Acceptable Use Policy

Acceptable Use Policy
1. General
Each customer who operates a server from is solely responsible for all stored and transmitted data of the server and all actions which emanate from the server.
The customer must take adequate measures which comply with the current state of technology to ensure that any misuse of the server is effectively prevented. reserves the right to block any server at any time which causes a loss of network integrity or affects the network operation of other servers without prior warning including those actions which are not specifically referred to below. further reserves the right to remove a server from the network if it is deemed to be causing excessive load or traffic over an unacceptably long period.
If a customer does not respond and/or take the appropriate action to an abuse notification with in adequate time frame, may terminate the server without further notice.
A refund is not possible.

2. Prohibited Uses of System and Services
- IP Spoofing
IP spoofing refers to the falsification of the IP sender address for outgoing IP packages.
- MAC Spoofing and MAC Flooding
MAC spoofing refers to the falsification of a sender address of an Ethernet framework.
MAC flooding refers to the sending of Ethernet frameworks with a number of different sender addresses for the purpose of flooding MAC databanks of switches thus causing a malfunctioning of these switches.
- ARP Spoofing and ARP Flooding
ARP spoofing refers to the falsification of an ARP entry on a router by unsolicited ARP replies.
ARP flooding refers to the mass transmission of ARP replies for the purpose of flooding the ARP databank of a router and thus causing a malfunctioning of this switch.
- Transmission of Switch Protocol Frameworks
The transmission of switch protocol frameworks, in particular spanning tree protocol frameworks (BPDUs)
- Transmission of Spam and Malware
Spam refers to the mass transmission of unsolicited or unrequested email advertisements.
Malware refers to any type of injurious software e.g. viruses, worms, trojans, backdoors, spyware or illegal dialers.
- Phishing
Phishing refers to illegal attempts to release access data for security areas to a wide distribution of users. Well known websites are often imitated so as to appear deceptively genuine for this purpose. The websites are reached under domain names which are similar to the original domain names. Users are invited by misleading emails to enter their access data on such hoax websites.
- Denial of Service Attacks
Denial of Service attacks (DoS) refers to an attack on a server with the purpose of disabling one or more of its services.
- Scanning of External Computers
The Scanning of computers refers to the systematic searching for services on this computer with the purpose of detecting weaknesses in the services in order to utilize them for hacking at a later time.
- Non Authorized Access or Attempts of Hacking
- Offering of Unlawful Information
The offering of unlawful or abusive, child pornographic, racist, politically radical, defamatory or offensive information as well as information which contravenes the rights of third parties in whatever form.

Was this answer helpful?

 Print this Article

Also Read

Term Of Service

Terms of Service (ToS) All provisions of this contract are subject to the Terms of Service...

Powered by WHMCompleteSolution