Get in touch
Phone: 1300 002 001 (Australia only)
Phone: +61 2 8985 6600 (International)
Email: info@symsafe.com.au
Symsafe Pty Ltd

Acceptable Use Policy (AUP)

Last Updated: September 2025

 

  1. Purpose and scope
    1.1 This Acceptable Use Policy (AUP) sets out permitted and prohibited uses of Symsafe’s Internet Service. It applies to all Customers and end users of our services.
    1.2 Capitalised terms have the meanings given in the Internet Services – General & Connection Terms (the Terms). This AUP forms part of the Contract (see Terms, clause 1.4(e) and clause 5.4). If there is any inconsistency, the Terms prevail.
  2. Lawful and responsible use
    2.1 You must comply with all applicable laws and regulations, including the Telecommunications Act 1997 (Cth), the Privacy Act 1988 (Cth), the Spam Act 2003 (Cth) and applicable copyright laws.
    2.2 You are responsible for the actions of anyone who uses the Internet Service with your authorisation, login, device or connection.
  3. Prohibited activities
    Without limiting clause 5 of the Terms, you must not use (or attempt to use) the Internet Service to:
    (a) engage in unlawful activity, including distributing child sexual abuse material, extremist or terrorist content, or content that incites violence or discrimination;
    (b) infringe Intellectual Property rights (for example, unauthorised copying, sharing or distribution of copyrighted material);
    (c) send, facilitate, or host spam, bulk unsolicited messages, pyramid or phishing schemes, or misleading commercial communications;
    (d) publish, store, transmit or link to malicious code, malware, spyware, ransomware, or use botnets or command-and-control infrastructure;
    (e) gain unauthorised access to, probe, scan or test the vulnerability of networks, systems or accounts (including port scanning) or to defeat security controls (including brute force or credential stuffing);
    (f) interfere with, disrupt, overload or degrade any network or service (including denial-of-service or distributed denial-of-service activity), or operate open proxies/relays that can be abused by third parties;
    (g) expose services to the public Internet in a way that creates unreasonable security or abuse risks (including unsecured databases, admin consoles or IoT endpoints);
    (h) impersonate any person or entity, or misrepresent your affiliation or the origin of communications;
    (i) publish or transmit material that is illegal, defamatory, harassing, threatening, offensive, or that breaches any person’s privacy or confidentiality;
    (j) operate high-risk services that create instability in our or our Suppliers’ networks, including persistent high-volume traffic generators or traffic tunnels designed to evade network management;
    (k) circumvent usage, speed or access controls, including CGNAT or filtering we implement for security, integrity or legal compliance;
    (l) resell, lease or provide the Internet Service to third parties (except as expressly permitted in the Contract);
    (m) violate any Upstream Supplier acceptable use requirements we notify to you.
  4. Email and messaging standards
    4.1 You must comply with the Spam Act 2003 (Cth) and industry best practice, including consent, sender identification and unsubscribe mechanisms.
    4.2 You must not operate open mail relays or open SMTP proxies.
  5. Security responsibilities
    5.1 You are responsible for your own security posture, including patching, configuring devices and services, using strong credentials, and implementing appropriate firewalls.
    5.2 If you become aware of a security incident affecting the Internet Service, you must promptly mitigate and notify us.
  6. Network management
    6.1 We may implement reasonable traffic management, filtering, rate-limiting, port-blocking or other measures to protect network integrity, performance, or to comply with law or regulator directions (see Terms, clause 5.5).
    6.2 Certain inbound ports may be restricted on services delivered via CGNAT unless a static public IP option is purchased (where available).
  7. Monitoring and enforcement
    7.1 We do not routinely inspect content, but we may investigate potential AUP breaches (including analysing traffic metadata) and act on credible complaints.
    7.2 If we reasonably suspect AUP breach, we may take one or more of the following steps (acting proportionately): warn or contact you, require remediation, apply filters/blocks, suspend or cancel the affected service, or notify law enforcement/regulators where required (see Terms, clauses 11 and 14).
    7.3 Where practicable, we will give prior notice and an opportunity to respond, except for urgent security or legal issues.
  8. Reporting abuse
    Please report abuse or security incidents to: abuse@symsafe.com.au (include logs, timestamps, time zone, headers and URLs where relevant).
  9. Changes to this AUP
    We may update this AUP from time to time. Material changes will be notified via the Website and/or email. Continued use of the Internet Service after the effective date constitutes acceptance.