Acceptable Use Policy

blog background image

The Network SLA

TOSHOST LTD guarantees network uptime to be 100%. This guarantee assures that all major routing devices within our network are reachable from the global internet 100% of the time. 
5% of the total amount of the next invoice, per 30 minutes of unavailability, is limited to 100% of the total invoice amount. 

Acceptable Use Policy

This Acceptable Use Policy applies to all persons and entities (collectively, "customers") using the products and services of TOSHOST, LTD, ("TOSHOST") including Internet service. The policy is designed to protect the security, integrity, reliability, and privacy of both the TOSHOST network and the products and services TOSHOST offers to its customers. TOSHOST reserves the right to modify this policy at any time, effective immediately upon posting of the modification. Your use of TOSHOST's products and services constitutes your acceptance of the Acceptable Use Policy in effect at the time of your use. You are solely responsible for any and all acts and omissions that occur during or relating to your use of the service, and you agree not to engage in any unacceptable use of the service.

What uses are Prohibited?

Unacceptable use includes, but is not limited to, any of the following:

1. Posting, transmission, re-transmission, or storing material on or through any of TOSHOST's products or services, if in the sole judgment of TOSHOST such posting, transmission, re-transmission or storage is: (a) in violation of any local, state, federal, or non-United States law or regulation (including rights protected by copyright, trade secret, patent or other intellectual property or similar laws or regulations); (b) threatening or abusive; (c) obscene; (d) indecent; or (e) defamatory. Each customer shall be responsible for determining what laws or regulations are applicable to his or her use of the products and services.

2. Installation or distribution of "pirated" or other software products that are not appropriately licensed for use by customers. Warez and any related activities (including hyperlinks on pages hosted on our network). Use of BitTorrent to distribute illegal and/or copyrighted material without the express written consent of the copyright holder.

3. Resale of TOSHOST’s products and services without the express prior written consent of TOSHOST (unless you are an authorized wholesaler).

4. Deceptive marketing practices.

5. Actions that restrict or inhibit anyone - whether a customer of TOSHOST or otherwise - in his or her use or enjoyment of TOSHOST's products and services or that generate excessive network traffic through the use of automated or manual routines that are not related to ordinary personal or business use of Internet services.

6. Introduction of malicious programs into the TOSHOST network or servers or other products and services of TOSHOST (e.g., viruses, trojan horses and worms).

7. Causing or attempting to cause security breaches or disruptions of Internet communications. Examples of security breaches include but are not limited to accessing data of which the customer is not an intended recipient, or logging into a server or account that the customer is not expressly authorized to access. Examples of disruptions include but are not limited to port scans, flood pings, packet spoofing and forged routing information.

8. Executing any form of network monitoring that will intercept data not intended for the customer.

9. Circumventing user authentication or security of any host, network or account.

10. Interfering with or denying service to any user other than the customer's host (e.g., denial of service attack).

11. Using any program/script/command, or sending messages of any kind, designed to interfere with, or to disable a user's terminal session.

12. Failing to comply with TOSHOST's procedures relating to the activities of customers on TOSHOST-owned facilities.

13. Furnishing false or incorrect data on the order form contract (electronic or paper) including fraudulent use of credit card numbers or attempting to circumvent or alter the processes or procedures to measure time, bandwidth utilization or other methods to document "use" of TOSHOST's products or services.

14. Sending unsolicited mail messages, including the sending of "bulk mail", "junk mail" or other advertising material to individuals who did not specifically request such material, who were not previous customers of the customer or with whom the customer does not have an existing business relationship (e.g., E-mail "spam"); or distributing, advertising or promoting software or services that have the primary purpose of encouraging or facilitating unsolicited commercial E-mail or spam. Non-compliance with all relevant legislation and regulations regarding bulk and commercial e-mail, including but not limited to the Controlling the Assault of Non-Solicited Pornography And Marketing Act of 2003.

15. Harassment, whether through language, frequency, or size of messages.

16. Unauthorized use or forging of mail header information.

17. Solicitations of mail or any other E-mail address other than that of the poster's account or service, with the intent to harass or collect replies.

18. Creating or forwarding "chain letters" or other "pyramid schemes" of any type.

19. Use of unsolicited E-mail originating from within the TOSHOST network or networks of other Internet Service Providers on behalf of or to advertise any service hosted by TOSHOST or connected via the TOSHOST network.

20. Exporting, re-exporting, or permitting downloads of any content in violation of the export or import laws of the United States or without all required approvals, licenses and exemptions.

21. Using a shared hosting or reseller hosting accounts for file hosting, data backup storage, or other related services without prior express written approval from TOSHOST.

22. Any activity related to TOR or any other anonymity networks and/or services.

23. Any activity related to virtual currency mining (Bitcoin, etc.) on a shared hosting, reseller hosting, or virtual private server account.

24. Use of Microsoft software licenses that are not obtained through TOSHOST's Microsoft Service Provider License Agreement.

25. Use of any type of virtualization or container (such as qemu or OpenVZ) inside of a Virtual Private Server.

26. Operation of a CDN from a dedicated server without prior approval. Shared resource CDNs (including, but not limited to LIULIANGKUANG and JingLing) are strictly prohibited.

27. Any activity related to HitLeap is prohibited on a shared hosting, reseller hosting, or virtual private server account.

No failure or delay in exercising or enforcing this policy shall constitute a waiver of the policy or of any other right or remedy. If any provision of this policy is deemed unenforceable due to law or change in law, such a provision shall be and the balance of the policy shall remain in effect.

Abusable Resources

Upon notification of the existence of an abusable resource (e.g., open news server, unsecured mail relay, or smurf amplifier), the customer shall immediately take all necessary steps to avoid any further abuse of such resource. Any abuse of an open resource that occurs after the customer has received such notification shall be considered a violation of this policy and enforced as such.

Enforcement

TOSHOST may immediately suspend and/or terminate the customer's service for violation of any provision of this policy upon verbal or written notice, which notice may be provided by voicemail or E-mail. Prior to suspension or termination, TOSHOST may attempt to work with the Customer to cure violations of this policy and ensure that there is no re-occurrence; however, TOSHOST reserves the right to suspend or terminate based on a first offense. No refunds or credits will be granted for services that are suspended and/or terminated for a violation of this policy.
 
 

Related Blog Post

Create, collaborate, and turn your ideas into incredible products with the definitive platform for digital design.

How to create cPanel backup from command line

12 December 2022

How to create cPanel backup from command line

This article explains how you can create cPanel backup from the command line, using your own username and password.

Read More
How to install Webuzo Panel on linux Server

12 December 2022

How to install Webuzo Panel on linux Server

Webuzo is a popular alternative to cPanel, a widely used web hosting control panel developed by cPanel, Inc.

Read More
What are NFT Domains?

02 February 2022

What are NFT Domains?

NFT domains are new web extensions that are deployed using ERC 721 and Polygon Network, except .zil which uses Zilliqa.

Read More
How to Delete a MySQL® Database

01 January 2022

How to Delete a MySQL® Database

This document describes how to manually delete a MySQL® database from a cPanel & WHM server. This is useful if, for exa

Read More
How to get Transfer Authorization Code from GoDaddy

11 November 2021

How to get Transfer Authorization Code from GoDaddy

To transfer your domain with us then must need EPP Code.

Read More

Got a question!

Contact us at