ACCEPTABLE USE POLICY (AUP)
AUP - Version 1.0 – Last Updated: 17/11/25
1. Introduction
This Acceptable Use Policy (“Policy”) outlines the rules and standards that apply to all visitors, users, customers, and partners accessing the Thorne Technology Group website (“Site”) and any associated online services.
By using our Site, you agree to comply with this Policy. If you do not agree, you must discontinue use immediately.
Company name: Thorne Technology
Trading address: 8 Heol Bryncethin, Sarn, Bridgend, Wales, CF32 9GG
Email: hello@thornetechnology.co.uk
Telephone: 01656 521 505
2. Purpose of the Policy
This Policy is designed to:
-
Protect our systems, data, and users
-
Ensure responsible and lawful use of digital services
-
Maintain service availability, performance, and security
-
Set clear expectations for user behaviour
3. Permitted Use of Our Website
You may use our Site for:
-
Accessing information about our IT, telecoms, cyber security, and consultancy services
-
Making legitimate business enquiries
-
Submitting support tickets or contact forms
-
Reviewing resources or documents provided by us
-
Carrying out tasks that support your business relationship with us
4. Prohibited Use
You must not use the Site to:
4.1 Illegal or Harmful Activity
-
Commit or encourage unlawful acts
-
Violate UK laws including Computer Misuse Act 1990, GDPR, copyright law, or telecoms regulations
-
Upload or distribute malware, spyware, viruses, ransomware, or malicious code
-
Attempt to gain unauthorised access to systems, networks, or data (ours or others)
4.2 Disruption and Misuse
-
Perform scanning, probing, or load testing without written approval
-
Conduct activities that degrade performance or availability
-
Impersonate individuals or companies
-
Misrepresent your identity when interacting with us
4.3 Content Guidelines
You must not upload, submit, or transmit:
-
Offensive, abusive, defamatory, or discriminatory content
-
Material that infringes third-party intellectual property rights
-
Unsolicited marketing material (“spam”)
-
Fraudulent or misleading information
4.4 Automated Access
You must not:
-
Use bots, crawlers, scrapers, or automated tools without permission
-
Attempt to harvest data or extract information for commercial gain
5. Monitoring & Enforcement
We may:
-
Monitor website activity for security events
-
Investigate suspected breaches
-
Report unlawful activity to authorities
-
Suspend or block website access
6. Breach of This Policy
A breach may result in:
-
Removal of content
-
Termination of access
-
Civil or criminal proceedings where appropriate
7. Amendments
We may update this Policy periodically. Updates will be published on this page.