Acceptable Use Policy

The C3 Acceptable Use Policy (“Policy”) sets out obligations in respect of your use the Services and all Equipment provided by us to you.  It forms part of your contract with us.  It should be read in conjunction with the General Terms and Conditions (the “Terms”) and all capitalised terms used but not defined herein are as defined in the Terms.

The Policy explains your usage obligations, what you can do to avoid breaching the Policy and what happens if you breach the Policy.

We may update or amend this Policy at any time, so please check our website regularly at for any updates to this Policy or our Terms. Your continued use of the Service after any change to the Policy constitutes acceptance of the updated Policy.

Use of the Service

You must not use the Services or Equipment in any way that is unlawful or illegal in respect of the laws and regulations in force from time to time in the Cayman Islands (“Laws”).  For the avoidance of doubt, inappropriate use or abuse of C3 Services can be traced, documented, and reported to appropriate authorities and may be prosecuted to the fullest extent of the law.

You must only use our services for private, personal, and legitimate consumer purposes.

You must not adapt, modify or reverse engineer any part of the Service or Equipment.

You are solely responsible for your use of the internet and any web space that you own or control. As the account holder, you shall also, at all times, remain fully responsible for any use of the Service by anyone else at your Premises (including your family and any visitors to the Premises).

You must ensure that your computer systems and network are not configured in such a way that others are able to exploit them in order to disrupt the internet or any other third-party network. This includes but is not limited to ensuring that your network cannot be exploited as an open mail relay, open proxy server, or as a component of a wider network used in denial, or distributed denial of service attacks by third parties.

Specific examples of unacceptable use

For the avoidance of doubt, conduct that violates C3’s acceptable use policy includes, but is not limited to, the activities in the following list:

  • reselling or transferring our Services or Equipment;
  • using automatic dialing-announcing devices or automatic dialing devices, which are strictly prohibited;
  • initiating or propagating electronic chain letters, and outbound telemarketing, spam, or mass marketing via e-mail that violates good marketing industry practice as set out in any applicable law, regulation, or recognized industry association guidelines;
  • using the Services in such a way that would violate our contracts with our service providers;
  • sending unsolicited bulk emails, spam emails, “mailbombs”, mass mailings or messages, talk requests or any other form of email or Usenet “abuse”. This applies to both materials that originates on your computer systems and also third-party material passing through your computer systems;
  • giving access to an account, through sharing of passwords or otherwise, to any person other than the assigned user or pre-authorised group users for that account;
  • using the network to gain unauthorised access to any computer system or to purposely install a virus or any other unauthorised program on any computer system;
  • attempting to circumvent data protection schemes or uncover security loopholes, which includes running programs that are designed to identify security loopholes or decrypt intentionally secure data;
  • knowingly or recklessly performing an act that will interfere with the normal operation of our computers, peripherals, or network;
  • deliberately wasting or overloading our network or server resources, or those of any other system via C3;
  • infringing any third-party’s rights (including any third-party intellectual property rights);
  • posting any material which may damage our name and/or reputation or the name and/or reputation of any third-party;
  • inappropriate posting of commercial or inflammatory material to newsgroups not intended or inappropriate for such postings;
  • forging communications to make them appear to originate from another person; or,
  • attempting to monitor or tamper with another user’s electronic communications, or reading, copying, changing or deleting another user’s files or software without the express consent of the other user;
  • adapting, modifying or reverse engineering any part of the Service or Equipment;
  • accessing, downloading, sending, storing, distributing, transmitting, uploading or in any way dealing with material or data that: (i) violates any Laws; ii) is or could be offensive, threatening, defamatory, racist, abusive, harassing, invasive of privacy, obscene, harmful, indecent or menacing; (iii) is or could be harmful to minors; or (iv) is or could be for criminal or fraudulent purposes or effect, including but not limited to impersonating another person or otherwise misrepresenting yourself as the source of any communications.



You must not take any action that could inhibit or violate the network security of any person or company (including C3) or that could adversely affect their use of the internet.

You can best control the risks associated with security, and are therefore solely responsible for maintaining and upholding the account security of the Service. C3 will not be responsible for any disruption of Service, corrupted files or viruses which affect you. It is your responsibility to safeguard your network and equipment through appropriate means (e.g. using commercially available software), from theft, unauthorized use or system corruption. Any detriment caused to the network as a result of your failure to properly secure your network and devices may result in the immediate termination of the Service. You are entirely responsible for any Losses incurred via your account, regardless of who is using that account.

We reserve the right to restrict access to any illegal content. However, we do not monitor all content available through the Service and, as such, we cannot guarantee that you will be unable to access illegal or offensive content on the internet. We therefore recommend that you install appropriate security measures on your computer systems, including parental controls and up-to-date virus protection and firewalls.


We may, at our sole discretion, run manual or automatic systems and monitoring in order to ensure that you remain compliant with the terms of this Policy at all times. We may monitor email and electronic messages during transmission over our networks for viruses and other impediments to the provision of Service to you. We have the right to monitor or investigate any content that is transmitted using the Services (other than as prescribed by applicable law) or the Equipment.

By using the Services you are granting us permission to access and monitor your computer systems and networks.

Traffic monitoring

Traffic management is the term used to describe a range of technical practices undertaken to manage traffic across our network. In order to ensure our customers equally experience seamless broadband, C3 reserves the right to identify customers who excessively exceed bandwidth usage which may hinder the level of broadband service to other users.

In order to do so, C3 administers packet inspection to identify peer-to-peer (P2P) file sharing traffic which is less time sensitive than other real-time sensitive applications, such as web browsing or video streaming. P2P file sharing applications are less time sensitive enabling them to be slowed when Internet traffic becomes congested without disrupting a customer’s broadband usage.

C3 does not examine content during packet inspection however the IP address will be stored for a limited time.  C3 will not be privy to the content within communications nor the customers search history or activities.

To effectively maintain consistency on the C3 network, traffic management will identify and assess traffic data along with the correlating IP address to determine what type of traffic is occurring and categorize the usage patterns. Once the data is sorted this information is not retained.

Actions C3 may take

If we become aware that you may have breached this Policy, we reserve the right to take any action we believe to be appropriate including, but not limited to: (a) blocking the electronic communication that we consider to be in breach; (b) investigating the possible breach; (c) notifying you or contacting you by email or phone to gather further information or to discuss our concerns; (d) issuing you with a formal warning; (e) restricting or suspending your access to the Service with immediate effect; and/or (f) terminating your account with us and disabling your access to the Service (with or without notice).

We may in certain circumstances be legally obliged to disclose information to relevant authorities, regulators, law enforcement agencies and other third parties.  We reserve the right to notify such bodies of any acts where we consider, in our sole discretion, that to do so is necessary or appropriate.

We may take any of the above actions that we deem appropriate with or without notice to you, but, to the extent that it is legally appropriate to do so, we will use reasonable efforts to try and work with you before taking any action that will affect your use of the Service.

Dated:  June 2020

Sorry, this product is only available in a C3 Pure Bundle.

See Pure Bundles