This AUP governs the use of Host-1’s web hosting service. Violation of this AUP may result in suspension or termination of your service. In the event of a dispute between you and Host-1 regarding the interpretation of this AUP, Host-1’s interpretation, in its reasonable commercial judgment, shall govern.
The following is the entire Acceptable User Policy (“AUP”) agreement between Host-1 and the personal or corporate account holder. Host-1 provides World Wide Web Hosting, web design and script installation. Host-1 has certain legal and ethical responsibilities consisting with the use of its servers and equipment involved in these services. Host-1’s general policy is to act as a provider of Internet presence. Host-1 reserves the rights to suspend or cancel a customer’s access to any or all services provided by Host-1 when we decide that the account has been inappropriately used.
What is Appropriate Usage?
Host-1 is a shared web hosting service, which means that a number of customers’ web sites and other email or storage services are hosted from the same server. Host-1 uses abuse controls to help ensure that use of our services does not adversely affect the performance of our systems or other customers’ sites. It is not appropriate to use an account primarily as an online storage space or for archiving electronic files.
If you use your services consistently with the terms of Service and these paragraphs, your site can grow as large as necessary to meet your small business needs, but to ensure a great experience for all, we will place some constraints on how fast you can grow. The vast majority of our customers’ sites grow at rates well within our rules, but our abuse controls may cause a brief delay while we evaluate if expansion is appropriate for your particular plan.
Host-1 Customers may not initiate the following (below). If any customer does, Host-1 may terminate the account with no refund. Depending on the situation notice may not be given before suspension.
a) Use 25% or more of system CPU resources for longer then 90 seconds or 1% of the servers CPU resources for longer than 5 minutes. There are numerous activities that could cause such problems; these include: CGI scripts, FTP, PHP, HTTP, etc.
b) Use of any kind of distributed computing software, including but not limited to SETI@home, Node Zero and Folding@home.
c) Run any type of interactive real-time chat applications that require server resources. Remotely-hosted services are fully allowed.
d) Run stand-alone, unattended server-side processes at any point in time on the server. This includes any and all daemons.
e) Run any software that interfaces with an IRC (Internet Relay Chat) network.
f) Run any file sharing, bittorrent or other P2P network services, client or server software.
g) Run any gaming servers such as counter-strike, half-life, battlefield 1492 etc
In most cases, if you use our services consistently with our terms of Service, visitors to your web site will be able to download and view as much content from your site as they like. However, in certain circumstances, our server processing power, server memory, or abuse controls could limit downloads from your site. You will always be able to use as much bandwidth as your plan allows.
You do not have to worry about hitting a storage limit if you use our services consistently with the terms of Service and our acceptable usage policy. Host-1 will increase your space along with your appropriate small business needs, but our abuse controls may impact the rate of growth or your folder size, and there may be a short delay while we assess your usage. In some cases, creating additional folders or subfolders will help ensure that the system works well for everyone. You will always be allowed to use as much disk space as is contained in your purchased plan.
You may not publish or transmit via Host-1’s service any content that Host-1 reasonably believes:
a) constitutes child pornography;
b) constitutes pornography of any other sort;
c) is excessively violent, incites violence, threatens violence, or contains harassing content or hate speech;
d) is unfair or deceptive under the consumer protection laws of any jurisdiction, including chain letters and pyramid schemes;
e) is defamatory or violates a person’s privacy;
f) creates a risk to a person’s safety or health, creates a risk to public safety or health, compromises national security, or interferes with a investigation by law enforcement;
g) improperly exposes trade secrets or other confidential or proprietary information of another person;
h) is intended to assist others in defeating technical copyright protections;
i) clearly infringes on another person’s trade or service mark, patent, or other property right;
j) promotes illegal drugs, violates export control laws, relates to illegal gambling, or illegal arms trafficking;
k) is otherwise illegal or solicits conduct that is illegal under laws applicable to you or to Host-1;
l) is otherwise malicious, fraudulent, or may result in retaliation against Host-1 by offended viewers;
Host-1 does not accept material such as:
a) Proxy, Warez, Escrow, High Yield Investment Programs (HYIP), illegal Gambling and Lottery sites.
b )Content “published or transmitted” via Host-1’s service includes Web content, Email, bulletin board postings, chat, and any other type of posting or transmission that relies on any Internet service provided by Host-1.
* Host-1 can terminate services for any of the above reasons and it’s at Host-1’s sole discretion to issue a refund or not.
You must take reasonable security precautions. You must protect the confidentiality of your password, and you should change your password periodically.
Bulk Comercial Email
Bulk commercial email, mailing lists and Email reflectors are allowed on Host-1’s servers. We do however allow a maximum of 500 emails per hour per account. For any emails sent from your Host-1 account you must adhere to the following rules:
a) Your intended recipients have given their consent to receive e-mail via some affirmative means, such as an opt-in procedure;
b) Your procedures for soliciting consent include reasonable means to ensure that the person giving consent is the owner of the e-mail address for which the consent is given;
c) You may not obscure the source of your Email in any manner.
d) You otherwise comply with the CAN SPAM Act and other applicable law.
These policies apply to messages sent using your Host-1 service, or to messages sent from any network by you or any person on your behalf that directly or indirectly refer the recipient to a site hosted via your Host-1 service. In addition, you may not use a third party Email service that does not practice similar procedures for all its customers.
You may not send any unsolicited e-mail, either in bulk or individually, to any person who has indicated that they do not wish to receive it. You must comply with the rules of any other network you access or participate in using your Host-1’s services.
Material Protected By Copyright
You may not publish, distribute, or otherwise copy in any manner any music, software, art, or other work protected by copyright law unless:
a) you have been expressly authorized by the owner of the copyright for the work to copy the work in that manner.
b) you are otherwise permitted by established United States copyright law to copy the work in that manner.
Host-1 will terminate the service of repeat copyright infringers.
You must have valid and current information on file with your domain name registrar for any domain hosted on the Host-1 network.
Host-1 is under no obligation, and does not by this AUP undertake an obligation, to monitor or police our customers’ activities and disclaims any responsibility for any misuse of the Host-1 network.
You may not engage in illegal, abusive, or irresponsible behavior, including:
a) Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures (including those belonging to Host-1 and its customers) without express authorization of the owner of the system or network;
b) monitoring data or traffic on any network or system without the authorization of the owner of the system or network;
c) Interference with service to any user, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks;
d) Use of an Internet account or computer without the owner’s authorisation, including, but not limited to Internet scanning (tricking other people into releasing their passwords), password robbery, security hole scanning, and port scanning;
e) Forging of any TCP-IP packet header or any part of the header information in an Email or a newsgroup posting; or
f) Any conduct that is likely to result in retaliation against the Host-1 network.
g) Use of Host-1’s network in a way that unreasonably interferes with Host-1’s other customers use of the network.
Newsgroup, Chat Forums, Other Networks
You must comply with the rules and conventions for postings to any bulletin board, chat group or other forum in which you participate, such as IRC and USENET groups including their rules for content and commercial postings. These groups usually prohibit the posting of off-topic commercial messages, or mass postings to multiple forums.