INTRODUCTION

This document is the Fair Use Policy & Acceptable Use Policy of Orbtalk (the "Policy").

Orbtalk is a limited company incorporated in England and Wales registered under Number 05382664 whose registered office is at 5 Frederick Terrace, Frederick Place, Brighton, BN1 1AX, United Kingdom ("Orbtalk", or "we", or "our" or “us”). This Policy will apply to you if you receive any voice or connectivity services from Orbtalk ("you", "your", "Customer") and it is part of our agreement with you for such services.

A FAIR USE POLICY

Our fair use policy regulates your fair use of our voice and connectivity services (including broadband and internet access).

1 Voice - Fair Use Limits

Some restrictions apply to the bundled minutes calls. Our bundled minutes call plans include the inclusive minute allowances specified in each plan and call durations will be deducted in 20 second increments. Call fees for calls not included in a call price plan or outside of any inclusive minute allowances (both UK and international) of the Client call price plan will be calculated on a per 20 second increment basis (excluding calls to Mexico, Nauru, Papua New Guinea, Tonga, Vanuatu, Western Samoa, Kiribati and Suriname which will be measured in minutes, rounded up to the nearest minute) at the current fees specified in the Price Guide available at https://www.orbtalk.co.uk/call-rates

1.1 In addition, a per call connection Fee may apply.

1.2 Our bundled minutes call plans are designed for business customers with normal calling patterns. However, we may take measures against the small number of customers whose calling patterns substantially differ from the typical calling patterns of a standard UK business. For any inclusive minute allowance (included in any of our bundled minutes call plans):

(a) the maximum duration of calls are limited to our carriers timer restrictions depending upon the location dialled.

(b) local and national geographic numbers are numbers beginning 01 and 02 and 03 only and do not include non-geographic numbers (08xx including 0845 and 0870) premium rate numbers (09xx), internet access numbers or calls to the Channel Islands. Calls to premium rate numbers (beginning 09) and non-geographic numbers (08xx including 0845 and 0870) shall constitute no more than 20% of the duration of all calls made per month.

(c) local and national geographic numbers do not include international calls.

(d) if your bundled minutes call plan includes call minutes to international numbers, certain selected destinations (which may vary from time to time) may be excluded dependent on the exact call price plan we agree with you (e.g. calls to Mexico and the United States of America are generally excluded unless we agree otherwise with you).

(e) calls to UK mobile phones shall constitute no more than 25% of the calls (measured by time duration) on any invoice.

(f) if your bundled minutes call plan includes minutes to UK mobiles, this includes calls to Vodafone, O2, H3G, EE (T-Mobile and Orange) and Virgin only. Please note this does not include, unless otherwise stated, Lyca or Lebara mobiles or any mobile virtual network operator not based on the UK GSM cellular networks.

2 Voice - Excess Use

2.1 Where a fixed line call exceeds our carriers timer restrictions (depending upon the location dialled), the excess call time will be charged at our call standard rates specified in our Price Guide.

2.2 If you exceed the limits included in our fair use policy for our voice services:

(a) we will charge you our then standard charges specified in our Price Guide.

(b) we reserve the right to:

(i) switch you to a more appropriate rate or call price plan at any time;

(ii) suspend, restrict or disconnect your Services; or

(iii) to terminate our agreement with you with immediate effect.

3 Broadband - Fair Use Limits

Why do we need a Fair Usage Policy?

3.1 Orbtalk is committed to providing our customers with a very high quality and low contention service at a price that reflects true value for money:

(a) We do not add any additional contention to the service over that experienced on the access network;

(b) We do operate a traffic prioritisation policy which safeguards the performance of business critical applications 24/7;

(c) We carefully manage our capacity and will ensure that, in line with the number of customers on the network and a usage profile that fits business customers, enough capacity is provided.

3.2 However, as with all broadband offerings our network is shared and if a group of users use a disproportionately large amount of bandwidth (i.e. transfer a large amount of data) then this will drive up the cost of supplying the service to all users. Therefore to ensure that we can provide a high quality and low contention service at a competitive price, a Fair Usage Policy applies to the use of the service. How will this Fair Use policy affect you?

3.3 The majority of customers that will be affected by this policy are those using file sharing software such as peer-topeer, who regularly stream media (music, TV or videos) or those who regularly download very large media files e.g. movies. Peer-to-Peer software can be left running throughout the day and can consume very large amounts of bandwidth – this is unreasonable use of the internet and is, in many cases, illegal. Customers using their broadband service for sending e-mails, browsing web-pages and other typical business applications will not be affected.

4 What are our charging models?

4.1 We offer a selection of usage charging models detailed below:

Product Name (WBC)DownstreamUpstreamUsage
Business Broadband8 Mbps1.3 Mbps10GB, 100GB, 150GB
Business Broadband 2+24 Mbps1.3 Mbps10GB, 100GB, 150GB, unlimited
Business Broadband 2+ Premium24 Mbps1.3 Mbps100GB, 150GB, Unlimited
Business M24 Mbps2.5 Mbps100GB, 150GB, unlimited
Fibre 40/1040 Mbps10 Mbps50GB
Fibre Broadband Business80 Mbps20 Mbps200GB
Fibre Broadband Premium80 Mbps20 MbpsUnlimited
Home Worker IPSC8 Mbps448 Kbps10GB, 100GB
Business Broadband IPSC8 Mbps832 Kbps10GB, 100GB, 150GB, unlimited
FTTC 80:2020 Mbps80 MbpsUnmetered
FTTC 40:1010 Mbps40 MbpsUnmetered
ADSL 2+1.3 Mbps24 MbpsUnmetered
Annex M2.5 Mbps24 MbpsUnmetered
IP Stream832 Kbps8 MbpsUnmetered

What can you do with 10 Gigabytes of data transfer?

4.2 Send and receive a total of 100,000 emails (without attachment)

4.3 View over 100,000 standard web pages

4.4 Transfer over 10,000 1MB files

4.5 Make 80,000 minutes’ worth of VOIP calls (@ G729)

5 Fair Use Policy for our Fair Usage and Capped Products

5.1 Each of our broadband products has a monthly bandwidth allowance which is a certain number of GB of data transfer per month within their standard monthly rental. If the allowance is exceeded, then we will automatically charge £2.50 per GB for the excess usage seen on the service. Please note that:

(a) The usage measurement period in this case is defined as a calendar month.

(b) Usage is rounded up to the nearest GB.

6 Fair Use Policy for our Unlimited Products

6.1 For these services, there is no fair use policy. Users can transfer as much data as they wish, but usage must be in accordance with this Acceptable Usage Policy (see below section).

7 Usage for our Unmetered Products

7.1 Our unmetered broadband policy has no usage caps or excess usage charges and is simply subject to our Acceptable Usage Policy (see below section).

8 Excessive Usage of Bandwidth

8.1 The use of bandwidth which is inappropriate for a particular service is to be avoided. In the event that excessive usage of bandwidth on a consistent basis is detected, we will contact you to propose a more suitable service as a replacement. If you decline to accept the suggested replacement service and the excessive usage continues, we reserve the right to restrict, suspend or terminate your access, at our discretion.

8.2 Examples of excessive bandwidth usage are:

(a) A circuit that sends and receives in excess of 100GB of data in any given 24 hour period.

(b) A group of circuits (as part of the same company or end user group) that sends and receives in excess of 100GB of data at each site in any given 24 hour period.

8.3 The measures which we may take to restrict the usage of a service are detailed below in the ‘Traffic Priority Policy’ section.

8.4 Large bandwidth requirements across numerous sites would be better suited by a solution that does not have the potential to impact other users, such as Orbtalk Ethernet.

B ACCEPTABLE USE POLICY

This Acceptable Use Policy (AUP) is intended to help protect our customers, and the Internet community, from the inappropriate use of the Internet. This AUP sets out the rules which apply to the use of our internet connection services including your responsibilities, and permitted and prohibited uses of those services. We remind you that when you are connected to the internet via our service you must comply with the law.

1 Customer Responsibilities

1.1 You must not use any of our Services, including associated computer security or backup services and software:

(a) in a way that breaches any legislation or any licence applicable to you or that is in any way unlawful or fraudulent; or

(b) to deliver, knowingly receive, upload, download, use or re-use any information or material which is offensive, discriminatory, abusive, defamatory, grossly offensive, indecent, obscene or menacing or in breach of the privacy rights of any individual; or

(c) to distribute child pornography or in any way for the purpose of harming or attempting to harm minors in any way; or

(d) to do anything which interferes with other users or restricts or hinders any person from accessing or using our internet connection service or systems including the excessive usage of bandwidth under the ‘Excessive Usage of Bandwidth’ section below; or

(e) to forge header information, email source address or other user information; or

(f) access, monitor or use any data, systems or networks, including another person's private information; or

(g) without authority or attempt to probe, scan or test the vulnerability of any data, system or network; or

(h) to deliberately compromise the security or integrity of any network or system including our network; or

(i) to knowingly access, download, store, send or distribute any viruses or other harmful programs or material; or

(j) to send or distribute unsolicited advertising, bulk electronic messages or otherwise breach your spam; or

(k) to overload any network or system including our network and systems; or

(l) to invade anyone's privacy by attempting to harvest, collect, store, or publish private or personally identifiable; or

(m) to collect information without the information owner's knowledge and consent, such as passwords, account information, credit card numbers, addresses, or other contact; or

(n) to tamper with, hinder the operation of or make unauthorised modifications to any network or system; or

(o) in any way that contravenes generally accepted standards of internet or other network conduct and usage; or

(p) in an way which infringes any intellectual property rights of any third party or breaches a third party non-disclosure agreement or obligation; or

(q) in any way that does not comply with our specific instructions or to send, knowingly receive, upload, download, use or re-use any material which we deem inappropriate; or

(r) to authorise, aid, abet, encourage, conspire with or incite any other person to do or attempt to do any of the above acts. 1.2 In addition you may not use our network to create, transmit, distribute, or store content that:

(a) violates export control laws or regulations,

(b) impairs the privacy of communications,

(c) constitutes deceptive online marketing, causes technical disturbances to our network (including excessive usage of bandwidth under the ‘Excessive Usage of Bandwidth’ section below), its affiliated networks, or the network used by customers to access the Email services, or

(d) violates the policies of such networks by, including, but not limited to, the intentional introduction of any viruses, Trojan horses, worms, time bombs, cancel bots or other computer programming routines that are intended to damage, detrimentally interfere with, surreptitiously intercept or expropriate any system or data; or

(e) assists, encourages or permits any persons in engaging in any of the activities described in this section. If you become aware of any such activities, you are obligated to immediately notify us and take all other appropriate actions to cause such activities to cease.

2 Use of Email with particular regards to SPAM

2.1 Also known as junk mail or unsolicited commercial email, the term "spam" refers to submitting a commercial email to a large number of recipients who have not requested or opted to receive it and have no reasonable expectation of receiving email from the sender.

2.2 Email sent by a company or an organisation with whom the recipient has established a relationship or which was requested or accepted (by way of an opt-in requirement) by the recipient is not considered spam.

2.3 Spamming is not only harmful because of its negative impact on consumer attitudes toward businesses that supply Email and interconnection services, but also because it can overload our network and disrupt service to other customers.

2.4 As a user of our email service platforms sending direct marketing emails:

2.5 You must:

(a) include a conspicuous notice identifying the message as an advertisement or a commercial solicitation;

(b) provide a valid physical postal address in each email you send;

(c) include a valid email address or an unsubscribe link allowing the recipient to opt-out, either by replying to

(d) a valid return address, or by using an Internet-based unsubscribe mechanism

(e) process opt-out requests for at least 30 days after the sending of the commercial email and stop sending email to the requestor within 10 business days upon request;

(f) COMPLY WITH ANY REGULATIONS IN FORCE THAT APPLY TO DIRECT MARKETING REGULATIONS.

2.6 You may not (in addition to the aforementioned conditions):

(a) send emails with a false, deceptive or misleading subject line;

(b) include sexually explicit content in your email;

(c) add an address into your list without the subscriber's permission;

(d) maintain an email address in your list for which an opt-out request has been received;

(e) use lists older than 6 months without obtaining a confirmation of the subscriber's permission;

(f) harvest email addresses from websites or web services;

(g) generate an email address by using a dictionary attack combining letters and numbers into multiple permutations;

(h) use scripts or automated ways to register for multiple email or user accounts to send commercial emails;

(i) relay emails through a computer or network without permission;

(j) use your subscription form to subscribe users for an unrelated list or to send content differing from the one agreed to;

(k) send emails with added words/characters in an attempt to bypass Bayesian filters;

(l) send, or attempt to send, Spam of any kind from third-party networks using a return email address that is hosted on our network, or referencing an email address hosted on our network;

(m) send email messages which result in complaints from the recipient or from the recipient's email provider, or which result in blacklisting of the sender's email address or mail server;

(n) send email messages which are excessive and/or intended to harass or annoy others;

(o) continue to send email to a recipient who has indicated that he/she does not wish to receive it;

(p) take any other actions intended to cloak your identity or contact information, including but not limited to intentionally omitting, deleting return addresses; or

(q) take any other action that results in the blacklisting of the sender's email address or mail server, or

(r) negatively impact other customers who use the Email service.

(s) In the absence of positive, verifiable proof to the contrary from you we will consider complaints by recipients of emails to be conclusive that the recipient did not subscribe or otherwise request the email(s) about which a complaint was generated.

3 Bulk Email

3.1 The use of our network to send bulk email whether opt-in or otherwise, and the use of bulk email to promote a site on our network is strictly forbidden. Bulk mailing is defined as:

(a) E-mails with more than 50 recipients per email;

(b) Sending E-mails at a rate of over 5 emails per minute.

3.2 IF BULK MAILING ATTEMPTS ARE DETECTED THE RELEVANT PORTS MAY BE BLOCKED WITH IMMEDIATE EFFECT.

4 Traffic Priority Policy

4.1 Orbtalk provides a high quality broadband product for the business market. We aim to secure the highest quality of service for business critical applications during core business hours. Our network identifies and will offer a priority service for business critical traffic:

Activity/ApplicationPeak Priority Status: Mon-Fri 08:00-18:00Off-Peak Priority Status
Assured ServicesLevel 3Level 3
Business Services:
        VPN<br />
        Email<br />
        Off-site Backup<br />
        Database<br />
        Surveillance<br />
        Software Markets<br />
        Presentation<br />
        Trading<br />
        Remote Access (inc. Terminal Services, SSH etc.)<br />
    </td>
    <td>Level 3</td>
    <td>Level 3</td>
</tr>
<tr>
    <td>Internet Browsing</td>
    <td>Level 2</td>
    <td>Level 3</td>
</tr>
<tr>
    <td>Software updates</td>
    <td>Level 2</td>
    <td>Level 3</td>
</tr>
<tr>
    <td>Audio Streaming (Excludes VoIP)</td>
    <td>Level 1</td>
    <td>Level 3</td>
</tr>
<tr>
    <td>Video Streaming</td>
    <td>Level 1</td>
    <td>Level 3</td>
</tr>
<tr>
    <td>Music & Video downloads, P2P etc.</td>
    <td>Level 1</td>
    <td>Level 3</td>
</tr>
</tbody>

(a) Level 3: Business Critical Products and Services. These services are essential for business operations and continuity and as such are time sensitive, therefore will always take preference over non time-sensitive or non-business critical services.

(b) Level 2: Managed Products and Services. These are services which are not as time sensitive as those in level 3 but will take priority over services which are not critical for the operation or continuity of core business.

(c) Level 1: Non-business critical traffic. These services are not classed as business critical or time sensitive.

4.2 By identifying the different types of traffic in our network, we can ensure that both business critical and time sensitive products and services take priority over other traffic. This is done so that we can provide our customers with a premium class of business connectivity during core business hours.

4.3 Our traffic priority service will be in use during core business hours – Monday to Friday 08:00 to 18:00. Outside of these times there will be no restrictions.

5 Administration of Traffic Priority Policy

5.1 You understand that the administration of this policy requires the exercise of discretion and judgment. We agree to exercise good faith in the administration of this policy and in making determinations under the policy.

5.2 If you breach our acceptable policy above, we reserve the right to:

(a) suspend, restrict or disconnect your Services; or

(b) to terminate our Agreement with you with immediate effect.

WE MAY REVISE OUR FAIR USE POLICY AND OUR ACCEPTABLE USE POLICY AT ANY TIME BY POSTING THE UPDATED VERSION OF THE POLICY TO OUR WEBSITE. YOU ARE EXPECTED TO CHECK THIS POLICY FROM TIME TO TIME TO TAKE NOTICE OF ANY CHANGES WE MAKE, AS THEY ARE LEGALLY BINDING ON YOU.

Request a Call Back
Live Chat
Call us on 0800 101 7000