Acceptable Usage

RULES OF ACCEPTABLE USAGE

Usage Procedures

The following usage procedures describe the appropriate manner of conduct and prohibited uses of services provided by Mayfair Confidential (a business name of Mayfair Consulting Pty Ltd ACN 614 075 893) (‘Mayfair Confidential’). By accepting these Terms and Conditions of Mayfair Confidential when registering for and using the Services of Mayfair Confidential, you also agree to abide by the usage procedures which are subject to change from time to time. Any breach of these usage procedures may result in suspension and/or termination of your account. These usage procedures are not exhaustive. 

  1. General Responsibilities

    The Services of Mayfair Confidential enable an adult services provider to advertise thier services and search for information. Largely, Mayfair Confidential will not actively monitor, edit, or directly control any use that is made of the Mayfair Confidential Website, however, Mayfair Confidential provides its services with the following objectives; firstly to ensure Advertiser/User security, reliability and privacy; secondly, maintaining an image and reputation of Mayfair Confidential as a responsible online directory; thirdly, encouraging the responsible use of the services of Mayfair Confidential including the website services and depressing any illegal, rude, offensive or degrading uses. Overall, Mayfair Confidential assumes you, and all other Users of the Services of Mayfair Confidential, to use such with responsibility, courtesy and moral. Mayfair Confidential forbids the breaches to these usage procedures. Such breaches may result in the suspension or termination of the Services provided by Mayfair Confidential. You, all other Users, remain solely liable and responsible for the use of all services provided by Mayfair Confidential including all and any content that you upload, display, download or transmit through the Website. It is deemed a breach of these usage procedures, if there is an indirect or attempted breach of these usage procedures or actual or attempted breaches by third parties on your behalf.

  2. Harmful or illegal use

    The Services of Mayfair Confidential may only be used lawful purposes. Mayfair Confidential strictly prohibits the storage, distribution, sale or transmission of any material of any application law, regulation, rules, or these usage procedures. Mayfair Confidential reserves the right, in its discretion, to limit or forbid any and all uses of services provided by Mayfair Confidential or content in your advertisements and to eliminate any materials from its servers as it considers, in its discretion, to be harmful to its servers, network, systems, reputation, good will, other Mayfair Consideration customers, or third parties. Examples of such material include, without limitation, any material that falls within the following categories:

    1. Infringement

      Material which is an infringement of intellectual property rights or other proprietary rights including, without limitation, material protected by trademark, copyright, patent, trade secret, or other intellectual property rights used without sufficient authorisation. Examples of such infringement include the unapproved copying and posting of pictures, logos, software, articles etc. 

    2. Offensive Materials

      Material which constitutes the hosting, storage, transmission, disseminates or sale of any material that is unlawful, defamatory, obscene, lewd, indecent, harassing, harmful threating, privacy invasive, abusive, breaches publicity rights, inflammatory or otherwise objectionable.

    3. Harmful Content 

      Material which constitutes the hosting or dissemination of harmful content including, without limitation, viruses, cancelbots, trojan horses, worms or any other computer programming routines that may damage, interfere with, secretly intercept or seize any system,  program, data or personal information.

    4. Fraudulent Conduct 

      Material which offers or disseminates fraudulent goods, services, schemes, or promotions (for example and without limitation, Ponzi schemes, make money fast schemes, chain letters, pyramid schemes), or furnishing of false data on any signup forms, contracts or online applications or registrations, or the fraudulent use of any information obtained through the use of the website, including, without limitation, the use of financial information. 

  3. Integrity and Security of Systems and Networks

    Mayfair Confidential strictly prohibits the violations of Mayfair Confidential or any third party’s servers, system, or network security through the use of the Website. Such prohibited activity may give rise to civil and criminal consequences. Mayfair Confidential may, in its discretion, investigate any incidental involving such violations. If reasonably suspected, Mayfair Confidential may involve and cooperate with any law enforcement agencies. Examples of server, network or system security violations include, without limitation, the following:

    1. Hacking

      Without prior written express authorisation, any such unauthorised access to or use of date, systems, server or networks, including any attempt to probe, scan, or test the vulnerability of a system, server or network or to breach security or authorisation measures.

    2. Interception

      Without prior written express authorisation, any such unauthorised monitoring of data or traffic on any network, server or system.

    3. Purposeful Interference 

      Interferences with the service to any user, host or network including, without limitation, news bombing, mail bombing, other flooding techniques, deliberate attempts to overload a system, broadcast attacks and any activity resulting in the crash of a host. Purposely or intentional inferences also includes, without limitation, the use of any kind of program/script/command, or send messages of any kind, designed to interfere with a user’s terminal session, via any means, locally or by the Internet. 

    4. Origin Falsification 

      Falsifying of any TCP-IP packet header, e-mail header or any part of a message header. This prohibition includes the use of aliases or anonymous remailers. 

    5. Evading System Restrictions

      Using electronic or manual means to avoid any use limitations placed on the services provided by Mayfair Confidential such as timing out. 

    6. Failure to Safeguard Accounts

      Unsuccessfully preventing the unauthorised access to accounts, including any account passwords.

E-MAIL

You may not publish, distribute or send any of the types of email that are unsolicited promotions, advertising or solicitations (i.e. spam), including without limitation, commercial adverting and announcements of information, except for those who have explicitly requested such e-mails; commercial promotions, advertising, solicitations or information announcements that contain false or misleading information in any form; harassing e-mail, whether through language, size of frequency or messages; chain letters; malicious email, including without limitation ‘mail bombing’ (flooding a user or website with substantial pieces of mail or ‘trolling’ (posting outrageous messages to generate response); e-mails containing forged or falsified information in the header (including sender name and routing information), or any other forged or falsified information. 

Mayfair Confidential also prohibits the use of its mail server or another website’s mail server to relay mail without the express permission of the account holder or the Website. Posting the same or similar message to one of more newsgroups (excessive cross-posting or multiple –posting) also is strictly prohibited. 

close
close
close