SlideShare a Scribd company logo
MAXIS FAIR USAGE POLICY 
1. 
Introduction 
1.1 
This Fair Usage Policy ("Policy") sets out an acceptable level of conduct between Maxis Broadband Sdn Bhd or Maxis Mobile Services Sdn Bhd (both shall be referred to as "Maxis") and its customers using the Maxis Broadband internet service. Maxis believes that all internet users should be responsible in their usage and how it affects other users. 
1.2 
Whilst connection is "always on" for each customer, the available bandwidth is shared by all customers active at a particular point in time. A small portion (about 1%) of customers use a very large portion (about 30%) of bandwidth based on our data and that from other broadband service providers. 
1.3 
If the customer needs a 1:1 service and exclusive access to their bandwidth then the customer will need an internet leased line where there is no contention until the World Wide Web router. 
1.4 
To overcome this biasness, this Policy is in place to ensure all Maxis’ customers have a good experience. 
1.5 
Maxis may, from time to time, change this Policy without further notice to its customers. Please visit the Maxis Broadband web page periodically to determine any changes to this Policy. 
1.6 
This Policy supplements the Maxis Broadband Terms & Conditions and the General Terms and Conditions 
2. 
Unlawful Activities 
2.1 
In using the Maxis Broadband service and/or any other internet access service that may be provided by Maxis, you must conform to the laws of Malaysia and will not knowingly permit any illegal use or such use that will discredit Maxis.
2.2 
This includes NOT: 
(a) 
sending, receiving, publishing, posting, distributing, disseminating, encouraging the receipt of, uploading, downloading or using any material which is offensive, abusive, defamatory, indecent, obscene, unlawful, harassing or menacing or a breach of the copyright, trademark, intellectual property, confidence, privacy or any other rights of any person; 
(b) 
using for commercial purposes, unless you are on the Office Packages; 
(c) 
sending or uploading unsolicited emails, advertising or promotional materials, offering to sell any goods or services, or conducting or forwarding surveys, contests or chain letters; 
(d) 
knowingly or negligently transmitting or uploading any electronic material (including, without limit, files that contain viruses, corrupted files, or any other similar software or programs) which is known or likely to cause, interrupt, damage, destroy or limit the functionality of any computer software, hardware or telecommunications equipment owned by Maxis or any other internet user or person; 
(e) 
allowing activities that invade another’s privacy, cause annoyance, inconvenience or needless anxiety to any person; 
(f) 
allowing activities that are in breach of any other third party’s rights, including downloading, installation or distribution of pirated software or other inappropriately licensed software, deletion of any author attributions, legal notices or propriety designations or labels in any file that is uploaded, falsification of the origin or source of any software or other material; 
(g) 
allowing anything that may disrupt or interfere with Maxis’ network or services or cause a host or the network to crash; 
(h) 
launching "denial of service" attacks, "mail-bombing" attacks, "spamming" or "flooding" attacks against a host or network; 
(i) 
making excessive use of, or placing unusual burdens on, the network, for example by sending or receiving large volumes of email or excessively large mail attachments; 
(j) 
circumventing the user authentication or security process of a host or network;
(k) 
creating, transmitting, storing or publishing any virus, Trojan, corrupting programme or corrupted data. 
3. 
Security 
3.1 
Each customer is responsible for ensuring that his/her User ID and/or password, at all times, remain confidential. 
3.2 
Maxis may request that the customer change his User ID and/or password if deemed necessary. 
3.3 
The customer shall not disclose his/her User ID and/or password to any third party, or use the same for any purpose connected with the improper use of the network including accessing or attempting to access other parts of the services for which you do not have access rights. 
3.4 
The customer is responsible for taking all reasonable steps necessary to prevent a third party from obtaining access to the network. 
3.5 
The customer must immediately advise Maxis if they become aware of any violation or suspected violation of these provisions. 
3.6 
The customer is responsible for the set-up and security of his/her computer and any servers that they may run on their computer. 
3.7 
Maxis strongly recommends that customers protect their computers with anti- virus software. 
4. 
General Use of Service and Abuse 
4.1 
Each customer must be at least 18 years old to be a Maxis customer. Sub-users under this age must have permission from the account holder to access the Maxis Broadband service. Before using the Maxis Broadband service, the person must obtain permission from the registered customer. 
4.2 
The customer must not run port-scanning software on any Maxis Broadband service. 
4.3 
The customer must not attempt to gain unauthorised access to any computer system.
4.4 
The customer must not undertake any activity that has an adverse effect on the Maxis Broadband service or its customers. 
4.5 
The customer may not use their Maxis Broadband service connection to run programs or servers that provide network content or connectivity to any third party not at the location where the connection is installed. Examples of prohibited programs include, but are not limited to, mail, FTP, HTTP, game, newsgroup, proxy, and IRC servers. 
4.6 
The customer may not resell or otherwise charge others for the use of their internet connection. This service is for recreational, residential, personal use only and may not be used for operations of an internet service provider. 
4.7 
Office Package customers may host one (1) email (POP3, SMTP, and/or IMAP) and/or one (1) web (HTTP and/or HTTPS) server for the sole use of that organization. These servers may not be used to host other services through the wireless connection or host email or web services for other organizations. 
4.8 
Maxis may, at its sole discretion, automatically disconnect the customer’s internet session after a period of inactivity, which may vary from 20 minutes to 30 minutes. This automatic disconnection is to allow maximum network performance. 
5. 
Fair Usage 
5.1 
At Maxis, we want our broadband service to be fast and available for our customers at all times. This clause is designed with that goal in mind. Maxis views the vast majority of customers should not suffer from a slower service because of a very small number of high bandwidth users. 
5.2 
Peer-To-Peer and File Sharing Software 
5.2.1 
Certain software/applications which is used by a small number of customers to send and receive files containing very large amounts of data (including without limitation traffic from peer-to-peer software/applications (such as Bit Torrent, eDonkey, Gnutella) or file sharing software (such as Limewire)). These activities may cause network congestion and can negatively impact the speed at which other customers can access the internet. 
5.2.2 
Maxis does not guarantee a service level and/or connectivity to users of peer-to-peer or file sharing software/applications.
5.2.3 
The system that is used to provide the Maxis Broadband service can identify very high bandwidth users and Maxis seeks to manage the customer’s usage by throttling their bandwidth to a much lower broadband speed to ensure fairness to all customers. 
5.2.4 
The customers are reminded that the software (as mentioned in section 5.2.1 above) allows the download of illegal content which Maxis prohibits, which is an infringement of copyright and/or intellectual property rights and rightful owners of such copyright and/or intellectual property rights may take measures to prosecute. Each individual download can be traced by the customer’s IP address back to the customer’s account with Maxis. 
5.2.5 
Maxis reserves the right to release customer information pursuant to any copyright (and/or intellectual property right) infringement if it is required to do so by any law, regulatory body or court of law. 
5.3 
Excessive Usage 
5.3.1 
Each customer’s total usage per month shall NOT exceed the stipulated amount of data volume transmitted (total upload and download usage). This is to ensure that no individual hogs the bandwidth at all times. 
5.3.2 
Maxis reserves the right to reject the said application or charge for any additional data volume transmitted from what is already allocated. 
6. 
Enforcement on Breach of Policy 
6.1 
In respect of the customers who are in violation of this Policy, Maxis may, at its option and discretion, have their bandwidth managed, service suspended or terminated (with or without notice as Maxis considers appropriate). 
6.2 
To report any illegal or unacceptable use of Maxis Broadband service, please send an email to customercare@maxis.com.my

More Related Content

Similar to Fair usage

Cyber Defense Team's Security Policy
Cyber Defense Team's Security PolicyCyber Defense Team's Security Policy
Cyber Defense Team's Security Policy
Kunal Sharma
 
Consensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access PolicConsensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access Polic
AlleneMcclendon878
 
Consensus policy resource community remote access polic
Consensus policy resource community remote access policConsensus policy resource community remote access polic
Consensus policy resource community remote access polic
ARIV4
 
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓNPOLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
Luis Antonio Bustillos López
 
It policy (ver 1.0)
It policy (ver  1.0)It policy (ver  1.0)
It policy (ver 1.0)
sentmery5
 
Tawi SMS Gateway Developer Guide
Tawi SMS Gateway Developer GuideTawi SMS Gateway Developer Guide
Tawi SMS Gateway Developer Guide
tawi123
 
Network Security Policies
Network Security PoliciesNetwork Security Policies
Network Security Policies
Aamir Sohail
 
Briefpack library system license terms & privacy policy 2020
Briefpack library system license terms & privacy policy 2020Briefpack library system license terms & privacy policy 2020
Briefpack library system license terms & privacy policy 2020
EmmanuelGazelle
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
Iaetsd Iaetsd
 
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxSample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
todd331
 
SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...
SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...
SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...
ijcsit
 
Web Site Hosting End User Agreement
Web Site Hosting End User AgreementWeb Site Hosting End User Agreement
Web Site Hosting End User Agreement
webhostingguy
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
scobycakau
 
A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...
ijdpsjournal
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network design
nephtalie
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
Yateesh Yadav
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
healdkathaleen
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud
kairostech
 
Cyber Resilience - Contemporary once again for Managing Data Protection post-...
Cyber Resilience - Contemporary once again for Managing Data Protection post-...Cyber Resilience - Contemporary once again for Managing Data Protection post-...
Cyber Resilience - Contemporary once again for Managing Data Protection post-...
SSFIndia1
 
Security Plan
Security PlanSecurity Plan
Security Plan
Jerrell Collymore
 

Similar to Fair usage (20)

Cyber Defense Team's Security Policy
Cyber Defense Team's Security PolicyCyber Defense Team's Security Policy
Cyber Defense Team's Security Policy
 
Consensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access PolicConsensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access Polic
 
Consensus policy resource community remote access polic
Consensus policy resource community remote access policConsensus policy resource community remote access polic
Consensus policy resource community remote access polic
 
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓNPOLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
 
It policy (ver 1.0)
It policy (ver  1.0)It policy (ver  1.0)
It policy (ver 1.0)
 
Tawi SMS Gateway Developer Guide
Tawi SMS Gateway Developer GuideTawi SMS Gateway Developer Guide
Tawi SMS Gateway Developer Guide
 
Network Security Policies
Network Security PoliciesNetwork Security Policies
Network Security Policies
 
Briefpack library system license terms & privacy policy 2020
Briefpack library system license terms & privacy policy 2020Briefpack library system license terms & privacy policy 2020
Briefpack library system license terms & privacy policy 2020
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxSample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
 
SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...
SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...
SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...
 
Web Site Hosting End User Agreement
Web Site Hosting End User AgreementWeb Site Hosting End User Agreement
Web Site Hosting End User Agreement
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
 
A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network design
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud
 
Cyber Resilience - Contemporary once again for Managing Data Protection post-...
Cyber Resilience - Contemporary once again for Managing Data Protection post-...Cyber Resilience - Contemporary once again for Managing Data Protection post-...
Cyber Resilience - Contemporary once again for Managing Data Protection post-...
 
Security Plan
Security PlanSecurity Plan
Security Plan
 

More from Maxis Fibre

Fiber internet quick startguide
Fiber internet   quick startguideFiber internet   quick startguide
Fiber internet quick startguide
Maxis Fibre
 
Customer general-tnc-astrobyond-iptv-with-maxis-fibre-internet
Customer general-tnc-astrobyond-iptv-with-maxis-fibre-internetCustomer general-tnc-astrobyond-iptv-with-maxis-fibre-internet
Customer general-tnc-astrobyond-iptv-with-maxis-fibre-internet
Maxis Fibre
 
Home diagram 2_d_2012
Home diagram 2_d_2012Home diagram 2_d_2012
Home diagram 2_d_2012
Maxis Fibre
 
Ftth residential-wifi-modem-guide
Ftth residential-wifi-modem-guideFtth residential-wifi-modem-guide
Ftth residential-wifi-modem-guide
Maxis Fibre
 
Ftth non-standard-installation
Ftth non-standard-installationFtth non-standard-installation
Ftth non-standard-installation
Maxis Fibre
 
Maxis Fibre Bundled with Astro IPTV
Maxis Fibre Bundled with Astro IPTVMaxis Fibre Bundled with Astro IPTV
Maxis Fibre Bundled with Astro IPTV
Maxis Fibre
 

More from Maxis Fibre (6)

Fiber internet quick startguide
Fiber internet   quick startguideFiber internet   quick startguide
Fiber internet quick startguide
 
Customer general-tnc-astrobyond-iptv-with-maxis-fibre-internet
Customer general-tnc-astrobyond-iptv-with-maxis-fibre-internetCustomer general-tnc-astrobyond-iptv-with-maxis-fibre-internet
Customer general-tnc-astrobyond-iptv-with-maxis-fibre-internet
 
Home diagram 2_d_2012
Home diagram 2_d_2012Home diagram 2_d_2012
Home diagram 2_d_2012
 
Ftth residential-wifi-modem-guide
Ftth residential-wifi-modem-guideFtth residential-wifi-modem-guide
Ftth residential-wifi-modem-guide
 
Ftth non-standard-installation
Ftth non-standard-installationFtth non-standard-installation
Ftth non-standard-installation
 
Maxis Fibre Bundled with Astro IPTV
Maxis Fibre Bundled with Astro IPTVMaxis Fibre Bundled with Astro IPTV
Maxis Fibre Bundled with Astro IPTV
 

Fair usage

  • 1. MAXIS FAIR USAGE POLICY 1. Introduction 1.1 This Fair Usage Policy ("Policy") sets out an acceptable level of conduct between Maxis Broadband Sdn Bhd or Maxis Mobile Services Sdn Bhd (both shall be referred to as "Maxis") and its customers using the Maxis Broadband internet service. Maxis believes that all internet users should be responsible in their usage and how it affects other users. 1.2 Whilst connection is "always on" for each customer, the available bandwidth is shared by all customers active at a particular point in time. A small portion (about 1%) of customers use a very large portion (about 30%) of bandwidth based on our data and that from other broadband service providers. 1.3 If the customer needs a 1:1 service and exclusive access to their bandwidth then the customer will need an internet leased line where there is no contention until the World Wide Web router. 1.4 To overcome this biasness, this Policy is in place to ensure all Maxis’ customers have a good experience. 1.5 Maxis may, from time to time, change this Policy without further notice to its customers. Please visit the Maxis Broadband web page periodically to determine any changes to this Policy. 1.6 This Policy supplements the Maxis Broadband Terms & Conditions and the General Terms and Conditions 2. Unlawful Activities 2.1 In using the Maxis Broadband service and/or any other internet access service that may be provided by Maxis, you must conform to the laws of Malaysia and will not knowingly permit any illegal use or such use that will discredit Maxis.
  • 2. 2.2 This includes NOT: (a) sending, receiving, publishing, posting, distributing, disseminating, encouraging the receipt of, uploading, downloading or using any material which is offensive, abusive, defamatory, indecent, obscene, unlawful, harassing or menacing or a breach of the copyright, trademark, intellectual property, confidence, privacy or any other rights of any person; (b) using for commercial purposes, unless you are on the Office Packages; (c) sending or uploading unsolicited emails, advertising or promotional materials, offering to sell any goods or services, or conducting or forwarding surveys, contests or chain letters; (d) knowingly or negligently transmitting or uploading any electronic material (including, without limit, files that contain viruses, corrupted files, or any other similar software or programs) which is known or likely to cause, interrupt, damage, destroy or limit the functionality of any computer software, hardware or telecommunications equipment owned by Maxis or any other internet user or person; (e) allowing activities that invade another’s privacy, cause annoyance, inconvenience or needless anxiety to any person; (f) allowing activities that are in breach of any other third party’s rights, including downloading, installation or distribution of pirated software or other inappropriately licensed software, deletion of any author attributions, legal notices or propriety designations or labels in any file that is uploaded, falsification of the origin or source of any software or other material; (g) allowing anything that may disrupt or interfere with Maxis’ network or services or cause a host or the network to crash; (h) launching "denial of service" attacks, "mail-bombing" attacks, "spamming" or "flooding" attacks against a host or network; (i) making excessive use of, or placing unusual burdens on, the network, for example by sending or receiving large volumes of email or excessively large mail attachments; (j) circumventing the user authentication or security process of a host or network;
  • 3. (k) creating, transmitting, storing or publishing any virus, Trojan, corrupting programme or corrupted data. 3. Security 3.1 Each customer is responsible for ensuring that his/her User ID and/or password, at all times, remain confidential. 3.2 Maxis may request that the customer change his User ID and/or password if deemed necessary. 3.3 The customer shall not disclose his/her User ID and/or password to any third party, or use the same for any purpose connected with the improper use of the network including accessing or attempting to access other parts of the services for which you do not have access rights. 3.4 The customer is responsible for taking all reasonable steps necessary to prevent a third party from obtaining access to the network. 3.5 The customer must immediately advise Maxis if they become aware of any violation or suspected violation of these provisions. 3.6 The customer is responsible for the set-up and security of his/her computer and any servers that they may run on their computer. 3.7 Maxis strongly recommends that customers protect their computers with anti- virus software. 4. General Use of Service and Abuse 4.1 Each customer must be at least 18 years old to be a Maxis customer. Sub-users under this age must have permission from the account holder to access the Maxis Broadband service. Before using the Maxis Broadband service, the person must obtain permission from the registered customer. 4.2 The customer must not run port-scanning software on any Maxis Broadband service. 4.3 The customer must not attempt to gain unauthorised access to any computer system.
  • 4. 4.4 The customer must not undertake any activity that has an adverse effect on the Maxis Broadband service or its customers. 4.5 The customer may not use their Maxis Broadband service connection to run programs or servers that provide network content or connectivity to any third party not at the location where the connection is installed. Examples of prohibited programs include, but are not limited to, mail, FTP, HTTP, game, newsgroup, proxy, and IRC servers. 4.6 The customer may not resell or otherwise charge others for the use of their internet connection. This service is for recreational, residential, personal use only and may not be used for operations of an internet service provider. 4.7 Office Package customers may host one (1) email (POP3, SMTP, and/or IMAP) and/or one (1) web (HTTP and/or HTTPS) server for the sole use of that organization. These servers may not be used to host other services through the wireless connection or host email or web services for other organizations. 4.8 Maxis may, at its sole discretion, automatically disconnect the customer’s internet session after a period of inactivity, which may vary from 20 minutes to 30 minutes. This automatic disconnection is to allow maximum network performance. 5. Fair Usage 5.1 At Maxis, we want our broadband service to be fast and available for our customers at all times. This clause is designed with that goal in mind. Maxis views the vast majority of customers should not suffer from a slower service because of a very small number of high bandwidth users. 5.2 Peer-To-Peer and File Sharing Software 5.2.1 Certain software/applications which is used by a small number of customers to send and receive files containing very large amounts of data (including without limitation traffic from peer-to-peer software/applications (such as Bit Torrent, eDonkey, Gnutella) or file sharing software (such as Limewire)). These activities may cause network congestion and can negatively impact the speed at which other customers can access the internet. 5.2.2 Maxis does not guarantee a service level and/or connectivity to users of peer-to-peer or file sharing software/applications.
  • 5. 5.2.3 The system that is used to provide the Maxis Broadband service can identify very high bandwidth users and Maxis seeks to manage the customer’s usage by throttling their bandwidth to a much lower broadband speed to ensure fairness to all customers. 5.2.4 The customers are reminded that the software (as mentioned in section 5.2.1 above) allows the download of illegal content which Maxis prohibits, which is an infringement of copyright and/or intellectual property rights and rightful owners of such copyright and/or intellectual property rights may take measures to prosecute. Each individual download can be traced by the customer’s IP address back to the customer’s account with Maxis. 5.2.5 Maxis reserves the right to release customer information pursuant to any copyright (and/or intellectual property right) infringement if it is required to do so by any law, regulatory body or court of law. 5.3 Excessive Usage 5.3.1 Each customer’s total usage per month shall NOT exceed the stipulated amount of data volume transmitted (total upload and download usage). This is to ensure that no individual hogs the bandwidth at all times. 5.3.2 Maxis reserves the right to reject the said application or charge for any additional data volume transmitted from what is already allocated. 6. Enforcement on Breach of Policy 6.1 In respect of the customers who are in violation of this Policy, Maxis may, at its option and discretion, have their bandwidth managed, service suspended or terminated (with or without notice as Maxis considers appropriate). 6.2 To report any illegal or unacceptable use of Maxis Broadband service, please send an email to customercare@maxis.com.my