By using the Cloud Host Shop services, you acknowledge that you have read our set of legal documents and agree to be bound by the terms and conditions contained herein as well as all acceptable use policies incorporated by reference
An Acceptable Use Policy (AUP) is a set of rules and
conditions compiled by a network, system or a website owner. These rules explicitly define and
restrict the ways in which the respective network, system or website may be used.
AUP of the Service Provider
aims to clearly outline the purposes for which our customers CANNOT utilize our hosting services and position data on our network servers.Any customer in violation of our system or network security is subject to criminal and civil liability, as well as immediate account termination. Examples include, but are not limited to the following:
the Service Provider will immediately and resolutely react to any attempt at misuse of an Internet account or computer, or any attempt to gain access to an internet account or computer by a Service Provider's customer unauthorized by the account/computer owner. Such attempts include, but are not limited to the following: 'Internet scamming’ (tricking other people into releasing their passwords, etc.), password robbery, security hole scanning, running proxy - proxy lists and any kind of proxy scripts (including, but not limited to php proxy and nph proxy), introducing of any computer programs (viruses, Trojan horses, trap doors, back doors, worms, time bombs, packet bombs, cancel bots, etc.) that are intended to negatively interfere with, intercept, irreversibly damage or take hold of any system, data or personal information. It WILL NOT matter whether the attacked account or computer belongs or not to the Service Provider's services. The fraud will be subject to actions based on the very nature of the attack and those may represent a warning, an account suspension or cancellation, and/or civil or criminal legal actions.
‘Background process’ is a program that runs in the background of the operating system.
What is specific for a background process is that, once started, it runs simultaneously
with other foreground processes. This means that, the shell executing the background
operation does not wait for it to finish or terminate, as it does with foreground
processes, but is free to start executing more operations along with the background one.
Typical background processes are ircd, irc bot, bnc, and many others.
Background processes are not permitted on any of our shared hosting servers, as they
usually lead to CPU overload and can be used for malicious and/or illegal actions. As
our primary task is to provide highest quality web hosting service to all our customers,
we cannot permit any background processes to be executed and threaten the performance of
our server network. Our shared hosting system does not allow a big multitude of users to
simultaneously use the system memory and processing time of our servers.
In order to ensure higher server performance and quality of hosting service all shared
hosting plans are subject to certain resource limitations concerning, but not limited
to, server CPU usage, Memory usage, disk-space and traffic. If a hosting account exceeds
the allowed amount of system resources the account owner will be immediately notified to
take actions in order to reduce the usage. If such action is not instantly taken by the
owner the account will be suspended. If an excessive CPU usage is detected the account
owner will be suggested to place an order for a CPU usage upgrade or upgrade to a plan
which allows higher CPU usage.
If any hosting account is found to be causing degradation of the server and/or our
hosting network’s performance, regardless of the reason, the account will be subject to
suspension or immediate removal, depending on the situation. The Service Provider will
be the sole arbiter in determining whether a given account is excessively using the
server resources and/or causing a server degradation.
SPAMMING IS PROHIBITED. Users MAY NOT utilize our web hosting services to transmit, distribute or
deliver any unsolicited bulk or commercial messages over the Internet (an action known as "spam"
or "spamming").
Spamming is a violation of ethic norms and will be interpreted as an infringement. the Service
Provider will not tolerate the sending of unsolicited bulk or commercial messages through our
services, as well as through another service that is mentioning, in some way, our customer’s
domain name or implies the utilization of our network or our e-mail services for sending the
unsolicited bulk or messages.
SPAMVERTISING IS PROHIBITED. 'Spamvertizing’ refers to the practice of sending unsolicited spam
messages for the purpose of advertising a particular website.
If such e-mails are relayed through 3rd party (e-mail spoofing) and/or are promoting a domain
hosted on our servers, this will lead to immediate account suspension unless an evidence of
legitimacy for non-involvement of the domain owner in the particular illegal action is provided.
’E-mail spoofing’ is a fraudulent e-mail activity in which the sender’s (3td party) e-mail
address and other parts of the e-mail header are changed so as to appear that the e-mail has
been sent from a different source (e-mail address owner/server).
'Unsolicited message’ is a message that is sent against the privacy policy of a newsgroup, or is
sent to a recipient without their explicit permission. We, at our sole discretion, shall
determine whether any of the messages you are sending is spam or spamvertizing. For your
information, spamming generally includes, but is not limited to the following
CONTENT published or transmitted via the Service Provider’s hosting services includes website
content, email content, forum/blog postings, chat content, and/or any other type of content
hosted on our servers, published online or transmitted through our network’s services.
The user of our services is NOT permitted to post online content or have links to content that:
We reserve our right to be the sole arbiter in determining the seriousness of each infringement
and to immediately take corrective actions.
We will disable the customer's account if we deem necessary, at our sole discretion. Upon
closing of the customer’s account we will send an e-mail notification to the customer, stating
the reason for the termination and quoting our terms’ chapter that has been violated. The
customer will be given an opportunity to respond and take measures to remedy the situation
should he/she consider him/herself abused by a third party. Upon fulfilling of this obligation,
we may re-activate the customer’s account, if we find, at our own discretion, sufficient
evidence pro customer’s side.
Closed accounts due to repeated violations will not be re-activated. A backup may be requested,
however it will be subject to certain penalty fees imposed according to the breach of this AUP
terms. The final penalty fee will be determined by the type and frequency of the violations.
If you need to report a violation of this AUP agreement or believe that you or your system has been subject to attack originating from our web hosting system, please contact us immediately. Our professional team will investigate the situation and provide you with full assistance.
We reserve our right to change this AUP at any time, without prior notice. We encourage our users to periodically review this Acceptable Use Policy and our Web Hosting Terms of Service.