Acceptable use policy
This Acceptable Use Policy (“AUP”) is designed to protect Coyote Group Ltd (“Coyote”), their employees, customers and other partners from harm caused by the misuse of IT systems and data. Misuse includes both deliberate and inadvertent actions.
Your use of our site means that you accept, and agree to abide by, all the policies in this acceptable use policy, which supplement the Agreement.
Users access to Coyote’s IT systems and the Software is controlled by the use of User IDs, and/or passwords. All User IDs and passwords are to be uniquely assigned to named Authorised Users and consequently, Authorised Users are accountable for all actions.
Authorised Users must not:
a) Allow anyone else to use their user ID/token and password for the Software.
b) Leave their user accounts logged in at an unattended and unlocked computer.
c) Use someone else’s user ID and password to access the Software and/or Coyote’s IT systems.
d) Leave their password unprotected (for example writing it down).
e) Perform any unauthorised changes to the Software and/or Coyote’s IT systems or information.
f) Attempt to access data that they are not authorised to use or access.
g) Exceed the limits of their authorisation or specific business need to interrogate the system or data.
h) Connect any non-Coyote authorised device to the Coyote network or IT systems.
i) Store Coyote data on any non-authorised Coyote equipment.
j) Give or transfer Coyote data or software to any outside person or organisation without the authority of Coyote.
k) Line managers must ensure that Authorised Users are given clear direction on the extent and limits of their authority with regard to IT systems and data.
Conditions of use
Use of Coyote’s internet and Software is intended for business use only where it is not detrimental to Coyote in any way, not in breach of any term and condition and does not place the Authorised User or Coyote in breach of statutory or other legal obligations.
All Authorised Users are accountable for their actions on the internet and Software.
Authorised Users must at all times guard against the risk of malware (e.g., viruses, spyware, Trojan horses, rootkits, worms, backdoors) being imported into Coyote’s systems by whatever means and must report any actual or suspected malware infection immediately.
Authorised Users must not:
a) Use the internet or Software for the purposes of harassment or abuse or any defamatory remarks.
b) Use the Software in any way that breaches any applicable local, national or international law.
c) Access, download, send or receive any data (including images), which Coyote considers offensive or damaging in any way, including sexually explicit, discriminatory, defamatory or libellous material.
d) Use the internet or Software to make personal gains or conduct a personal business.
e) Use the systems in a way that could affect its reliability or effectiveness.
f) Send unprotected sensitive or confidential information externally.
g) Make official commitments through the internet or email on behalf of Coyote unless authorised to do so.
h) Download copyrighted material such as music media (MP3) files, film and video files (not an exhaustive list) without appropriate approval.
i) In any way infringe any copyright, database rights, trademarks or other intellectual property.
l) Not to access without authority, interfere with, damage or disrupt:
- any part of our software.
- any equipment or network on which our site is stored;
- any software used in the provision of our site; or
- any equipment or network or software owned or used by any third party.
The below restrictions apply to any and all material which you contribute to our Software (contributions), and to any interactive services associated with it:
Contributions must not:
- Infringe any copyright, database right or trade mark of any other person.
- Be likely to deceive any person.
- Be made in breach of any legal duty owed to a third party, such as a contractual duty or a duty of confidence.
Monitoring and filtering
IT system logging will take place where appropriate, and investigations will be commenced where reasonable suspicion exists of a breach of this or any other policy. Coyote has the right (under certain conditions) to monitor activity on its systems in order to ensure systems security and effective operation, and to protect against misuse. All breaches of information security policies will be investigated. Coyote will determine, in our discretion, whether there has been a breach of this acceptable use policy. When a breach of this policy has occurred, we may take such action as we deem appropriate.
Changes to the acceptable use policy
We may revise this acceptable use policy at any time by amending this page. You are expected to check this page from time to time to take notice of any changes we make, as they are legally binding on you. Some of the provisions contained in this acceptable use policy may also be superseded by provisions or notices published elsewhere on our site.