Usage Policy

TIME’s USAGE POLICY

This usage policy (“Policy”) sets out an acceptable level of conduct between TIME dotCom Berhad and its group of companies (“TIME”) and its customers using any of TIME’s products and/or services. This Policy shall be read together with all applicable terms and conditions to the respective product and/or service subscribed, purchased or leased by the customer (“Agreement”).

TIME reserves the right to amend or change this Policy at any time by posting a revised version of this Policy on TIME’s website (at www.time.com.my) or in locations or sites where Customers may access the Policy. From 1 November 2025, this version of the Policy shall supersede and take precedence over terms of the previous versions of the Policy. TIME encourages customers to periodically review this Policy, as customers shall be bound by the Policy with their every use of TIME’s products and/or services. Failure to comply with this Policy constitutes a material breach of the Agreement.

This Policy is intended to ensure that the products and/or services received by the majority of the customers are not negatively impacted due to extreme heavy usage and abuse by the minority of the customers. TIME shall continuously monitor the use, quality and performance of our products and/or services and may control the identified heavy usage customers.

In using TIME’s products and services, customers shall be responsible in their usage and how it affects other users, and customers shall adhere to all applicable laws, rules and regulations. Each customer must have attained 18 years of age to be a TIME customer. Sub-users of the customer under this age must obtain permission from the account holder to access and use TIME’s products and/or services. The designated account holders are fully responsible and accountable for all activities conducted under their accounts, regardless of their accounts being used by any sub-user or authorised parties.

A. Unacceptable Use

Customers and any authorised user of TIME’s products and/or services shall NOT:

  1. Use the products and/or services beyond the scope of the Agreement or any unauthorised access of TIME’s products and/or services.
  2. Use TIME products and/or services in a way that is against applicable law, including illegal activities such as gambling or piracy, or for operations as an unauthorised or illegal service provider.
  3. Use the products and/or services in any manner or form which shall discredit TIME or cause disrepute to TIME. This includes undertaking or conducting any activity which has adverse effect on TIME’s products and/or services, or to any of TIME’s customers.
  4. Resell or resupply TIME’s products and/or services without TIME’s prior written consent or commercially exploit the products and/or services.
  5. Use TIME products and/or services to run programmes or servers which provide network contention or connectivity to any third party not at the location where the connection is installed.
  6. Use any software or application for peer-to-peer or file sharing; which are used to send and receive files which may contain very large data, or which may cause network congestion or to download illegal content.
  7. Upload or send unsolicited emails or any material, receive, post, distribute, disseminate, harass, encourage the receipt of, defame, publish, download or use any material which is offensive, abusive, indecent, unlawful or menacing or a breach of the copyright, trademark, intellectual property, confidence, privacy or breach any other legal rights of any person or an entity.
  8. Promote, use, send or disseminate any email or instant message or any fictitious email or instant message to defraud or cheat any person, including phishing, spamming, mail-bombing or such other activities that promote a criminal intent/activity. Commit fraud, theft, or any criminal activity, including using the service to commit a crime under any written law.
  9. Store any materials which are fraudulent and/or improper or illegal matters on TIME’s products and/or services.
  10. Allow activities that are in breach of any other third party’s rights, including downloading, installation or distribution of pirated software or other inappropriately licensed software, deletion or any author attributions, legal notices or proprietary designations or labels in any file that is uploaded, falsification of the origin or source of any software or material.
  11. Voluntarily or without due care and attention, transmit or upload any electronic material (including, without limit, files which contain viruses, corrupted files, or any other similar software or programs) which is known or likely to cause, interrupt, damage, destroy or limit the functionality of any computer software, hardware or telecommunications equipment owned by TIME or any other internet user or person.
  12. Allow or conduct anything which may disrupt or interfere with TIME’s network or services or cause a host or the network to crash.
  13. Launch “denial or services attacks”, “mail-bomb”, “spam” or “flood” attacks against a host or network or run port-scanning software on any of TIME’s products and/or services.
  14. Make excessive use of, or place unusual burden on the network, for example by sending or receiving large volumes of email or excessively large mail attachments.
  15. Create, transmit, store or publish any virus, Trojan, corrupt programme or corrupt data.
  16. Hack TIME’s systems or any third party systems or networks, or introduce virus, malicious code to TIME’s or any third party’s systems or networks; and shall not use the service, introduce or launch any “sniffer” software to collect personal data including any financial information of third parties, or spoofing.

B. Compliance and Security

  1. Each customer is assigned a User ID and password. Upon customer commencing utilisation of TIME product and/or services, customer shall be responsible for their User ID and/or password at all times.
  2. The customer shall not disclose or share their User ID and/or password to any third party, or use the same for any purpose connected with the improper use of the network including accessing or attempting to access other parts of the services for which the customer has no access rights.
  3. The customer is accountable for taking any/all necessary steps to ensure that any third party does not obtain access to the network.
  4. In the event a customer suspects that their User ID and/or password has been compromised, they must immediately inform TIME.
  5. The security of the customers devices and equipment and physical security of any of TIME’s equipment in the customer’s premises are borne solely by the customer.
  6. TIME strongly recommends that customers protect their devices and equipment with reliable anti-virus software.

C. General terms of the Policy

The examples and restrictions described in this Policy are not exhaustive. TIME is not responsible for the content of any of the customers use of the products and/or services. The decision to view content or engage in any activity, is the customer’s. Any individual download can be traced by the customer’s IP address back to the customer’s account with TIME.

Where TIME suspects or has evidence of a breach of this Policy, TIME may take such action as it deems appropriate which may include restricting, suspending or terminating your access to TIME’s products and/or services. TIME reserves its rights pursuant to the Agreement and pursuant to applicable law, including releasing any information pursuant to any authority or copyright infringement concern or legal requirement (if required to do so). TIME may commence legal proceedings against the customer for reimbursement of all costs resulting from TIME’s investigations of the customer’s breach of this Policy.

Where any party suspects or has become aware of a violation of this Policy, kindly inform TIME immediately.