Acceptable Use Policy

30th June 2021

Poa WiFi (the “Service“) is a data connectivity service provided by Poa Internet Kenya Limited (“Poa“). The Service provides data connectivity for compatible WiFi-enabled smartphones, tablets, and laptops and other devices (each a “Device”).  Devices connect via WiFi access points (“Access Points”) to access the Poa data communication network (“Poa Network” or “Network”) which provides transit of data to the Poa data centre (“Local Transit”) and then onward interconnection with other third party networks in order to access the wider Internet (“Internet Service”). Poa may also offer you an optional extension of the Service (“Premises Service”) that provides the ability to access to the Service in your home or place of business. (“Premises”) using telecommunication equipment (“Router”) installed in the Premises.

Each user of the Service or Network (each a “Customer” or “User”) is responsible for complying with Poa’s acceptable use policy, the (“Acceptable Use Policy”) when using the Service. 

The Acceptable Use Policy may be updated from time to time. Customers are bound to subsequent updates of the Acceptable Use Policy and should periodically familiarise themselves with its contents. The latest version of this Acceptable Use Policy can be found on the Web Site. 




  1. Customer acknowledges that Poa is unable to exercise control over the data passing over the Network and via the Service and the Internet, including but not limited to any websites, electronic mail transmissions, news groups or other material created or accessible over its infrastructure. Poa is not responsible for content transmitted over its infrastructure.  
  2. The Network and associated infrastructure may be used to link into other networks worldwide and the user agrees to conform to the acceptable use policies of these networks.  
  3. This policy applies to and will be enforced for intended and unintended (e.g., viruses, worms, malicious code, or otherwise unknown causes) prohibited usage. 
  4. The use of the Service and Network will be subject to the available bandwidth, data storage and other limitations of the Service and Network. 


  1. Customer may only use the Network and Service for lawful purposes. Customer must not violate any applicable laws or regulations of Kenya.  
  2. Transmission, distribution or storage of any material on or through the Network infrastructure in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property right used without proper authorisation, and material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws.  
  3. Customer will use the Network and Service in accordance with any restrictions imposed under the Kenya Information and Communication Act and any other legislation in Kenya.
  4. Violations of this Acceptable Use Policy by the Customer are prohibited, and may result in civil or criminal liability. The Poa will investigate incidents involving such violations and will involve and co-operate with law enforcement officials if a criminal violation is suspected. 


  1. To help ensure that all of Poa’s clients have fair and equal use of the Service and Network and to protect the integrity of the Network, Poa reserves the right to: 
  1. Investigate suspected violations of this Acceptable Use Policy
  2. Take action to recover costs and expenses incurred in identifying and resolving a breach of this Acceptable Use Policy, including charging Customer for administrative costs as well as for machine and human time lost due investigating and remedying any breach.
  3. Suspend the Customer’s account and withdraw the Customer’s use of the Network and Service for any Customer. 
  4. Take such action as may be necessary to protect the integrity of the Service and Network including, but not being limited to, system monitoring, as well as protocol management and shutting down of ports affected by viruses, worms or other malicious code.
  5. Implement appropriate technical mechanisms in order to prevent usage patterns that violate this Acceptable Use Policy.
  6. Share information concerning any breach with other Internet access providers, or publish the information, and/or make available the users’ details to law enforcement agencies. 
  1. Any one or more of the steps listed above, insofar as they are deemed necessary by Poa in its absolute and sole discretion, may be taken against any Customer or Customers it deems as having breached this Acceptable Use Policy.  
  2. In addition, the Poa reserves all available rights and remedies with respect to such activities at law or in equity.  


At all times Customer will follow the following rules when using the Service or Network:

  1. Maintain the confidentiality of their passwords and account information.
  2. Not attempt to gain unauthorized access to, or attempt to interfere with or compromise the normal functioning, operation, or security of any network, system, computing facility, equipment, data, or information compromising all of part of the Service or Network.
  3. Not distribute any copyrighted materials unless permission for such distribution is granted to the user by the owner of the materials.  
  4. Not attempt to gain unauthorized access to, or use, data, systems or networks, including any attempt to probe, scan or test the vulnerability of the Service or Network 
  5. Not attempt to gain unauthorized access to, or use, data, systems or networks, including any attempt to probe, scan or test the vulnerability of any third party network or system connected to the Service or Network 
  6. Not breach or attempt to breach the security or authentication measures of the Service or Network. This includes, but is not limited to, accessing data not intended for Customers, logging into or making use of the Service or Network. 
  7. Not engage in any act of a malicious nature which may reasonably result in harm or damage to another Customer’s service, equipment, or privacy. This includes Syn-flood attacks, or any attempt to overburden a recipient’s computer system by sending a high volume of spurious data with the intent to impede functionality, or totally disable recipient system(s), and any other methods of denial of service. Examples of disruptions include but are not limited to port scans, flood pings, packet spoofing and forged routing information. 
  8. Not interfere with, the Service or the Network with the intent to render said system dysfunctional including, without limitation, mail-bombing, flooding, deliberate attempts to overload a system and broadcast attacks. This includes “denial of service” (DOS) attacks against another network host or individual user.
  9. Not operate Maillist, Listserv, ‘auto-responders’, ‘cancel-bots’ or similar automated or manual routines which generate excessive amounts of net traffic, or disrupt net newsgroups or email use by others.
  10. Not attempt to intercept, redirect, or otherwise interfere with communications intended for other Customers.
  11. Not use the Service or Network to transmit excessive volumes of unsolicited commercial e-mail messages or deliberately send excessively large attachments to one recipient.
  12. Not use the Service to send unsolicited mail messages, including the sending of “junk mail” or other advertising material to individuals who did not specifically request such material (e.g., E-mail “Spam”); or distribute, advertise or promote software or services that have the primary purpose of encouraging or facilitating unsolicited commercial E-mail (e.g., email “Spam”).
  13. Not use the Service for anything other than periodic, active use of email, newsgroups, file transfers, Internet chat, messaging, browsing of the Internet, and other legitimate personal and business use. Customer may stay connected so long as they are actively using their connection for these stated purposes. Further, Customer may not use the Service on a standby or inactive basis in order to maintain a connection including using any mechanism to defeat any idle timer or system tool intended to enforce the part-time and personal nature of User’s connection, including the use of pingbots and other methods of avoiding timing disconnection.  Poa reserves the right to terminate a Customer’s connection following any extended period of inactivity.
  14. Not operate bit torrent or other peer to peer content sharing services.
  15. Install and maintain anti-virus software, anti-malware, anti-trojan software on devices accessing the Network or Service.
  16. Not use an email server to relay mail without the express permission the server’s owner.
  17. Not attempt to send e-mail messages or transmit any electronic communications using a name or address of someone other than the Customer for purposes of deception.
  18. Will only maintain mailing lists only with the permission and approval of the list members, and at the members’ sole discretion.  Should mailing lists contain invalid or undeliverable addresses or addresses of unwilling recipients those addresses must be promptly removed.  
  19. Not forward nor propagate chain letters nor malicious e-mail.  
  20. Not operate a public email relay. 
  21. Not alter, add, remove or modify a source IP address information or by using forged headers (a.k.a. “spoofing”) in an effort to deceive or mislead.
  22. Not attempt to fraudulently conceal, forge, or otherwise falsify a Customer’s identity in connection with use of the Service.
  23. Comply with the following rules regarding usenet use:
  1. Before using usenet, familiarise themselves with the contents of the following newsgroups:  news users’ questions, news announcers, news users’ answers. 
  2. Not perform excessive cross-posting (i.e., posting the same article to a large numbers of newsgroups).  
  3. Post irrelevant (off-topic) material to newsgroups (also known as USENET spam).
  4. Post binaries to a non-binary newsgroup.  
  5. The Poa reserves the right to delete and/or cancel posts which violates the above conditions. 
  1. Not use the Service or Network to transmit, distribute, retrieve, or store any information, data, or other material in violation of any applicable law or regulation (including, where applicable any tariff or treaty). This includes, without limitation, the use or transmission of any data or material protected by copyright, trademark, trade secret, patent, or other intellectual property right without proper authorization and the transmission of any material that constitutes an illegal threat, violates export control laws, or is obscene, defamatory, or otherwise unlawful.
  2. Not monitor the data or traffic of the Network or Service without express authorisation of the Poa. 
  3. Not interference with the provision of the Service or Network to another Customer, device, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks. 
  4. Forging of any TCP-IP packet header (spoofing) or any part of the header information in an email or a newsgroup posting.
  5. Not use the Service or Network to knowingly commit verbal or written threats towards another person. This may include posting or transmitting a person’s real life information (name/address/phone number) in a malicious manner.
  6. Not use the Service or Network to send threatening or harassing messages which suggest that the sender is planning to engage in some type of criminal activity including but not limited to threats to public officials, references to bombings, bank heists, and activities that threaten national security. 
  7. Not use the Service or Network to intentionally transmit files containing a computer virus or corrupted data, or post or transmit any information or software which contains a virus, cancelbot, trojan horse, worm or other harmful component.
  8. Not use any malicious software (virus, spider, trojan horse) that will distort, delete, damage, emulate, or disassemble the Service, Network or any other Poa products or services.
  9. Not use the Service or Network for the purposes of phishing, or impersonating or misrepresenting affiliation with another person or entity, causing or intending to cause embarrassment or distress to, or to threaten to invade the privacy, or collecting or harvesting any personally identifiable information, including account names. 
  10. Not use the Network or Service for
  1. copying or dealing in intellectual property without authorization, 
  2. child pornography, and/or 
  3. Any unlawful hate-speech materials. 
  4. Report any actual suspected or actual breaches of this Acceptable Use Policy to Poa at