This Acceptable Use Policy (this “Policy”) describes prohibited uses of the Hosted Services offered by EMS Operations (UK) Limited.

  1. Acceptance

This Policy constitutes a binding legal agreement between the Provider and the Client, who uses the Hosted Services. By using Hosted Services you signify your consent to this Policy and the terms described herein. Before accessing or using the Hosted Services which is incorporated into and made a part of this agreement. If you do not agree to the full terms of this Policy, then you may not use the Hosted Services.

  1. Modification

The Provider may modify this Policy. The Hosted Services provided by the Provider are always evolving and the form and nature of the System and the Hosted Services may change without prior notice to the Customer. The most current version of this Policy will govern the usage of Hosted Services. Modifications to the Policy are effective upon the posting of an amended Policy to this site. We may also notify you of changes to the Policy, particularly if Provider deems the changes to be material. By continuing to access or use the Hosted Services after changes become effective, you agree to be bound by the revised Policy.

  1. Termination

If you violate the Policy or authorize or help others to do so, or if Provider otherwise determines such action is warranted, Provider may suspend or terminate Client’s use of the System in sole discretion and without prior notice. The examples described in this Policy are not exhaustive.

  1. No Illegal, Harmful, or Offensive Use or Content

You may not use, or encourage, promote, facilitate or instruct others to use, the System or the Coactive Site:

4.1 for any illegal, harmful or offensive use;

4.2 to transmit, store, display, distribute or otherwise make available content that is illegal, harmful, or offensive; or

4.3 for any other purpose not reasonably intended by Provider as typical or expected use of the Hosted Services consistent with the purpose for which the Hosted Services were created. Prohibited activities or content include:

  1. Illegal Activities, what means any illegal activities or in connection with any illegal purpose, or in violation of any applicable local, state, national, or international law or rule or regulation having the force of law, including advertising, transmitting, or otherwise making available gambling sites or services or disseminating, promoting or facilitating child pornography.

  2. Harmful or Fraudulent Activities, which mean the Client will only use the Hosted Services for lawful purposes, and Client will not use the Hosted Services for any activities that may be harmful to others, Hosted Services, Provider’s operations or reputation, including using the System to perpetrate any fraudulent activity, or offering or disseminating fraudulent goods, services, schemes, or promotions (e.g., make-money-fast schemes, ponzi and pyramid schemes, phishing, or pharming), sending, storing, or distributing any unlawful material, or engaging in other deceptive practices.

  3. Harmful Content, what means content or other computer technology that may damage, interfere with, surreptitiously intercept, or expropriate any system, program, or data, including viruses, Trojan horses, worms, time bombs, or cancelbots.

  4. Infringing Activities, what means Client will not impair the proper operation of the Hosted Services or any network which is used to support or access the Hosted Services, try to harm the Hosted Services in any way whatsoever, or copy or distribute any portion of the Hosted Services or other content without written permission from Provider.

  5. Infringing Content, what means content that infringes or misappropriates the intellectual property or proprietary rights of others.

  6. Offensive Content, what means content that is defamatory, obscene, abusive, invasive of privacy, causes a nuisance, annoyance, or inconvenience, or is otherwise objectionable, including content that constitutes child pornography, relates to bestiality or depicts non-consensual or illegal sex acts.


  1. No Security Violations

You may not use the System to violate the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a “System”). Prohibited activities include:

5.1 Unauthorized Access, what means accessing or using Hosted Services without permission, including attempting to probe, scan, or test the vulnerability of Hosted Services or to breach any security or authentication measures used by Hosted Services.

5.2 Interception, which means monitoring of data or traffic on Hosted Services without permission.

5.3 Falsification of Origin, which means forging TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route. This prohibition does not include the use of aliases or anonymous remailers.

5.4 Interference with Security Features, what means interfering with security features of Hosted Services, including disabling or circumventing features that prevent or limit use or copying of content, or which violate copyrighted or otherwise legally protected software, or reverse engineering or otherwise attempting to illegally extract any source code of the Hosted Services.

5.5 Infringing Content, which means content that infringes or misappropriates the intellectual property or proprietary rights of others.

5.6 Interference with Passwords or Accounts, what mean sharing, selling, or otherwise transferring or permitting another party to make use of the access granted to Client or his employees to the Hosted Services, including login, account, or password information, or failing to keep secure and confidential your login, account, and password information, or any other identification we may provide allowing your access to the Hosted Services.

  1. No Network Abuse

The client may not make network connections to any users, hosts, or networks unless you have permission to communicate with them. Prohibited activities include:

6.1 Monitoring or Crawling, what means monitoring or crawling of Hosted Services, that impairs or disrupts the Hosted Services being monitored or crawled.

6.2 Denial of Service (DoS), which means inundating a target with communications requests so the target either cannot respond to legitimate traffic or responds so slowly that it becomes ineffective.

6.3 Intentional Interference, which means interfering with the proper functioning of Hosted Services, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, or flooding techniques.

6.4 Operation of Certain Network Services, which means operating network services like open proxies, open mail relays, or open recursive domain name servers.

6.5 Avoiding System Restrictions which means using manual or electronic means to avoid any use limitations, such as access and storage restrictions.

  1. No E-Mail or Other Message Abuse

The Client agrees he will not distribute, publish, send, or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations (like “spam”), including commercial advertising and informational announcements. The Client will not alter or obscure mail headers or assume a sender’s identity without the sender’s explicit permission. You will not collect replies to messages sent from another internet service provider if those messages violate this Policy or the acceptable use policy of that provider.

  1. Monitoring and Enforcement

The Provider reserves the right but does not assume the obligation, to investigate any violation of this Policy or misuse of Hosted Services. Provider may:

  1. Investigate violations of this Policy or misuse of the System or Coactive Site; or

  2. Remove, disable access to, or modify any content or resource that violates this Policy or any other agreement we have with you for use of the Hosted Services.

The Provider may report any activity that he suspects violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. Provider’s reporting may include disclosing appropriate customer information. The provider may also cooperate with appropriate law enforcement agencies, regulators, or other appropriate third parties to help with the investigation and prosecution of illegal conduct by providing network and systems information related to alleged violations of this Policy.

  1. Reporting of Violations of this Policy

If the Client becomes aware of any violation of this Policy, Client agrees to immediately notify Provider and provide him with assistance, as requested, to stop or remedy the violation. To report any violation or suspected violation of this Policy, please contact Provider via e-mail: