Copyright 2017 - ThreeSixty Technologies Sdn Bhd

INTRODUCTION

1. This Fair Usage Policy (“Policy”) sets out an acceptable level of conduct between ThreeSixty Technologies Sdn Bhd (596972-H) (referred to as “360”) and its customers using the 360 Fibre Optics Internet service which encompasses all 360’s packages.

2. Bandwidth that is provided by 360 is shared by all customers active at any one point in time. Based on our analysis and that from other broadband service providers, a portion of about 7% of customers use a very large portion (about 30%) of bandwidth.

3. Customers that require a dedicated internet service may contact 360 for an internet leased line where there is no contention up to its internet gateway.

4. To ensure customer satisfaction, 360 has set in place this policy to overcome this biasness.

5. However, 360 may, from time to time, change this Policy without further notice to its customers. Please visit the 360 Fibre Optics Internet service webpage periodically to determine any changes to this Policy.

6. This Policy supplements the Terms & Conditions.

 

UNLAWFUL ACTIVITIES

1. In using the 360 Fibre Optics Internet service and/or any other internet access service that may be provided by 360, you must conform to the laws of Malaysia and will not knowingly permit any illegal use or such use that will discredit 360.

2. This includes NOT:

a) Uploading, sending, receiving, posting, distributing, disseminating, harassing, encouraging the receipt of, defamatory publishing, downloading or using any material which is offensive, abusive, indecent, unlawful, or menacing or a breach of the copyright, trademark, intellectual property, confidence, privacy or rights of any person;

b) Sending or uploading unsolicited emails, contests or chain letters;

c) Voluntarily or without due care and attention transmitting or uploading any electronic material (including, without limit, files that contain viruses, corrupted files, or any other similar software or programs) which is known or likely to cause, interrupt, damage, destroy or limit the functionality of any computer software, hardware or telecommunications equipment owned by 360 or any other internet user or person;

d) Partaking in activities that invade another’s privacy, cause annoyance, inconvenience or needless anxiety to any person;

e) Allowing activities that are in breach of any other third party’s rights, including downloading, installation or distribution of pirated software or other inappropriately licensed software, deletion of any author attributions, legal notices or propriety designations or labels in any file that is uploaded, falsification of the origin or source of any software or other material;

f) Allowing anything that may disrupt or interfere with 360’s network or services or cause a host or the network to crash;

g) Launching "denial of service" attacks, "mail-bombing" attacks, "spamming" or "flooding" attacks against a host or network;

h) Making excessive use of, or placing unusual burdens on, the network, for example by sending or receiving large volumes of email or excessively large mail attachments;

i) Circumventing the user authentication or security process of a host or network;

j) Creating, transmitting, storing or publishing any virus, Trojan, corrupting programme or corrupted data.

 

SECURITY

1. Each customer is assigned a User ID and password (if any). Upon changing the default password, each customer is responsible for ensuring that his/her User ID and/or password, at all times, remain confidential.

2. 360 may request that the customer change his User ID and/or password if deemed necessary.

3. The customer shall not disclose his/her User ID and/or password to any third party, or use the same for any purpose connected with the improper use of the network including accessing or attempting to access other parts of the services for which you do not have access rights.

4. The customer is accountable for taking any/all necessary steps to ensure any third party does not obtain access to the network.

5. Should a customer suspect that their User ID and/or Password have been compromised, they must immediately contact 360.

6. The security of the customers computer/servers are borne solely by the customer.

7. 360 strongly recommend that customers protect their computers with anti-virus software.

 

GENERAL USE OF SERVICE AND ABUSE

1. Each customer must be at least 18 years old to be a 360 customer. Sub-users under this age must have permission from the account holder to access the 360 Fibre Internet services. Before using the 360 Fibre Optics Internet service, the person must obtain permission from the registered customer.

2. The customer must not run port-scanning software on any 360 Fibre Optics Internet service.

3. The customer must not undertake any activity that has an adverse effect on the 360 Fibre Optics Internet service or its customers.

4. The customer may not use their 360 Fibre Optics Internet service connection to run programs or servers that provide network contention or connectivity to any third party not at the location where the connection is installed. Examples of prohibited programs include, but are not limited to, mail, FTP, HTTP, game, newsgroup, proxy, and IRC servers.

5. The customer may not resell or otherwise charge others for the use of their internet connection. This service is for commercial use only and may not be used for operations of an internet service provider.

6. Should a customer’s internet session cease activity for a certain period of time, which may vary from 20 minutes to 30 minutes, 360 may, at its sole discretion, automatically disconnect the customer’s internet session. This automatic disconnection is to allow maximum network performance.

 

FAIR USAGE

1. At 360, customer satisfaction is our utmost priority. As such, we have this clause in place to ensure the majority of our customers do not suffer due to a very small number of errant high bandwidth users.

2. Peer-To-Peer and File Sharing Software

a) Certain software/applications which is used by a small number of customers to send and receive files containing very large amounts of data (including without limitation traffic from peer-to-peer software/applications (such as Bit Torrent, eDonkey, Gnutella) or file sharing software (such as Limewire). These activities may cause network congestion and can negatively impact the speed at which other customers can access the internet.

b) 360 do not guarantee a service level and/or connectivity to users of peer-to-peer or file sharing software/applications.

c) The system that is used to provide the 360 Fibre Optics Internet service can identify very high bandwidth users and 360 seeks to manage the customer’s usage by throttling their bandwidth to a much lower broadband speed to ensure fairness to all customers.

d) The customers are reminded that the software (as mentioned in section (a) above) allows the download of illegal content which 360 prohibits, which is an infringement of copyright and/or intellectual property rights and rightful owners of such copyright and/or intellectual property rights may take measures to prosecute. Each individual download can be traced by the customer’s IP address back to the customer’s account with 360.

e) 360 reserves the right to release customer information pursuant to any copyright (and/or intellectual property right) infringement if it is required to do so by any law, regulatory body or court of law.