Internet Acceptable Use and Traffic Management Policy

Last Updated: 15/08/22

Internet Acceptable Use and Traffic Management Policy



This Acceptable Use Policy sets out the rules which apply to use of our communication services including your responsibilities and permitted and prohibited uses of those services. Compliance with this Policy ensures you may continue to enjoy and allow others to enjoy optimum use of our Services.


You are responsible for your actions on our network and systems you access through your Service. If you act recklessly or irresponsibly in using your Service or your actions endanger any person or the integrity or security of our Network, systems or equipment, your access may be restricted, suspended or terminated, without prior notice.


In particular, you agree that you will not use, attempt to use or allow your Internet Service to be used to:

  • store, send or distribute any content or material which is restricted, prohibited or otherwise unlawful under any applicable law or which is likely to be offensive or obscene to a reasonable person;
  • store, send or distribute confidential information, copyright material or other content which is subject to third party intellectual property rights, unless you have a lawful right to do so;
  • store, send or distribute material which defames, harasses, threatens, abuses, menaces, offends, violates the privacy of, or incites violence or hatred against, any person or class of persons, or which could give rise to civil or criminal proceedings;
  • do any other act or thing which is illegal, fraudulent or otherwise prohibited under any applicable law or which is in breach of any code, standard or content requirement of any other competent authority;
  • store, send or distribute material, which interferes with other users or restricts or hinders any person from accessing, using or enjoying the use of our Services, Network or systems;
  • forge header information, email source address or other user information;
  • access, monitor or use any data, systems or networks, including another person’s private information, without authority or attempt to probe, scan or test the vulnerability of any data, system or network;
  • compromise the security or integrity of any network or system including our Network;
  • deliberately access, download, store, send or distribute any viruses or other harmful programs or material;
  • send or distribute unsolicited advertising, bulk electronic messages or otherwise breach your pam obligations set out in this policy, or overload any network or system including our Network and systems;
  • use another person’s name, username or password or otherwise attempt to gain access to the account of any other User without their consent;
  • tamper with, hinder the operation of or make unauthorised modifications to any network or system; or aid, abet, encourage or incite any other person to do or attempt to do any of the above acts.


Also known as junk mail or Unsolicited Commercial Email (UCE), the term “spam” refers to submitting a commercial email or SMS messages to a large number of recipients who have not requested or opted to receive it and have no reasonable expectation to receiving email or SMS from the sender.

Email or SMS sent by a company or an organisation with whom the recipient has established a relationship or which was requested or accepted (opt-in requirement) by the recipient is not considered spam. Spamming is not only harmful because of its negative impact on consumer attitudes toward TETRABYTE LTD, but also because it can overload TETRABYTE LTD’s network and disrupt service to TETRABYTE LTD subscribers. As a user of a TETRABYTE LTD service platforms you must comply with any regulation in force that covers direct marketing regulations if you are sending communications to large multiple lists of users. In the absence of positive, verifiable proof to the contrary by a User, TETRABYTE LTD will consider complaints by recipients of emails or SMS messages to be conclusive that the recipient did not subscribe or otherwise request the email(s) or SMS about which a complaint was generated.

Expected Service Performance

Broadband services are delivered over a shared network. To provide a sustainable quality broadband service to all our customers we have to manage the network. The Customer/Partner understands that Broadband services (including ADSL, FTTC, GFAST, SOGEA, SOGFAST and FTTP) operate as a shared service, meaning bandwidth that a service has the potential to use (e.g. an FTTC connection with 80Mb download) isn’t guaranteed and may vary throughout the day.

Expected bandwidth performance is provided through our availability checking tool.

We may limit, suspend or terminate the Service if you use the capacity or resources of our Network in a manner which may hinder or prevent us from providing services to other customers or which may pose a threat to the integrity of our Network or systems.

Illegal Use

The TETRABYTE LTD network may only be used for lawful purposes. For example, Users may not use the TETRABYTE LTD Network to create, transmit, distribute, or store content that:

  • violates a trademark, copyright, trade secret or other intellectual property rights of others,
  • violates export control laws or regulations,
  • violates the privacy, publicity or other personal rights of others,
  • impairs the privacy of communications,
  • contains obscene, offensive, unlawful, defamatory, harassing, abusive, fraudulent, or otherwise objectionable content as reasonably determined by TETRABYTE LTD,
  • encourages conduct that would constitute a criminal offense or give rise to civil liability,
  • constitutes deceptive online marketing,
  • causes technical disturbances to the TETRABYTE LTD Network, its affiliated networks, or the network used by Users to access the Email service., or
  • violate the policies of such networks, including, but not limited to, intentional introduction of any
  • viruses, Trojan horses, worms, time bombs, cancel bots or other computer programming routines
  • that are intended to damage, detrimentally interfere with, surreptitiously intercept or expropriate any system or data, or
  • assists, encourages or permits any persons in engaging in any of the activities described in this section.

If the Client becomes aware of any such activities, the Client is obligated to immediately notify TETRABYTE LTD and take all other appropriate actions to cause such activities to cease.

Consequences of Unacceptable Use

TETRABYTE LTD reserves the right to suspend or terminate User’s access to the Services upon notice to the Client of a violation of this policy. If TETRABYTE LTD believe that the policy has been breached or the integrity of the network and/or the performance of others users are at risk, then TETRABYTE LTD will contact the Client with notice of its intent or to notify the User of the breech of the policy. There may be instances where notice is limited or not possible, particularly if the use of the Services poses a critical risk.

IP Address Management

IP Addresses are a fundamental technical requirement for any Broadband service. IPv4 addresses are also limited globally, and as a result careful management of IP Address space is important to ensure all customers have fair access to this resource. All IP addressing is loaned as part of providing the Broadband service, and remains in the ownership of Tetrabyte Ltd (unless a Partner has provided their own IP address ranges and has gone through the technical establish processes enabling these IPs to be allocated to their Broadband services). If more than 1 IP address (typically referred to as a range of IPs) is provided for an individual Broadband service, and the IPs aren’t utilised, then Tetrabyte Ltd reserves the right to take back the IP address range and provide a smaller IP range that meets the used level of IPs for that Broadband service.

For example: a Broadband service is provisioned with a /29 IP Address range (8 IP addresses, with 6 useable IPs) and the customer is only using 2 IPs. Tetrabyte Ltd would replace this range (with notice to the Partner and consideration of the customer’s requirements) with a different /30 IP Address range (4 IP Addresses, with 2 useable IPs).


Google Rating
Based on 87 reviews

Contact Us for a Simple Quote

  • This field is for validation purposes and should be left unchanged.

  • Microsoft Logo
  • HP Logo
  • Cisco Logo
  • Dell logo
  • Eset Logo
  • BT Logo

What Our Customers Say About Tetrabyte

  • Having now been with Tetrabyte some months and using their expertise in IT Support I can only praise the whole team for their professional attitude. They resolve issues quickly and go above and beyond by ensuring that when something is fixed it stays fixed… I am happy with their level of support and cannot but recommend them and their services.

    Hendri Cawood, London

  • …As always polite, knowledgeable and can do right now approach with a friendly and approachable personality never leaving me thinking that I am silly for calling even on the most simple of tasks.

    Sarah Veness, Hastings

  • The guys are always at the other end of the phone and log straight in remotely to fix the problem there and then (no down time). Whatever is necessary to get the job done the team at Tetrabyte will do it.

    Murray Greenhill, East Sussex

  • Since Tetrabyte have taken over the service, issues with IT are now at a minimum which is very important for the work that we do. I have no hesitations in recommending Tetrabyte to any other organisation, due to the high level of support they provide.

    Rachel Evans, London

  • I get many calls and emails from IT support companies offering their services but I am 100% confident that Tetrabyte provide the best service for our organization. I would certainly recommend them.

    Di Smith, East Sussex

  • We have worked with Tetrabyte for about seven years now and have found them to be brilliant. As somebody that isn’t the most IT literate, I have found them to be extremely helpful, patient and supportive…

    Debbie Hargreaves, St Leonards on Sea

What's going on in the world?