Acceptable Usage Policy

We do not permit the use of our services for actions or activities that may be abusive, illegal or contrary that threaten our infrastructure. We will take any actions necessary to enforce these prohibitions, including those listed under the section below. The uses that are not permitted include, but are also not limited to the following:

We prohibit all uses of our services that may appear to us at our sole discretion to be illegal under any applicable laws. This includes but is not limited to:

  • Involvement in fraudulent activities.
  • Initiatory force.
  • Misuse of our or other computer systems.
  • Other.

We prohibit uses of our services that may appear to us at our sole discretion to be offensive. This includes but is not limited to storing or transmitting any content or links to any content that which we believe to be:

  • Pornographic.
  • Excessively violent, inciting violence or threatening violence.
  • Violating the privacy of any person or group of persons.
  • Promoting or soliciting illegal activities under any applicable laws.
  • Creating a risk to safety, health or national security.

We prohibit all users of our services that appear to us at our sole discretion to be abusive or contrary to accepted Internet norms.

This includes but is not limited to:

  • Spam (Sending of unsolicited bulk/commercial email).
  • Distribution of viruses, adware or other malware.
  • Fraudulent collection of personal or financial data (phishing).
  • Interference with service to other users of computer systems or networks, including denial of service attacks.
  • Transmitting fake or misleading network traffic, including forged IP packets or email headers.
  • Any conduct likely to result in retaliation against us, including engaging in behavior that results in a denial of service attack.

We prohibit all uses of our services that appear to us at our sole discretion to threaten our infrastructure. This includes but is not limited to:

Usage, which imposes excessive load beyond that which is expected from a typical server. For example, continuous high CPU or I/O use.

  • Server configurations with inadequate security, allowing unauthorized third party access.
  • Attempts to circumvent our mechanisms for controlling, monitoring or billing usage.

You shall also ensure that the use of all our services, whether by you or by any of your users, must follow the Terms of Service. In addition, you will and must bind your users to an acceptable use policy containing all of the restrictions above. Any complaints about a client’s violation should be sent to [email protected]

Scroll to Top