terms_of_enduser_signup_debitorder
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
terms_of_enduser_signup_debitorder [2024/12/30 21:00] – thesaint | terms_of_enduser_signup_debitorder [2024/12/30 21:12] (current) – thesaint | ||
---|---|---|---|
Line 14: | Line 14: | ||
* **1.1.4** “Customer Support Schedule” means the schedule containing customer support information which may be obtained from SupportCALL on request; | * **1.1.4** “Customer Support Schedule” means the schedule containing customer support information which may be obtained from SupportCALL on request; | ||
* **1.1.5** “Effective Date” means, notwithstanding the date of signature of this Agreement, the date when the Service/s is commissioned by SupportCALL for use by the Customer irrespective of whether or not the Customer uses the Service/s; | * **1.1.5** “Effective Date” means, notwithstanding the date of signature of this Agreement, the date when the Service/s is commissioned by SupportCALL for use by the Customer irrespective of whether or not the Customer uses the Service/s; | ||
- | * **1.1.6** “SupportCALL” means SupportCALL (Pty) Ltd, with registration number | + | * **1.1.6** “SupportCALL” means SupportCALL (Pty) Ltd, with CIPC registration number |
+ | * **1.1.6** “SupportCALL” means SupportCALL (Pty) Ltd, with ABN registration number TBA; | ||
* **1.1.7** “Initial Period” means the initial contract term of the Service/s, as set out in the Service Schedule (Schedule 1) hereto; | * **1.1.7** “Initial Period” means the initial contract term of the Service/s, as set out in the Service Schedule (Schedule 1) hereto; | ||
* **1.1.8** “Proprietary Information” means any and all trade secrets and data/ | * **1.1.8** “Proprietary Information” means any and all trade secrets and data/ | ||
Line 50: | Line 51: | ||
* **4.4** Customer shall at all times adhere to and ensure compliance with the Customer Support Schedule. | * **4.4** Customer shall at all times adhere to and ensure compliance with the Customer Support Schedule. | ||
* **4.5** Under no circumstances may Customer resile from this Agreement or withhold or defer payment or be entitled to a reduction in any charge or have any other right or remedy against SupportCALL, | * **4.5** Under no circumstances may Customer resile from this Agreement or withhold or defer payment or be entitled to a reduction in any charge or have any other right or remedy against SupportCALL, | ||
- | * **4.6** Customer may not at any time use the Service in contravention of any South African law. In particular, Customer undertakes to familiarize itself and ensure that it is kept continuously appraised of all South African law in force from time to time which has any bearing on the Service and/or its use. Customer acknowledges that SupportCALL has no obligation to assist Customer in this regard. | + | * **4.6** Customer may not at any time use the Service in contravention of any South African |
==== 5. Warranties ==== | ==== 5. Warranties ==== | ||
Line 121: | Line 122: | ||
==== 14. Governing Law And Jurisdiction ==== | ==== 14. Governing Law And Jurisdiction ==== | ||
- | * **14.1** This Agreement will be governed by and construed in accordance with the laws of the Republic of South Africa, and all disputes, actions and other matters relating thereto will be determined in accordance with South African law by a South African court having jurisdiction. | + | * **14.1** This Agreement will be governed by and construed in accordance with the laws of the Republic of South Africa |
==== 15. Domicilium Citandi Et Executandi ==== | ==== 15. Domicilium Citandi Et Executandi ==== | ||
Line 137: | Line 138: | ||
* **16.7** In the event of any expiration, termination, | * **16.7** In the event of any expiration, termination, | ||
* **16.8** The terms and conditions appearing in the Schedule(s) hereto are hereby incorporated into the Agreement. In the event of any conflict between the Standard Terms and Conditions of this Agreement and those appearing in any Schedule/s hereto, these Standard Terms and Conditions shall prevail. In respect of any conflict in respect of pricing in the Agreement or the Schedules hereto, the costs set out in the Service Schedule shall prevail. | * **16.8** The terms and conditions appearing in the Schedule(s) hereto are hereby incorporated into the Agreement. In the event of any conflict between the Standard Terms and Conditions of this Agreement and those appearing in any Schedule/s hereto, these Standard Terms and Conditions shall prevail. In respect of any conflict in respect of pricing in the Agreement or the Schedules hereto, the costs set out in the Service Schedule shall prevail. | ||
- | * **16.9** By purchasing this service, you agree to our Acceptable Use Policy below or [[http:// | + | * **16.9** By purchasing this service, you agree to our Acceptable Use Policy below or [[http:// |
* **16.10** These terms and conditions, together with the Schedule(s), | * **16.10** These terms and conditions, together with the Schedule(s), | ||
Line 144: | Line 145: | ||
SupportCALL is committed to complying with legislation and ensuring all its customers have the ability to use its network and the Internet without interference or harassment from other users. SupportCALL’s Acceptable Use Policy is designed to help achieve these goals.\\ | SupportCALL is committed to complying with legislation and ensuring all its customers have the ability to use its network and the Internet without interference or harassment from other users. SupportCALL’s Acceptable Use Policy is designed to help achieve these goals.\\ | ||
\\ | \\ | ||
- | By using any of SupportCALL’s services, customers agree to comply with this Acceptable Use Policy and to remain responsible for its users, where applicable. SupportCALL reserves the right to change or modify the terms of the Acceptable Use Policy at any time, by posting an updated version on its website at [[http:// | + | By using any of SupportCALL’s services, customers agree to comply with this Acceptable Use Policy and to remain responsible for its users, where applicable. SupportCALL reserves the right to change or modify the terms of the Acceptable Use Policy at any time, by posting an updated version on its website at [[http:// |
* **17.2 Scope of the Acceptable Use Policy** | * **17.2 Scope of the Acceptable Use Policy** | ||
Line 168: | Line 169: | ||
* **17.4 Spam/E-mail Abuse: | * **17.4 Spam/E-mail Abuse: | ||
- | | + | * Spam/E-mail abuse is prohibited using IP Services. Spam/E-mail abuse shall include, but is not limited to, the following activities: |
* Sending multiple unsolicited electronic mail messages or “mail-bombing” to one or more recipients. | * Sending multiple unsolicited electronic mail messages or “mail-bombing” to one or more recipients. | ||
* Sending unsolicited commercial e-mail or unsolicited electronic messages directed primarily at the advertising or promotion of products or services. | * Sending unsolicited commercial e-mail or unsolicited electronic messages directed primarily at the advertising or promotion of products or services. | ||
Line 200: | Line 201: | ||
* **17.6 Security Violations: | * **17.6 Security Violations: | ||
- | | + | * Customers are responsible for ensuring and maintaining the security of their systems and the machines that connect to and use IP Service(s), including the implementation of necessary patches and operating system updates. |
- | IP Services may not be used to interfere with, gain unauthorized access to, or otherwise violate the security of SupportCALL’s (or another party’s) server, network, network access, personal computer or control devices, software or data, or other system, or to attempt to do any of the foregoing. System or network security violations shall include, but are not limited to: | + | |
- | * Unauthorized monitoring, scanning, or probing of network or system or any other action aimed at the unauthorized interception of data or harvesting of e-mail addresses. | + | * Unauthorized monitoring, scanning, or probing of network or system or any other action aimed at the unauthorized interception of data or harvesting of e-mail addresses. |
- | * Hacking, attacking, gaining access to, breaching, circumventing, | + | * Hacking, attacking, gaining access to, breaching, circumventing, |
- | * Impersonating others or secretly or deceptively obtaining personal information of third parties (phishing, etc.). | + | * Impersonating others or secretly or deceptively obtaining personal information of third parties (phishing, etc.). |
- | * Using any program, file, script, command, or transmission of any message or content of any kind, designed to interfere with a terminal session, the access to or use of the Internet, or any other means of communication. | + | * Using any program, file, script, command, or transmission of any message or content of any kind, designed to interfere with a terminal session, the access to or use of the Internet, or any other means of communication. |
- | * Distributing or using tools designed to compromise security (including but not limited to SNMP tools), including cracking tools, password guessing programs, packet sniffers, or network probing tools (except in the case of authorized legitimate network security operations). | + | * Distributing or using tools designed to compromise security (including but not limited to SNMP tools), including cracking tools, password guessing programs, packet sniffers, or network probing tools (except in the case of authorized legitimate network security operations). |
- | * Knowingly uploading or distributing files that contain viruses, spyware, Trojan horses, worms, time bombs, cancel bots, corrupted files, root kits, or any other similar software or programs that may damage the operation of another’s computer, network system, or other property, or be used to engage in modem or system hijacking. | + | * Knowingly uploading or distributing files that contain viruses, spyware, Trojan horses, worms, time bombs, cancel bots, corrupted files, root kits, or any other similar software or programs that may damage the operation of another’s computer, network system, or other property, or be used to engage in modem or system hijacking. |
- | * Engaging in the transmission of pirated software. | + | * Engaging in the transmission of pirated software. |
- | * Using manual or automated means to avoid any use limitations placed on the IP Services. | + | * Using manual or automated means to avoid any use limitations placed on the IP Services. |
- | * Providing guidance, information, | + | * Providing guidance, information, |
- | * Failure to take reasonable security precautions to help prevent violation(s) of this Acceptable Use Policy. | + | * Failure to take reasonable security precautions to help prevent violation(s) of this Acceptable Use Policy. |
* **17.7 Customer Responsibilities: | * **17.7 Customer Responsibilities: | ||
- | | + | * Customers remain solely responsible for the content posted, hosted, or transmitted using IP Services. SupportCALL assumes no responsibility for any material accessible via IP Services. Customers must take corrective action to address violations of the Acceptable Use Policy. |
* **Enforcement and Incident Reporting: | * **Enforcement and Incident Reporting: | ||
- | | + | * SupportCALL reserves the right to take necessary actions against violations, including but not limited to: |
- | * Limitation, restriction, | + | * Limitation, restriction, |
- | * Immediate termination of agreements. | + | * Immediate termination of agreements. |
- | * Billing for costs incurred by SupportCALL as a result of violations. | + | * Billing for costs incurred by SupportCALL as a result of violations. |
- | * Disclosing information related to violations when legally required or appropriate. | + | * Disclosing information related to violations when legally required or appropriate. |
- | * Customers are encouraged to report violations of this Acceptable Use Policy to abuse@jenny.co.za. Reports should include sufficient detail to enable investigation and resolution. | + | * Customers are encouraged to report violations of this Acceptable Use Policy to abuse@supportcall.co.za Reports should include sufficient detail to enable investigation and resolution. |
* **17.7 Customer Responsibilities: | * **17.7 Customer Responsibilities: | ||
- | | + | * Customers remain solely and fully responsible for the content of any material posted, hosted, downloaded/ |
- | Customers are responsible for taking prompt corrective action(s) to remedy a violation of the Acceptable Use Policy and to help prevent similar future violations. | + | |
* **Acceptable Use Policy Enforcement and Notice: | * **Acceptable Use Policy Enforcement and Notice: |
terms_of_enduser_signup_debitorder.1735592435.txt.gz · Last modified: by thesaint