Welcome


acceptSince its inception in 2002, Data Technics(DT) has provided a wide array of 'innovative e-business solutions and services' including Web solutions, custom software/Web applications development and business process automation tools to "e"power businesses across the globe. In Business Process and Integration and Networking Infrastructure Solutions, we have successfully catered to many international clients, mostly located in the Europe, USA, South Africa and the Middle East. At DT, we align proven technical expertise with business insight - so that you may gain competitive advantage on the World Wide Web and get quick return on investment (ROI). The company have formed strategic alliances with the region"s leading IT solutions companies.
By using our web hosting services, you agree to comply with this Policy. You are expected to use the Internet with respect, courtesy, and responsibility, giving due regard to the rights of other Internet users. We expect you to have a basic knowledge of how the Internet functions, the types of uses, which are generally acceptable, and the types of uses, which are to be avoided. Common sense is the best guide as to what is considered acceptable use. The following are unacceptable uses:

Illegality in any form, including but not limited to activities such as unauthorized distribution or copying of copyrighted software, violation of United Kingdom's export restrictions, harassment, fraud, trafficking in obscene material, drug dealing, and other illegal activities.

1. Interpretation

The provisions of this Policy are intended as guidelines and are not meant to be exhaustive. Generally, conduct that violates law, regulation, or the accepted norms of the Internet community, whether or not expressly mentioned in this Policy, is prohibited. DT IT reserves the right at all times to prohibit activities that damage its commercial reputation and goodwill.

2. Compliance with Law

Customer shall not post, transmit, re-transmit or store material on or through any of Services or Products which, in the sole judgment of the Company (i) is in violation of any local, state, federal or international law or regulation, (ii) threatening, obscene, indecent, defamatory or that otherwise could adversely affect any individual, group or entity (collectively, "Persons") or (iii) violates the rights of any person, including rights protected by copyright, trade secret, patent or other intellectual property or similar laws or regulations including, but not limited to, the installation or distribution of "pirated" or other software products that are not appropriately licensed for use by Customer. Customer shall be responsible for determining what laws or regulations are applicable to its use of the Services and Products.

DT IT will be the sole arbiters as to what constitutes a violation of this provision, provided that all such determinations shall be made reasonably in good faith based on applicable law, regulation and the accepted norms of the Internet community.

3. Customer Security Obligation

Each Customer must use reasonable care in keeping each script, application, server or network devices attached to or hosted by DT IT's infrastructure up-to-date and patched with the latest security updates. Failure to use reasonable care to protect your applications and/or server may result in a security compromise by outside sources. DT IT is not responsible for Customer application/server level security unless a security administration package, firewall security administration package or fully managed operating system package is contracted for. A compromised application or server creating network interference will result in immediate Customer notification and will be suspended/disconnected from the network immediately so as to not directly affect other Customers. No service credits will be issued for outages resulting from disconnection due directly to breached security. The Customer is solely responsible for any breaches of security affecting the applications or servers under Customer control. If a Customer intentionally creates a security breach, the cost to resolve any damage to Customer's application or server or other servers will be charged directly to the Customer. The labor used to resolve such damage is categorized as emergency security breach recovery and is currently charged at £600 per hour.

4. System and Network Security

Violations of system or network security are strictly prohibited, and may result in criminal and civil liability. DT IT investigates all incidents involving such violations and will cooperate with law enforcement if a criminal violation is suspected.
 
Examples of system or network security violations include, without limitation, the following:
  1. Introduction of malicious programs into the network or server (example: viruses, worms, Trojan Horses and other executables intended to inflict harm).
  2. Effecting security breaches or disruptions of Internet communication and/or connectivity. Security breaches include, but are not limited to, accessing data of which the Customer is not an intended recipient or logging into a server or account that the Customer is not expressly authorized to access. For purposes of this section, "disruption" includes, but is not limited to port scans, flood pings, email-bombing, packet spoofing, IP spoofing and forged routing information.
  3. Executing any form of network activity that will intercept data not intended for the Customer.
  4. Circumventing user authentication or security of any host, network or account.
  5. Interfering with or denying service to any user other than the Customer's host (example: denial of service attack or distributed denial of service attack).
  6. Using any program script/command, or sending messages of any kind, designed to interfere with or to disable, a user's terminal session, via any means, locally or via the Internet.
  7. Network interference by any Customers that may cause or is currently causing network interference with another Customer will be suspended/disconnected immediately. No service credits will be issued to Customers suspended/disconnected for network violations.

5. Misuse of System Resources on Shared Hosting Service

It is a violation for anyone to post information or to include programs on the shared hosting service provided through the DT IT services which consume excessive bandwidth or CPU time. Background processes, including, but not limited to: ircbot, bnc, proxy, email sender, daemons, are strictly prohibited.

Disk Space Usage

The space provided on shared hosting servers are to be used strictly for web hosting purposes. We expressly prohibit the use of the shared hosting space for backup or file storage purposes. All shared hosting accounts are limited to a maximum of 50,000 inodes regardless of the space used. Each web page, email, image counts as 1 inode. Accounts with 50,000 inodes or more will be excluded from our backup system.
Files that are larger than 2MB will be excluded from our backup system. Customers with more files are advised to organise a separate backup system.

6. Internet Etiquette

Each Customer is expected execute reasonable Internet etiquette (Netiquette). The Customer will comply with the rules appropriate to any network to which DT IT may provide access. The Customer should not post, transmit, or permit Internet access to information the Customer desires to keep confidential. The Customer is not permitted to post any material that is illegal, libelous, and tortuous, indecently depicts children or is likely to result in retaliation against DT IT by offended users. DT IT reserves the right to refuse or terminate service at any time for violation of this section. This includes advertising services or sites via IRC or USENET in clear violation of the policies of the IRC channel or USENET group.

7. Email Policy

Mass Mailings:

DT IT has a zero stance policy on SPAM, Junk E-mail or UCE. Spam, Junk-mail and UCE are defined as: the sending of the same, or substantially similar, unsolicited electronic mail messages, whether commercial or not, to more than one recipient. A message is considered unsolicited if it is posted in violation of a newsgroup charter or if it is sent to a recipient who has not requested or invited the message. UCE also includes e-mail with forged headers, compromised mail server relays, and false contact information. This prohibition extends to the sending of unsolicited mass mailings from another service, which in any way implicates the use of DT IT's services whether or not the message actually originated from our network.

Mailing Lists:

DT IT's mass mailing rules also apply to mailing lists, list servs, or mailing services you may contract with. The policy is stated as follows: An acceptable mailing list will be focused at a targeted audience that has voluntarily signed up for your e-mail information or that has made their e-mail address available for distribution of information from you. The list must also allow for automatic removal by all end Customers with non-distribution in the future.

If your actions have caused DT IT's mail servers or DT IT's IP address ranges to be placed on blackhole lists and other mail filtering software systems used by companies on the internet, you will be assessed a £1,000 charge to your account and £600 per hour for administrative charges incurred to remove and protect mail servers and IP ranges.

Use of Email Accounts:

DT IT provides an "unlimited" number of email accounts to its shared hosting customers. This facility should only be used for customer's direct staff and/or families. DT IT specifically prohibits the use of our shared hosting's email facility to provide email service, whether it is free or fee based to the general public. For example, you cannot provide free email service such as hotmail based on our shared hosting email facility.

8. Child Pornography

DT IT will cooperate fully with any criminal investigation into a Customer's violation of the Child Protection Act concerning child pornography. Customers are ultimately responsible for the actions of their clients over DT IT's servers, and will be liable for illegal material posted by their clients.

According to the Child Protection Act, child pornography includes photographs, films, video or any other type of visual presentation that shows a person who is or is depicted as being under the age of eighteen years and is engaged in or is depicted as engaged in explicit sexual activity, or the dominant characteristic of which is the depiction, for a sexual purpose, of a sexual organ or the anal region of a person under the age of eighteen years or any written material or visual representation that advocates or counsels sexual activity with a person under the age of eighteen years.

9. Copyright Infringement

DT IT's infrastructure including network, leased hardware, co-location services, and other hardware located in the facility may only be used for lawful purposes. Transmission, distribution, or storage of any information, data or material in violation of United Kingdom or International regulation or law, or by the common law, is prohibited. This includes, but is not limited to, material protected by copyright, trademark, trade secret, or other intellectual property rights.

Creative, utilizing, or distributing unauthorized copies of software are a violation of law. If you copy, distribute or install the software in ways that the license does not allow, you are violating copyright law. DT IT will cooperate with all law enforcement agencies in relation to alleged copyright infringement housed in our datacenters / servers.

10. Consequences of Violation

When DT IT becomes aware of an alleged violation of its Acceptable Use Policy, DT IT will initiate an investigation. During the investigation DT IT may restrict Customer's access in order to prevent further possible unauthorized activity. Depending on the severity of the violation, DT IT may, at its sole discretion, restrict, suspend, or terminate Customer's account and/or pursue other civil remedies. If such violation is a criminal offense, DT IT will notify the appropriate law enforcement department of such violation.

DT IT does not issue service credits for any outages incurred through service disablement resulting from Policy violations.

11. Reporting Abuse

Any party seeking to report any violations of DT IT's policy may contact us via our online form.
 
Last Updated: 12 September 2010

Complaints Policy of Data Technics It Ltd

Data Technics IT Ltd views complaints as an opportunity to learn and improve for the future, as well as a chance to put things right for the person or organisation that has made the complaint.

Our policy is:

  • To provide a fair complaints procedure which is clear and easy to use for anyone wishing to make a complaint
  • To publicise the existence of our complaints procedure so that people know how to contact us to make a complaint
  • To make sure everyone at Data Technics IT Ltd knows what to do if a complaint is received
  • To make sure all complaints are investigated fairly and in a timely way
  • To make sure that complaints are, wherever possible, resolved and that relationships are repaired
  • To gather information which helps us to improve what we do.

Definition of a Complaint

A complaint is any expression of dissatisfaction, whether justified or not, about any aspect of Data Technics IT Ltd.

Where Complaints Come From

Complaints may come from any person, client or organisation who has a legitimate interest in Data Technics IT Ltd.
A complaint can be received verbally, by phone, by email or in writing. (This policy does not cover complaints from staff, who should use Data Technics IT Ltd’s Discipline and Grievance policies.)

Confidentiality

All complaint information will be handled sensitively, telling only those who need to know and following any relevant data protection requirements.

Responsibility

Overall responsibility for this policy and its implementation lies with the Company Management.
Review This policy is reviewed regularly and updated as required.
Adopted on: 28 September 2015
Last reviewed: 2 October 2015

Complaints Procedure of Data Technics IT Ltd

Publicised Contact Details for Complaints:

Written complaints may be sent to Data Technics IT Ltd at 60 Ascot Gardens, Southall, Middlesex UB1 2SA or by e-mail at This email address is being protected from spambots. You need JavaScript enabled to view it..
Verbal complaints may be made by phone to 0845 166 1414 or in person to any of Data Technics IT Ltd’s staff at 60 Ascot Gardens, Southall, Middlesex UB1 2SA.

Receiving Complaints

Complaints may arrive through channels publicised for that purpose or through any other contact details or opportunities the complainant may have.
Complaints received by telephone or in person need to be recorded. The person who receives a phone or in person complaint should:
  • Write down the facts of the complaint
  • Take the complainant's name, address and telephone number
  • Note down the relationship of the complainant to Data Technics IT Ltd (for example: client, member)
  • Tell the complainant that we have a complaints procedure
  • Tell the complainant what will happen next and how long it will take
  • Where appropriate, ask the complainant to send a written account by post or by email so that the complaint is recorded in the complainant’s own words.
For further guidelines about handling verbal complaints, see Appendix 1

Resolving Complaints

In many cases, a complaint is best resolved by the person responsible for the issue being complained about. If the complaint has been received by that person, they may be able to resolve it swiftly and should do so if possible and appropriate.
Whether or not the complaint has been resolved, the complaint information should be passed to the Company Management within 5 business days.
On receiving the complaint, Company Management records it in the complaints log. If it has not already been resolved, they delegate an appropriate person to investigate it and to take appropriate action.
If the complaint relates to a specific person, they should be informed and given a fair opportunity to respond.
Complaints should be acknowledged by the person handling the complaint within 5 bussiness days. The acknowledgement should say who is dealing with the complaint and when the person complaining can expect a reply. A copy of this complaints procedure should be attached.
Ideally complainants should receive a definitive reply within four weeks. If this is not possible because for example, an investigation has not been fully completed, a progress report should be sent with an indication of when a full reply will be given.
Whether the complaint is justified or not, the reply to the complainant should describe the action taken to investigate the complaint, the conclusions from the investigation, and any action taken as a result of the complaint. Monitoring and Learning from Complaints Complaints are reviewed annually to identify any trends which may indicate a need to take further action.

Appendix 1 - Practical Guidance for Handling Verbal Complaints

  • Remain calm and respectful throughout the conversation
  • Listen - allow the person to talk about the complaint in their own words. Sometimes a person just wants to "let off steam"
  • Don't debate the facts in the first instance, especially if the person is angry
  • Show an interest in what is being said
  • Obtain details about the complaint before any personal details
  • Ask for clarification wherever necessary
  • Show that you have understood the complaint by reflecting back what you have noted down
  • Acknowledge the person's feelings (even if you feel that they are being unreasonable) - you can do this without making a comment on the complaint itself or making any admission of fault on behalf of the organisation e.g "I understand that this situation is frustrating for you"
  • If you feel that an apology is deserved for something that was the responsibility of your organisation, then apologise
  • Ask the person what they would like done to resolve the issue
  • Be clear about what you can do, how long it will take and what it will involve
  • Don’t promise things you can’t deliver
  • Give clear and valid reasons why requests cannot be met
  • Make sure that the person understands what they have been told
  • Wherever appropriate, inform the person about the available avenues of review or appeal

Last updated (revision 1.0) - 02 October 2015

webcontentData Technics deliver complete content managed web solutions, with the experience and track- record of success to back up a comprehensive capability to advise, train and support.
partnersDT is pleased to announce the launching of our partner programme. The partner scheme will cater for both channel partners, whereby the partner buys the services and sells them onto their clients, and affiliate partners, whereby the partnership is based on referrals.

Recommendations

thumbup"Data Technics IT have delivered a superb corporate website for our global business... Working with Data Technics has been a real eye opener as they deliver what they promise."
Garry Court Systematic PLC