Acceptable use policy
This policy applies to anyone using Cheddar IT-managed services or systems we operate on behalf of a customer. It supplements your service agreement and any acceptable-use rules your own organisation has in place.
You must not
- Use our services to break Australian or international law, or to facilitate someone else doing so.
- Send malicious software, phishing content, spam, or any unsolicited bulk communication.
- Attempt to gain unauthorised access to systems, data, or accounts — yours or anyone else's.
- Probe, scan, or test the vulnerability of any system without our prior written authorisation, even if you own the system.
- Interfere with monitoring, security tooling, or backup processes that we run on the environment.
- Store or transmit content that infringes intellectual-property rights, is illegal under Australian law, or sexually exploits minors.
Resource use
Where a service is described as "unlimited" — for example unlimited service-desk support — that means reasonable use consistent with the size and risk profile of the environment you have engaged us to support. We reserve the right to discuss usage patterns that fall outside that scope.
Reporting abuse
If you believe a Cheddar IT-managed system is being used in breach of this policy, please report it to abuse@cheddarit.com with as much detail as you can safely share (timestamps, IP addresses, headers, message bodies). We investigate every report.
Enforcement
Breach of this policy may result in suspension or termination of access, notification of relevant authorities, and recovery of costs. We will give the affected customer notice where practical, but reserve the right to act immediately to protect customers, the public, or third parties.
