These rules explicitly define and restrict the ways in which the respective network, system or website may be used.This Acceptable Use Policy is an integral part of the Web Hosting Terms of Service which each customer agrees to abide by when signing up for an account with our web hosting company.
Any violation of this AUP will be deemed a violation of our Web Hosting Terms of Service.
We, at our own discretion, shall determine whether an act constitutes a breach of this AUP terms and misuse of our services.
We reserve our right to be the sole arbiter in determining the sufficiency of the presented evidences.
We will respond accordingly, and/or immediately terminate the provision of the services, shall we receive report, and/or have sufficient proof, of any prohibited conduct outlined in this AUP, or any other activity threatening the security of our hosting environment and/or our network of hosting servers.
In order to protect our company’s reputation and responsibilities, and guarantee state-of-the-art and reliable hosting services to all our customers, as well as privacy and security for all users, we hereby outline the following rules and conditions to come into force for each customer signing up for a web hosting account with our company:
Any customer in violation of our system or network security is subject to criminal and civil liability, as well as immediate account termination.
Examples include, but are not limited to the following: Unauthorized access, use, probe, or scan of our system’s security, authentication measures, data or traffic.
Interference with the service to any user, host or network including, but not limited to: e-mail bombing, flooding, deliberate attempts to overload the system and broadcast attacks, forging of any TCP/IP packet header or any part of the header information in an e-mail or newsgroup posting.
Any attempt at doing harm to a server or a customer of our web hosting services: jawahost will immediately and resolutely react to any attempt at misuse of an Internet account or computer, or any attempt to gain access to an internet account or computer by a jawahost customer unauthorized by the account/computer owner.
Such attempts include, but are not limited to the following: ‘Internet scamming’ (tricking other people into releasing their passwords, etc.), password robbery, security hole scanning, running proxy – proxy lists and any kind of proxy scripts (including, but not limited to php proxy and nph proxy),introducing of any computer programs (viruses, Trojan horses, trap doors, back doors, worms, time bombs, packet bombs, cancel bots, etc.) that are intended to negatively interfere with, intercept, irreversibly damage or take hold of any system, data or personal information.
It WILL NOT matter whether the attacked account or computer belongs or not to Valicom Net Ltd services.
The fraud will be subject to actions based on the very nature of the attack and those may represent a warning, an account suspension or cancellation, and/or civil or criminal legal actions.
‘Background process’ is a program that runs in the background of the operating system. What is specific for a background process is that, once started, it runs simultaneously with other foreground processes. This means that, the shell executing the background operation does not wait for it to finish or terminate, as it does with foreground processes, but is free to start executing more operations along with the background one.
Background processes are not permitted on any of our shared hosting servers, as they usually lead to CPU overload and can be used for malicious and/or illegal actions.
As our primary task is to provide highest quality web hosting service to all our customers, we cannot permit any background processes to be executed and threaten the performance of our server network.
Our shared hosting system does not allow a big multitude of users to simultaneously use the system memory and processing time of our servers.
‘In order to ensure higher server performance and quality of hosting service all shared hosting plans are subject to certain resource limitations concerning, but not limited to, server CPU usage, Memory usage, disk-space and traffic.
If a hosting account exceeds the allowed amount of system resources the account owner will be immediately notified to take actions in order to reduce the usage.
If such action is not instantly taken by the owner, (the owner can request our support in case the problem cannot be identified) the account will be suspended.
(If an excessive CPU usage is detected the account owner will be suggested to place an order for a CPU usage upgrade or upgrade to a plan which allows higher CPU usage.If any hosting account is found to be causing degradation of the server and/or our hosting network’s performance, regardless of the reason, the account will be subject to suspension or immediate removal, depending on the situation.
jawahost will be the sole arbiter in determining whether a given account is excessively using the server resources and/or causing a server degradation.
SPAMMING IS PROHIBITED. Users MAY NOT utilize our web hosting services to transmit, distribute or deliver any unsolicited bulk or commercial messages over the Internet (an action known as “spam” or “spamming”). Spamming is a violation of ethic norms and will be interpreted as an infringement.
jawahost will not tolerate the sending of unsolicited bulk or commercial messages through our services, as well as through another service that is mentioning, in some way, our customer’s domain name or implies the utilization of our network or our e-mail services for sending the unsolicited bulk or messages.
SPAMVERTISING IS PROHIBITED.
‘Spamvertizing’ refers to the practice of sending unsolicited spam messages for the purpose of advertising a particular website.
If such e-mails are relayed through 3rd party (e-mail spoofing) and/or are promoting a domain hosted on our servers, this will lead to immediate account suspension unless an evidence of legitimacy for non-involvement of the domain owner in the particular illegal action is provided.
’E-mail spoofing’ is a fraudulent e-mail activity in which the sender’s (3td party) e-mail address and other parts of the e-mail header are changed so as to appear that the e-mail has been sent from a different source (e-mail address owner/server).
For your information, spamming generally includes, but is not limited to the following Sending of unsolicited messages in bulk, or sending of unsolicited e-mails, which provoke complaints from recipients;
The user of our services is NOT permitted to post online content or have links to content that: is defamatory, abusive or obscene, violates a person’s reputation/privacy, is reasonably deemed offensive by the web community, is anti-religious or anti-human rights, or contains any type of threatening or hate speech, encourages harassment or physical harm to any group or individual, or is otherwise malicious/fraudulent and may result in complaints/liabilities/or retaliation against jawahost by offended viewers; promotes or encourages illegal activities (e.g. illegal drugs, illegal gambling, arms trafficking, etc.) or violates any applicable law, statute, ordinance or regulation, including but not limited to the laws and regulations governing export control, unfair competition, false advertising, consumer protection, etc.
represents pornography – any type of pornographic/adult material, including child pornography, or advertisements of pornographic websites; represents infringement on copyright, patents, trademarks, trade secrets, or third party’s intellectual property or proprietary rights, including pirated computer programs, hacking/phreaking software, warez or any type of software/content (including also ROMs, ROM Emulators, media files – MP3, AVI, .RM, etc., torrent files, and others) that is copyrighted, is NOT uploaded in compliance with its license agreement or is NOT freely available for distribution.
Copyrighted material must not be placed on customers’ accounts without the explicit permission of the copyright owner or a person explicitly authorized to give such permission by the copyright owner.
Upon receipt of a claim for copyright infringement, or a notice of such violation, we will immediately run full investigation and, upon confirmation, will promptly remove the infringing material from the Services. Further procedures (in accordance with our stated below corrective measures) will be carried out if necessary.
We will assume no liability to any Customer of the Services for the removal of any such material.
We reserve our right to change this AUP at any time, without prior notice.
We encourage our users to periodically review this Acceptable Use Policy and our Web Hosting Terms of Service..