Why putting your business forward with fibre is important

Why putting your business forward with fibre is important:

1. Cheaper and more cost effective.
2. Installing Fibre will allow you to cancel Telkom line rentals, Premicell routers, ADSL accounts etc. with the exception of the fax line.
3. Stable last mile connectivity with service level agreement.

Why Virtual Machines ?

1. Easy Management.
2. Scalabilities.
3. Stability and security.
4. Cost Effective.
5. Customisable Storage nd Size.
6. Round-the-Clock Support.

PRIVACY POLICY

  1. Thank you for taking the time to review our Privacy Policy. At times, About IT Online (Pty) Ltd will collect certain personal information about customers and visitors to websites hosted by us. Such information will include both identifiable personal data, as well as non-identifiable personal information . Identifiable personal information will be collected when you sign a contract for service with us, or use our website for a transaction or subscription service. Non-identifiable information is gathered automatically when you visit our website or those websites hosted by us, and stored for use in our system.
  2. The purpose of this privacy policy is to explain to customers what types of information we will collect and how that information is used. In most cases, we collect this information to ensure network integrity and that we continue to provide you with the most relevant content and best possible service that suits your needs. In some cases, we are required by law to collect personal information about customers. Except where the law requires otherwise, we undertake to protect the confidentiality of such data.

Confidentiality

  1. About IT Online (Pty) Ltd respects customer privacy and the privacy of those accessing our website, or those websites hosted by us. We undertake to protect the confidentiality of our customers and users including all personal information supplied in the course of contracting with us for services. We undertake not to sell your personal information to third parties for commercial or marketing purposes.

Collection of Personal Data

  1.  About IT Online (Pty) Ltd collects personal data about our users when you visit a website hosted by us; apply for a service subscription; respond to a customer questionnaire and through the use of cookie technology. We may also combine information about you that we have with information we obtain from our business partners or affiliates.

Use of Personal Data

  1. About IT Online (Pty) Ltd may on occasion use your personal information to contact you about promotional offers; advise you of matters relevant to service provision and in some cases, solicit your feedback. However, About IT Online (Pty) Ltd will provide you with an option within every communication to opt out of receiving any communications of this nature or you can contact our customer services representatives to ensure that you do not receive such promotional information, at marketing@aboutitnow.co.za .
  2. About IT Online (Pty) Ltd collects and shares aggregated user data with business partners, sponsors or other third parties for the purposes of developing content and ensuring relevant advertising and content, such user data will never be used to identify individual users. These business partners and affiliated companies do not have any independent right to share this information.
  3. About IT Online (Pty) Ltd may log the websites you visit; collect IP addresses and information about your operating system and the type of browser you use for the purposes of network/system administration; to report aggregate information to our advertisers, and to audit the use of our site. This data however will not be used to identify individual users who will at all times remain anonymous.
  4. Any information About IT Online (Pty) Ltd collects from you through correspondence with us, whether via e-mail, telephonically or by written letter, will only be used to address the matters within that correspondence. If this requires referring such correspondence within About IT Online (Pty) Ltd or to a third party to ensure customer service, your personal information will only be disclosed to the point necessary to address your query or concerns, and will otherwise be kept confidential.

Public Space (Bulletin Boards, Chat Rooms and Third-Party Sites)

  1. Any information that customers disclose in a public space, including on any bulletin board, chat room or any site About IT Online (Pty) Ltd may host for you, is available to anyone else who visits that space. About IT Online (Pty) Ltd cannot safeguard any information you disclose there.

Site Linking

  1. About IT Online (Pty) Ltd’s websites contain many links to sites that belong to third parties unrelated to us. About IT Online (Pty) Ltd cannot be held responsible for any use of your personal information arising from you disclosing personal such information on third party sites. About IT Online (Pty) Ltd cannot protect any information you may disclose on these sites and recommends that you review the privacy policy statements of those sites you visit.

Minors

  1. About IT Online (Pty) Ltd will not enter into a service subscription contract with a minor unless such minor has explicit written consent from a parent or guardian to do so. About IT Online (Pty) Ltd undertakes not to contact minors about promotional offers or for marketing purposes without a parental consent.

Reservation of Rights

  1. About IT Online (Pty) Ltd reserves the right to disclose information about customers where required in good faith, to do so by law or to exercise our legal rights or defend ourselves against legal claims.
  2. About IT Online (Pty) Ltd further reserves the right to share information with law enforcement to investigate or prevent illegal activities being committed over our network.
  3. About IT Online (Pty) Ltd reserves our rights to disclose your personal information where you have given us explicit legal written consent to do so.
  4. About IT Online (Pty) Ltd reserves the right to monitor user and network traffic for site security purposes and prevent any unauthorized attempts to tamper with our site or cause damage to our property.
  5. About IT Online (Pty) Ltd reserves the right to make changes to this privacy policy or update it. Where a major change is made, customers will be informed by e-mail notification or through a notice on our website. Customers and site visitors bear the responsibility to ensure that they have read the changes or updates as the case may be

Protecting Minors

Websites

The following sites have useful information or programs for protecting minors from problematic online content

  • AccuPos: Point of Sale and Online Shopping Safety Guide
  • CBTPlanet: Computer Security in the Social Media World
  • Certstaff: A Comprehensive Computer Safety & Security Guide
  • Cyberangels: World’s oldest and largest Internet safety organisation
  • Cyber Safety – an interactive guide to staying safe on the Internet
  • GetNetwise: Educating parents and children about how to use the Internet safely
  • KidShield: Tools and information to create a safety net for your children online
  • Mobilebroadband: index to resources for Internet Safety for Kids
  • NetSafe: the website of the Internet Safety Group of New Zealand
  • ProtectKids.com: Protecting children in cyberspace
  • SafeKids.com: Making your family’s online experience fun and productive
  • WiredSafety.org: the world’s largest Internet safety and help group

 

               Undesirable Content

Terminology Guidelines

ISPA Guidelines and Recommendations on Broadband Terminology

Version: 1.01

Date: 2011-06-27

Download this page as a PDF.

ISPA Guidelines and Recommendations on Broadband Terminology

  1. Introduction

The Internet Service Providers’ Association (ISPA) has identified a need to develop a set of guidelines and recommendations relating to the meaning of broadband terminology. ISPA’s Code of Conduct working group was tasked with developing an initial set of guidelines and recommendations for further discussion, and this document is the result.

The objective of this document is to help to kickstart the process of establishing a shared understanding between ISPs, consumers, IT journalists and advertising authorities in interpreting words like “uncapped”, “shaped” and the like when these are used to advertise or describe broadband services. ISPA strongly believes that this will be to the benefit of both ISPA members and consumers of broadband services.

It should be noted that the Internet market tends to change reasonably rapidly. Some of these guidelines may need revision quite quickly, and other types of services are likely to emerge which do not fall neatly in the categories set out below. ISPA reserves the right to update this document as the need arises and in response to input received.

Please note:

  • This document is not prescriptive and is not intended to be legally binding on ISPA members or to oblige ISPs to market their services in any specific manner.
  • Neither is it intended to be used as definitive or regarded as an expert opinion in any legal or quasi-legal proceedings or to limit the ability of ISPs to create new services and categories of services.
  • ISPA disclaims responsibility for any loss flowing from reliance on the contents of this document.
  1. Basic principles

The most important principles for the provision and marketing of broadband services should be transparency and clear communication with current and potential customers.

The nature of the service that is being provided to the customer, any relevant restrictions on that service and the costs for the service should be clearly communicated to customers in any marketing material (where feasible given the advertising medium). Consumers should have sufficient information to make informed decisions about which service will best meet their needs and what that service will cost them.

An ISP’s terms and conditions and/or an acceptable use policy must be readily available to customers and should be kept up-to-date if an ISP launches new products or services.

  1. Guide to technical terms

This section contains a guide to the common technical terms used in connection with broadband:

3.1. Broadband

A broadband Internet access service is a service which provides access to the Internet with a minimum download speed of 256 kbps.

A service can be broadband regardless of the technology employed to provide the service, for example, DSL, wireless, wifi, cellular or satellite.

Note that the minimum speed referred to is linked to the minimum download speed – which may differ from the minimum upload speed – as services are generally marketed with reference to this download speed.

Because broadband speeds can vary according to a wide variety of factors, speeds are required to be marketed with reference to the maximum possible download speed, e.g. “Up to 4Mbs”.

ISPA notes that the minimum speed chosen here is quite low. It has been chosen to match the definition in the Department of Communication’s published National Broadband Policy which is, in turn, based on the ITU’s definition of broadband for developing markets. The accepted minimum speed of broadband services in many developed markets is much higher, and ISPA looks forward to being able to revise this number upwards in the future, as minimum South African broadband speeds increase.

3.2. Local and international

Local traffic is traffic originating on the network of a South African ISP which is destined for another South African IP network, and which will most likely be carried across interconnection links/Internet exchange points located in South Africa.

International traffic is traffic originating on the network of a South African ISP which is destined for an IP network located outside of the country (or vice versa), and which will most likely be carried across international Internet links.

It must be emphasised that these meanings reflect only how things work under normal circumstances. National traffic may be routed internationally under certain circumstances, for example, as an alternative if a particular carrier service is down.

Largely for historical reasons, South African ISPs have sometimes differentiated between “local” access, which generally means access to other South Africa networks, and “international” access, which generally means access to networks outside of the country. Similarly, “local traffic” generally means Internet Protocol (“IP”) traffic destined for (or coming from) local IP networks, and “international traffic” generally means IP traffic destined for (or coming from) international IP networks.

However, upon closer inspection “local” versus “international” is slightly more complicated than this on a technical level, and depends to some extent on the technical configuration of an ISP’s network, and on that ISP’s connections to other ISPs. To illustrate this, consider the example of an ISP (“ISP X”) which connects to “ISP Y” via the Johannesburg Internet exchange (JINX), but doesn’t have a direct peering agreement with “ISP Z”. Traffic between the networks of ISPs “X” and “Z” may therefore pass over international links before arriving back on the target network. A pertinent question is thus: Would this traffic be considered international or local?

Adding to the local vs. international complexity is the fact that traffic routes are not static, and may change based on network congestion, link failures and network traffic patterns. Hence, on occasion, “local” traffic might transit international links, even though it would typically travel across a local interconnection link.

3.3. Traffic shaping

Traffic shaping is the deliberate limitation or prioritisation of some types of Internet traffic or certain Internet protocols over others.

It should be noted that traffic shaping can be implemented either to provide a customer with a specific type of service (for example, by providing a service which specifically prioritises services used for online gaming or to penalise a customer (for example, by limiting peer-to-peer traffic protocols for users who have exceeded the terms of acceptable use). Traffic shaping is sometimes referred to as “traffic prioritisation”, usually when it is being implemented on the customer’s request.

Traffic shaping is usually aimed at giving priority to web browsing, email services and normal downloading via web browsers and lower priority to bandwidth intense applications such as peer to peer applications. Traffic shaping is used as a means of managing a network, keeping the cost of the service under control and of preventing a small number of customers from placing a disproportionate burden on the network or negatively affecting the overall user experience on the network.

3.4. Contention ratio

The contention ratio of an Internet access service means the total capacity sold to customers versus the total capacity the service provider has provisioned to service those customers.

In general terms “contention ratio” is used as an indication of the total capacity (or bandwidth or traffic) an ISP sells to its customers, versus the total upstream capacity (or bandwidth or traffic) an ISP has available to service those customers. For example, if an ISP sells 100 users a 1 Mbps service (total sold = 100 Mbps) and provisions 5 Mbps to service these customers, then the contention ratio would be 20:1. Note that this doesn’t mean that each user only gets 1/20th of the total 5 Mbps, because not all customers use the service at the same time. ISPs also use caching servers and bandwidth optimisation technologies to optimise shared usage of upstream links.

Different services on an ISP’s network may also have different contention ratios. An ISP might have a 10:1 contention ratio for capped DSL services, but a 30:1 contention ratio for uncapped DSL services. There could be different contention ratios for uploads and downloads. Different parts of an ISP’s network might also have different contention ratios. One contention ratio might measure the total capacity into an upstream provider’s DSL cloud versus the total capacity of DSL services the ISP has sold to those customers, but a different contention ratio might measure the amount of international capacity available to those same customers.

In summary, “contention ratio” can mean a number of different things, depending on the context, and the figure presented can be very difficult to verify. The usefulness of this term for consumers is therefore debatable.

3.5. Family friendly services

A family friendly Internet access service is one where the ISP provides the customer with a filtered access service, or the ability to set-up filters on the content or types of content available to that customer. Such services restrict the customer’s access to content which is deemed undesirable for children, and may offer other filtering options.

ISPA’s Code of Conduct requires that all members make information on protecting children available to their customers. Some ISPs go further than this, offering access services where specific content is filtered or blocked.

ISPs offering “family friendly” services should specify what sort of content filtering or blocking is implemented for customers of that service and should clearly indicate any limitations on the effectiveness of the filters.

  1. Types of broadband service

This document divides broadband services into four categories, as follows:

  • Unrestricted, uncapped Internet access: No cap. Acceptable use policy may only restrict illegal activity, not usage behaviour. May be linked to a specific access speed.
  • Uncapped Internet access: No cap. Acceptable use policy can place limitations on user behaviour and define “abuse” criteria which can result in service restrictions. May be linked to a specific access speed.
  • Soft capped Internet access: Service is provided on a metered basis. After the customer exceeds a “soft cap”, they still have Internet access, but significant restrictions are applied, such as limited international access or vastly reduced access speeds
  • Hard capped Internet access: Service is provided on a metered basis (limited traffic volume, or limited amount of time online). After the customer exceeds this cap, no access to the Internet is provided until the customer purchases additional services.

These four types of service are defined in more detail below. Please note that ISPA recognises that other types of services may be offered and that ISPA members are in no manner required to divide up their services in this manner.

ISPA wishes to emphasise that the above characterisation is intended as a guide to understanding broad categories of service and it

  • is not a requirement for ISPA members to use these categories
  • does not mean that the use of terms set out in this section in marketing material should be interpreted in accordance with this section.
4.1. Unrestricted, uncapped Internet access

Characteristics of an “unrestricted, uncapped” Internet access service are as follows:

  • There is no limit place on the total volume of traffic the customers uploads or downloads.
  • The service may still be linked to a specific speed (e.g. a 512 kbps unrestricted, uncapped service, or a 4 Mbps download/1 Mbps upload unrestricted, uncapped service).
  • The Acceptable Use Policy for unrestricted services may not place any restrictions on the customer’s usage behaviour, but may still place restrictions on illegal or unlawful use of the service (the ISP has no discretion in this regard).
  • Traffic-shaping may be implemented on an unrestricted, uncapped service. The general shaping policy to be applied to the service should be clearly disclosed.
4.2. Uncapped Internet access

Characteristics of an “uncapped” Internet access service are as follows:

  • There is no limit placed on the total volume of traffic the customers uploads or downloads.
  • The service may still be linked to a specific speed (e.g. a 512 kbps, uncapped service, or a 4 Mbps download/1 Mbps upload uncapped service).
  • The Acceptable Use Policy for uncapped services may place additional restrictions on the customer’s usage behaviour beyond illegal or unlawful usage. Customers not adhering to the AUP may have their services limited or soft capped. Details of usage restrictions and the consequences of breaching these restrictions must be clearly set-out in the AUP.
  • Traffic-shaping may be implemented on an uncapped service. The general shaping policy to be applied to the service should be clearly disclosed.
4.3. Capped Internet access: Soft cap

Characteristics of a soft capped Internet access service are as follows:

  • The access service is provided on a metered basis. Usually this means that the customer purchases a limited volume of traffic (typically per month) but it could also mean that the customer has purchased access for a limited amount of time.
  • After the customer exceeds this limit — referred to as the “soft cap” — their Internet access service has certain restrictions applied to it. Restrictions might include limited international access/only local access, or vastly reduced speeds. The up-front description of the service provided to the customer should specify what limitations will apply to the service once the soft cap is reached.
  • In most cases the “soft cap” resets at the end of the metering period, for example at the end of each calendar month.
  • Traffic-shaping may be implemented on a soft-capped service. The general shaping policy to be applied to the service should be clearly disclosed.
4.4. Capped Internet access: Hard cap

Characteristics of an Internet access service which only has a hard cap are as follows:

  • The access service is provided on a metered basis. Usually this means that the customer purchases a limited volume of traffic (typically per month) but it could also mean that the customer has purchased access for a limited amount of time.
  • After the customer exceeds this limit — referred to as the “hard cap” — their Internet access service is terminated. To regain access, the customer must purchase additional services from the ISP. Note that some providers may allow access to a limited number of sites after the hard cap has been reached.
  • Traffic-shaping may be implemented on a capped service. The details of the services and/or protocols which are prioritised or limited must be clearly disclosed up front.
4.5. Mixed services

Some ISPs offer services which are a mixture of the above four. For example, an ISP might provide a service which is “uncapped” during the day but becomes “unrestricted, uncapped” at night. In these cases, ISPs should clearly specify the time period that each type of service applies.

  1. Recommendations for ISPA members

The following general recommendations are made to help ISPA members to promote consistency in the use of broadband terms:

  • Ensure that “broadband” is only used in your advertising to refer to services which have a minimum download speed of 256 kbps.
  • If you (or your upstream service provider) do any sort of traffic shaping, ensure that this is made clear to potential customers before concluding a service agreement.
  • Your acceptable use policy should clearly address:
    (a) any restrictions on illegal or unlawful use of the service, and under what circumstances you will take action in the event of allegations of illegal or unlawful use of the service, and
    (b) any other restrictions based on the customer’s usage pattern or behaviour, and the consequences of breaching those restrictions.
  • For usage-based services, the ability for the customer to monitor their usage should be readily available. Customers should preferably be provided with the option of receiving notifications of their usage at certain points, for example once they reach 75% of their cap.
  • For capped services, a customer should not be automatically switched to a more expensive traffic-based charging scheme once they have exceeded their specified cap. Consent should be obtained from the customer before moving them to any other charging scheme.
  • Pricing for uncapped services should clearly indicate whether the cost is:
    (a) flat rate, i.e. a single price for an “all you can eat” service; or
    (b) metered, i.e. the cost of the service is linked to utilisation.
  • Information about the contention ratio for the service provided should be made available on your web site.
  • If you are providing family friendly services, you should provide information about the filtering or blocking you do, and indicate any limitations on the effectiveness of those filters or blocks.

The following recommendations relate to the categories of services defined in this document:

  • Use the term “unrestricted” or “unrestricted, uncapped” Internet access to refer only to a service which has no limit placed on the total volume of traffic uploaded or downloaded by the customer, and which does not place any other restrictions on the customer’s usage behaviour (excepting illegal or unlawful use).
  • Use the term “uncapped” Internet access to refer only to a service which has no limit placed on the total volume of traffic uploaded or downloaded by the customer subject to the customer observing specified usage restrictions.
  • For services which offer different performance criteria during different times of the day, the time periods that apply in each case must be made clear to the customer.
  1. Commenting on this document

This is a discussion document, and comment from ISPA members (and other interested parties) is actively solicited. Please send any comments you have to queries@ispa.org.za .

  1. Contributors

Contributors to this document include: Ant Brooks, Calvin Browne, Dominic Cull, Roelf Diedericks, Marc Furman, Antony Futter, David Gentleman, Lynne Orrock, Bretton Vine, Elaine Zinn, Patrick Holahan, Henk Kleynhans, Jaap Scholten and Wilmari Hannie.

Special thanks to David Gentleman for the first draft of all of the broadband definitions.

TAKE DOWN GUIDE        

Take Down Guide

How to request a Take-Down Notice

Note: you can also request a Take-down.

If you have discovered content on one of ISPA’s member’s network that you believe is unlawful, you are welcome to send a take-down notification to ISPA, requesting that the material concerned be removed. This request must be made in writing and can be hand-delivered, posted, faxed or emailed. (We prefer email.) While you are welcome to phone ISPA with queries, we cannot process take-down requests made telephonically.

Email Address takedown (at) ispa.org.za
Fax number 086.606.4066
Phone number (queries only) 010 500 1200 or 087 550 1200

There are a number of specific requirements for a take-down notification set out in the legislation. If your notification does not include all of this information, ISPA will not be able to process it. Your take-down request must include the following:

  • Your full name
  • Your address
  • Your telephone number
  • Your email address
    (if you have one)
  • The name of the service provider against whom you are making the complaint
  • A clear and unambiguous identification of the unlawful material or activity
    (for example, the URL of web page on which the material appears with optional screenshot)
  • A description of the right that you believe has been infringed by the material or activity concerned
    (for example, “my right to privacy is being infringed by the publication of my credit card number”)
  • The remedial action you wish the service provider to take
    (for example, “the credit card number should be removed”)
  • A statement that the information in your complaint is, to your knowledge, true and correct and that you are acting in good faith.
  • Your signature
    (either written or electronic)

Important note: In terms of section 77(2) of the Electronic Communications and Transactions Act, any person who lodges a notification of unlawful activity with a service provider knowing that it materially misrepresents the facts is liable for damages for wrongful take-down.

Here is an example of a take-down notification which contains all of the required information:

Dear ISPA,

I have discovered that my personal contact infomation, identification details, and credit card number is publicly listed on a website hosted by an ISPA member. The ISPA member is [Member Name] and the location of my personal information and banking details is [URL, optional screenshot included]. I believe that the content located on this site infringes on my right to privacy, and request that access to the file immediately be blocked.

– Email: johnsmith@example.com

The information contained in this take-down request is, to the best of my knowledge, true and correct and I am acting in good faith.

Regards, John Smith

[Digital signature attached]

Note: you can also request a Take-down.

Upon receipt of your take-down request, ISPA will confirm that all of the required information is included. We will also check that the content you are referring to is hosted on that organisation’s network, and that the remedial action you have requested is feasible. If, for some reason, your request fails one of these tests, you will be notified of the reason. If the requests passes these tests, it will be forwarded on to the service provider in question, and you will receive a reply acknowledging receipt of your take-down request. You should get a response from ISPA within three working days. Should you not receieve some form of response to your notification within three working days, please contact complaints (at) ispa.org.za or call ISPA at the phone number listed above.

Once a service provider has responded to the notification, either by removing the content concerned, or by refusing to remove the content for some reason, you will receive a further notification from ISPA. (You may also receive correspondence directly from the service provider concerned.) Should you not receive this further notification within seven days of your original complaint, please contact complaints (at) ispa.org.dot.za or call ISPA at the phone number listed above.

Request a Take-Down Notice