Acceptable Use Policy

Version 11 August 2010

The Acceptable Use Policy states the by Eweka Internet Services (from here on called Eweka) used code of conduct for the use of her services. Eweka will act in compliance with her Terms of Service to activities which go against the Acceptable Use Policy stated below.

This policy applies to the application and use of Eweka's services from now on.

Eweka's goal is to care for the safety and reliability of her network and the offered service(s) as a responsible service provider. We also care for the privacy of the users of our network and service(s), and responsible use of our network. Activities that do not comply with this Acceptable Use Policy or the Terms of Service of Eweka's services, or which affect the availability or usability of our network or service(s) in a negative way, are considered harmful. In this case, Eweka will take action as described in the Terms of Service. These measures can consist of immediately ending (a part of) the use of her service(s) without notice. Eweka will act against abuse or unacceptable use of her network (or the provided service) in compliance with this policy.


The use of Eweka's network and provided service(s) may be used only for purposes in compliance with the law and Eweka's Terms of Service, and should not be in violation of the public order.

Eweka can-not monitor the content of the information exchanged, made public, or available to third parties using Eweka's network. Therefore, the customer is the only person responsible for the content of information exchanged, made public or available to third parties using Eweka's network. The customer is responsible for every use of Eweka's service(s) using his connection, used by the customer him/herself or another person.

Examples of activities that violate the security of a computer system or Eweka's network or the Acceptable Use Policy include, but are not limited to:

  1. Without explicit permission from the owner or possessor: (Attempt to) access data, computersystems, networks or software owned by another person. Investigating or testing the vulnerability of a computersystem or network, or breaking through the security or attempting to do this. Investigating or testing the measures taken by someone else for protecting the authenticity of information originating from him/her. Unauthorized monitoring of data or traffic on any network or computersystem.
  2. Infringing copyrights and/or other intellectual property rights of third parties.
  3. Interrupting any user's use of the internet or internetservices, for example by mailbombing, trying to overload a system, or attacking someone's sent data.
  4. Sending unwanted mail ("junk mail" or "spamming"), chain letters, pyramid games, computer viruses or worms, or using another person's mail server to relay mail without explicit permission.
  5. Unacceptable use of newsgroups, for example not complying to the general rules of a newsgroup, sending posts to an abnormal amount of newsgroups or placing commercial messages.
  6. Editing information about the sender's identity to pretend to be someone else, or editing information sent by another person.
  7. (Sexually) Intimidating other users on the internet.
  8. The customer should take preventive measures to prevent computer viruses or worms of spreading on Eweka's network or the internet. The customer should also take proper and adequate measures against unauthorized access and/or use of his computer system, software and/or other information by third parties.

Eweka has the right to edit this policy on any given time, and to make it effective from the time it is published at