General Terms and Conditions

Ignite General Terms and conditions (Aug 2017)

Product Terms and Conditions

Ignite Acceptable Usage Policy


  • The purpose of this document is to provide an understanding of Internet Solutions' Acceptable Use Policy. This policy serves to define the accepted behaviour of users on Internet Solutions' (IS) network. This allows IS to:
    • - Maintain the integrity and quality of their services,
    • - Protect their customers and infrastructure from abuse,
    • - Adhere to the current laws and regulations governing organisations and service providers in the countries that they operate in,
    • - Co-exist within the global internet community as a responsible service provider.

The Network

  • 1. The user acknowledges that IS is unable to exercise control over the data passing over the infrastructure and the Internet, including but not limited to any websites, electronic mail transmissions, news groups or other material created or accessible over its infrastructure. Therefore, IS is not responsible for data transmitted over its infrastructure.
  • 2. IS' infrastructure may be used to link into other networks worldwide and the user agrees to conform to the acceptable use policies of these networks.
  • 3. Users of the IS network include not only the IS customers, but in the case of resellers of the IS' services, the customers of the resellers too. Resellers of IS' services are responsible for the activities of their customers
  • 4. The user may obtain and download any materials marked as available for download off the Internet, but is not permitted to use their Internet access to distribute any copyrighted materials unless permission for such distribution is granted to the user by the owner of the materials
  • 5. The user is prohibited from obtaining, disseminating or facilitating over IS' network any unlawful materials, including but not limited to:
    • - Copying or dealing in intellectual property without authorisation,
    • - Child pornography, and/or
    • - Any unlawful hate-speech materials.
  • 6. To help ensure that all customers have fair and equal use of the service and to protect the integrity of the network, Internet Solutions reserves the right, and will take necessary steps, to prevent improper or excessive usage thereof.
  • 7. The action that Internet Solutions may take includes, but is not limited to:
  • 8. This policy applies to and will be enforced for intended and unintended (e.g., viruses, worms, malicious code, or otherwise unknown causes) prohibited usage.
  • 9. Online activity will be subject to the available bandwidth, data storage and other limitations of the service provided, which Internet Solutions may, from time to time, revise at its own discretion and without prior notice to the customer.

System and Network Security

  • 1. All references to systems and networks under this section includes the Internet (and all those systems and/or networks to which user is granted access through IS) and includes but is not limited to the infrastructure of IS itself.
  • 2. The user may not circumvent user authentication or security of any host, device, network, or account (referred to as "cracking" or "hacking"), nor interfere with service to any user, host, device, or network (referred to as "denial of service attacks"). The host, device, network or account shall also not be used for any illegal purpose, including phishing.
  • 3. Violations of system or network security by the user are prohibited, and may result in civil or criminal liability. IS will investigate incidents involving such violations and will involve and co-operate with law enforcement officials if a criminal violation is suspected. Examples of system or network security violations include, without limitation, the following:
    • - Unauthorised access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of any system or network or to breach security or authentication measures without the express authorisation of IS.
    • - Unauthorised monitoring of data or traffic on the network or systems without express authorisation of IS.
    • - Interference with service to any user, device, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks.
    • - Forging of any TCP-IP packet header (spoofing) or any part of the header information in an email or a newsgroup posting.

Email Use

  • 1. It is explicitly prohibited to send unsolicited bulk mail messages ("junk mail" or "spam") of any kind (commercial advertising, political tracts, announcements, etc.). This is strongly objected to by most Internet users and the repercussions against the offending party and IS can often result in disruption of service to other users connected to IS. In addition, spam is unlawful in terms of the Electronic Communications and Transaction Act 2002, and IS is entitled to take appropriate steps against the User in contravention of these provisions of the Act.
  • 2. Maintaining of mailing lists by users of IS is accepted only with the permission and approval of the list members, and at the members' sole discretion. Should mailing lists contain invalid or undeliverable addresses or addresses of unwilling recipients those addresses must be promptly removed.
  • 3. Users may not forward or propagate chain letters nor malicious e-mail.
  • 4. Public relay occurs when a mail server is accessed by a third party and utilised to deliver mails, without the authority or consent of the owner of the mail-server. Users' mail servers must be secure against public relay as a protection to both themselves and the Internet at large. Mail servers that are unsecured against public relay often become abused by unscrupulous operators for spam delivery and upon detection such delivery must be disallowed.
  • 5. IS reserves the right to examine users' mail servers to confirm that their server is not a public relay and the results of such checks can be made available to the user. IS also reserves the right to examine the mail servers of any users using IS mail servers for "smarthosting", content filtering or similar services at any time to ensure that the servers are properly secured against public relay. All relay checks will be done in strict accordance with IS' policy of preserving customer privacy.

Usenet News

  • 1. Users should, before using the service, familiarise themselves with the contents of the following newsgroups: news.newusers.questions, news.announce.newusers, news.answers.
  • 2. Excessive cross-posting (i.e., posting the same article to a large numbers of newsgroups) is forbidden.
  • 3. Posting of irrelevant (off-topic) material to newsgroups (also known as USENET spam) is forbidden.
  • 4. Posting binaries to a non-binary newsgroup is forbidden.
  • 5. IS reserves the right to delete and/or cancel posts which violate the above conditions.


The User acknowledges that IS is lawfully required to intercept communications in accordance with the provisions of the Regulation of Interception and Provision of Communication-related Information Act 70 of 2003 ("the Act"). Any interception of communications shall be strictly in accordance with the requirements of the Act, as and when required under the Act.

Website Take Downs

  • All queries related to website take downs may be directed to the Internet Service Providers' Association (ISPA), which IS has appointed as its agent for the purposes of receipt of take down notices in accordance with Chapter 11 of the Electronic Communications and Transactions Act of 2002:

Managing Abuse

  • 1. Upon receipt of a complaint, or having become aware of an incident, IS reserves the right to:
    • - Inform the user's network administrator of the incident and require the network administrator or network owner to deal with the incident according to this AUP.
    • - In the case of individual users suspend the user's account and withdraw the user's network access privileges completely.
    • - Charge the offending parties for administrative costs as well as for machine and human time lost due to the incident.
    • - In severe cases suspend access of the user's entire network until abuse can be prevented by appropriate means.
    • - Take such action as may be necessary to protect the integrity of the system, including, but not being limited to, system monitoring, as well as protocol management and shutting down of ports affected by viruses, worms or other malicious code.
    • - Implement appropriate technical mechanisms in order to prevent usage patterns that violate this AUP.
    • - Share information concerning the incident with other Internet access providers, or publish the information, and/or make available the users' details to law enforcement agencies.
  • 2. Any one or more of the steps listed above, insofar as they are deemed necessary by IS in its absolute and sole discretion, may be taken by IS against the offending party.

Laws and Legislation

  • 1. IS' infrastructure may be used only for lawful purposes. Users may not violate any applicable laws or regulations of South Africa within the territory of South Africa. Should the user reside outside of South Africa, the laws of the country in which the user resides shall apply.
  • 2. Transmission, distribution or storage of any material on or through the infrastructure in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property right used without proper authorisation, and material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws.
  • 3. The User undertakes to use IS' services in accordance with any restrictions imposed under the following legislation:
    • - Electronic Communications and Transactions Act 25 of 2002
    • - Electronic Communications Act 36 of 2005
    • - Films and Publications Act 65 of 1996 (as amended)
    • - Regulation of Interception and Provision of Communication-related Information Act 70 of 2003

Legal Rights

  • 1. Nothing contained in this policy shall be construed to limit Internet Solution's rights or remedies in any way with respect to any of the aforementioned activities, and Internet Solutions reserves the right to take any action that it may deem appropriate with respect to such activities, including without limitation:
    • - Investigating suspected violations of this AUP,
    • - Taking action to recover costs and expenses incurred in identifying and resolving abuse,
    • - Terminating users' access to and use of the Internet Solutions service;
    • - Levying cancellation charges to cover Internet Solutions' costs in the event of termination of the Internet Solutions service.
  • 2. In addition, Internet Solutions reserves all available rights and remedies with respect to such activities at law or in equity.
  • 3. This AUP may be clarified or modified periodically and Internet Solutions reserves the right to modify this policy at any time, any such changes coming into effect as soon as they are published on the Internet Solutions website(
  • 4. This policy forms part of Internet Solutions' standard terms and conditions of service.

All cases of violation of the above Acceptable Use Policy should be reported to

This Acceptable Use Policy was last updated on 1 June 2015.
Copyright © 2015 Internet Solutions a division of Dimension Data (Pty) Limited
All Rights Reserved

Ignite Privacy Policy

1. Preamble

Internet Solutions is sensitive to the private nature of information you provide to it over the Internet and is committed to protecting your privacy. This Privacy Policy explains the data collection and use practices of the Internet Solutions website ("the website"). By accessing the website, you are deemed to have accepted and agreed to the information collection and use practices described in this Privacy Policy.

2. Information Collected

When you use the website, and at other times, Internet Solutions may require you to provide it with personally identifiable information or you may elect to provide Internet Solutions with personally identifiable information. The personally identifiable information you provide may include your name, company, job title, address and e-mail address and facts about yourself, your business, profession and product preferences. In addition, Internet Solutions' web servers may automatically collect website usage information from you when you visit the website. Website usage information informs Internet Solutions about how visitors and subscribers use and navigate the websites, including the number and frequency of users to each web page, their IP address, and the length of their stays.

3. Use of Information Collected

  • 3.1 The personal information collected on the website will be used to operate the website and to provide the services or carry out the transactions you have requested. In support of these uses, Internet Solutions may combine the personally identifiable information you have provided to it on the website with other information about you that is available to it, including website usage information and information from other sources. Internet Solutions may use this information to enable it to process, validate and verify requests for products and services and for the purposes for which you specifically provided the information; to improve your experience on the website; to improve and develop new products, features and services; to alert you to new products and services and special offers; to provide marketing with aggregate information about the user base and usage patterns; to allow Internet Solutions to personalise the advertising users see based on their personal characteristics or preferences, and for other purposes.
  • 3.2 Personal information collected from you may be stored and processed in England, or any other country in which Internet Solutions operates or maintains facilities and may be transferred to third party suppliers to Internet Solutions, in order to help Internet Solutions to improve the content of the website, provide you with the products or services requested, to consider and respond to any application for employment made, and to help service providers to perform services on its behalf. By using the website, you consent to any such transfer of information outside of your country.
  • 3.3 Internet Solutions may disclose any information about you to law enforcement agencies, government officials or other authorities, as Internet Solutions, in its sole discretion, believes necessary or appropriate in the circumstances. If you use the website to make application for employment with Internet Solutions, you acknowledge that: Internet Solutions will not under any circumstances be liable to you should your application be unsuccessful or should your application not be received; the technology utilised by Internet Solutions and its third party suppliers is designed to protect personally identifiable information but that Internet Solutions is unable to guarantee that all such personally identifiable information is not capable of being illegally accessed and that accordingly you assume all risk associated therewith and agree that Internet Solutions shall not under any circumstances be liable to you in respect thereof; you provide any information solely at your risk and any information provided will be kept and stored for such period of time Internet Solutions deems appropriate.

4. Cookies

Like most websites, Internet Solutions automatically collects information and data through the use of "cookies". A "Cookie" is a small text file that is placed on your hard disk by a web page server which enables a website to recognise repeat users, facilitate the user's on-going access to and use of the website and allows a website to track usage behaviour and compile aggregate data that will allow content improvements and targeted advertising. A cookie will not provide Internet Solutions with personal information; therefore, if you have not supplied Internet Solutions with any personal information, you can still browse the website anonymously. You have the ability to accept or decline cookies. Most web browsers automatically accept cookies; however you can modify your browser setting to decline cookies if you prefer. If you choose to decline cookies, you may not be able to fully experience the interactive features of this or other websites which you visit.

5. Security

The personally identifiable information we collect about you is stored in limited access servers. Internet Solutions maintains safeguards to protect the security, integrity, and privacy of these servers and your personally identifiable information.

6. IP Address

If you are connected to the internet you will have an IP Address. This may take the form of a figure, such as 333.333.22.1. The address will be automatically collected and logged as part of the connection of your computer to Internet Solutions' web server and may be used to determine the total number of visits to each part of the website. If there is a security breach the relevant IP Address will be identified by the Internet Service Provider and the user may be contacted.

7. Links to Other Web Sites

Should you make use of the external links which may be provided for your convenience, you should be aware that those websites are not subject to this Privacy Policy. Internet Solutions recommends that you review the privacy policy at each such website to determine how that website protects your privacy.

8. Policy Modifications

Internet Solutions may amend this Privacy Policy from time to time, and will post any changes here, so that you are familiar with the Privacy Policy adopted by Internet Solutions. Notwithstanding the right to amend the Privacy Policy as aforesaid, Internet Solutions will not use your personal information in a manner materially different from this Privacy Policy without your prior consent.

9. Comments and Questions

If you have any questions or comments about this Privacy Policy, please contact Internet Solutions by filling in the Contact Us form which can be found here: Internet Solutions reserves the right to contact you at any time regarding any problems or questions as well as to notify you of changes to the Privacy Policy, or to other policies or terms that affect you and your use of the website, but it is not obliged to do so.

10. Terms and conditions

This Privacy Policy is subject in all respects to the terms and conditions of use of the Internet Solutions website.

This Privacy Policy was last updated on 1 June 2015.
Copyright © 2015 Internet Solutions a division of Dimension Data (Pty) Limited
All Rights Reserved

No paperwork


16 Services and counting