie as unacceptable use of Wildanet.
It is the responsibility of the User to take reasonable steps to ensure compliance with the conditions set out in this Policy document, and to ensure that unacceptable use of Wildanet's internet service is dealt with promptly and effectively should it occur. The discharge of this responsibility includes informing all users of Wildanet's services connected to a User's equipment of their obligations in this respect.
Where necessary, service may be withdrawn from the User, in accordance with the Wildanet Terms. Where violation of these conditions is unlawful, or results in loss or damage to Wildanet resources or the resources of third parties accessible via Wildanet, the matter may be referred for legal action.
Note 1: The Acceptable Use Policy does not make any particular statement as to the acceptability of using Wildanet for activities resulting in commercial gain to the User, other than this is acceptable where lawful. However, it should be noted that there are legal constraints applying to a publicly funded User in such activities. Where the User is operating as an economic undertaking the issue of State Aid will need to be considered.
Note 2: It is preferable for misuse to be prevented by a combination of responsible attitudes to the use of Wildanet resources on the part of its users and appropriate disciplinary measures taken by their Users.
Note 3: The list of unacceptable activities in this section is not exhaustive. The purpose is to bring as clearly as possible to the reader's attention those activities most commonly associated with the abuse and potentially unlawful use of a network.
Note 4: Implicit authorisation may only be presumed where a host and port have been advertised as providing a service (for example by a DNS MX record) and will be considered to have been withdrawn if a complaint from the provider of the service or resource is received either by the User or by Wildanet. For all other services and ports, access will be presumed to be unauthorised unless explicit authority can be demonstrated.
Note 5: Where a User wishes to commission Wildanet or itself perform a test for vulnerabilities in its IT systems (for example, via "penetration testing") this, as an action authorised by the User, will not be a breach of clause 15. However, the User should inform the Wildanet NOC, in advance of the test, of the source, nature and timing of the test. This is to avoid wasting the time and resources of the NOC in investigating the perceived attack on the User, or automatically blocking it.