Acceptable Use Policy

This document outlines the standards for using our network, systems, and website. It specifies permissible and prohibited activities related to our services.

The purpose of these guidelines is to clearly define activities that are not permitted when using our hosting services or placing data on our network infrastructure.

These Guidelines for Acceptable Use are a fundamental component of our Web Hosting Terms of Service, which every client agrees to by registering an account with our web hosting company. Any breach of these guidelines will be considered a violation of our Web Hosting Terms of Service.

We will, at our sole judgment, determine if any action constitutes a breach of these guidelines and a misuse of our services. We hold the exclusive right to decide on the adequacy of any evidence presented. We will act appropriately, which may include the immediate cessation of services, if we receive a report or possess sufficient evidence of any prohibited conduct detailed herein, or any other activity that endangers the security of our hosting environment or our server network.

To safeguard our company's reputation and responsibilities, ensure top-tier and dependable hosting services for all our clients, and maintain privacy and security for all users, we – the Service Provider – establish the following rules and conditions, effective for every client who signs up for a web hosting account with us:

  1. System Integrity and Security

  2. Anti-Spam and Anti-Spamvertising

  3. Prohibited and Unlawful Content

  4. Intellectual Property Rights

  5. Enforcement Measures

  6. Notification of Infractions

  7. Policy Updates


1. SYSTEM INTEGRITY AND SECURITY

Any client found to be compromising our system or network security will face potential criminal and civil charges, along with immediate account termination. Prohibited actions include, but are not limited to:

  • Unauthorized attempts to access, use, probe, or scan our system’s security features, authentication protocols, data, or network traffic.

  • Disrupting service to any user, host, or network. This includes, but is not limited to: email bombing, flooding, intentional system overloads, broadcast attacks, and forging TCP/IP packet headers or any part of header information in emails or newsgroup posts.

Harmful Actions Towards Servers or Clients:

We will react swiftly and decisively to any attempt to misuse an internet account or computer, or any effort by one of our clients to gain unauthorized access to an account or computer. Such actions encompass, but are not limited to: 'internet scamming' (deceiving others into revealing passwords, etc.), password theft, security vulnerability scanning, operating proxies (including proxy lists and scripts like PHP proxy and NPH proxy), and introducing malicious software (viruses, Trojan horses, trap doors, back doors, worms, time bombs, packet bombs, cancel bots, etc.) designed to negatively interfere with, intercept, permanently damage, or seize control of any system, data, or personal information. It is irrelevant whether the targeted account or computer is part of our services. The response to such fraudulent activity will depend on the nature of the attack and may range from a warning to account suspension or termination, and/or civil or criminal legal proceedings.

Background Operations/Programs on Servers:

A ‘background process’ is a program that operates behind the scenes of the operating system, running concurrently with foreground processes without requiring the shell to wait for its completion. Common examples include IRC daemons (ircd), IRC bots, and BNCs.

Background processes are not permitted on our shared hosting servers because they often lead to CPU overload and can be exploited for malicious or illegal activities. Our primary commitment is to provide high-quality web hosting to all clients, and we cannot allow any background processes that threaten the performance of our server network. Our shared hosting environment is not designed for a large number of users to simultaneously consume extensive system memory and processing time.

Excessive Use of System Resources:

To maintain optimal server performance and service quality, all shared hosting plans are subject to limitations on resources, including but not limited to server CPU usage, memory usage, disk space, and traffic. If a hosting account surpasses its allocated system resources, the account owner will be promptly notified to reduce usage. Failure to take immediate corrective action will result in account suspension. If excessive CPU usage is detected, the account owner will be advised to purchase a CPU usage upgrade or switch to a plan that accommodates higher CPU usage.

If any hosting account is found to degrade server or network performance, regardless of the cause, it will be subject to suspension or immediate removal, depending on the circumstances. We will be the sole judge in determining if an account is excessively using server resources or causing server degradation.


2. ANTI-SPAM AND ANTI-SPAMVERTISING

SPAMMING IS STRICTLY FORBIDDEN. Users are prohibited from using our web hosting services to send, distribute, or deliver any unsolicited bulk or commercial messages over the internet (commonly known as "spam" or "spamming").

Spamming is an ethical violation and will be treated as an infringement. We will not tolerate the transmission of unsolicited bulk or commercial messages via our services, or through any other service that references a client's domain name hosted with us or implies the use of our network or email services for such unsolicited communications.

SPAMVERTISING IS STRICTLY FORBIDDEN. 'Spamvertizing' is the practice of sending unsolicited spam messages to advertise a specific website.

If such emails are relayed through a third party (email spoofing) and promote a domain hosted on our servers, it will result in immediate account suspension unless the domain owner provides legitimate evidence of non-involvement in the illegal activity.

'Email spoofing' is a fraudulent email practice where the sender's email address and other header information are altered to make the email appear as if it originated from a different source.

An 'unsolicited message' is one sent against the policy of a newsgroup or to a recipient without their explicit prior consent. We, at our sole discretion, will determine if any messages you send constitute spam or spamvertizing. For clarity, spamming generally includes, but is not limited to:

  • Sending unsolicited messages in bulk, or sending unsolicited emails that elicit complaints from recipients.

  • Sending junk mail.

  • Using distribution lists that include individuals who have not given explicit prior permission to be included.

  • Posting commercial advertisements to USENET newsgroups that do not permit them.

  • Posting articles containing binary encoded data to non-binary newsgroups.

  • Excessive and repeated posting of off-topic messages to newsgroups.

  • Excessive and repeated cross-posting.

  • Email harassment of other internet users, including but not limited to, transmitting threatening, libelous, or obscene material, or any material deemed offensive.

  • Emailing age-inappropriate communications or content to anyone under 18.


3. PROHIBITED AND UNLAWFUL CONTENT

Content published or transmitted via our hosting services includes website content, email content, forum/blog posts, chat content, and any other type of material hosted on our servers, published online, or transmitted through our network services.

Users of our services are NOT PERMITTED to post online content or link to content that:

  • Is defamatory, abusive, or obscene; violates an individual's reputation or privacy; is reasonably considered offensive by the web community; is anti-religious or anti-human rights; contains any form of threatening or hate speech; encourages harassment or physical harm to any group or individual; or is otherwise malicious or fraudulent and could lead to complaints, liabilities, or retaliation against us by offended parties.

  • Promotes or encourages illegal activities (e.g., illicit drugs, illegal gambling, arms trafficking, etc.) or violates any applicable law, statute, ordinance, or regulation, including but not limited to laws and regulations concerning export control, unfair competition, false advertising, and consumer protection.

  • Constitutes pornography – any type of pornographic or adult material, including child pornography, or advertisements for pornographic websites.

  • Infringes on copyrights, patents, trademarks, trade secrets, or a third party's intellectual property or proprietary rights. This includes pirated computer programs, hacking/phreaking software, "warez," or any type of software or content (including ROMs, ROM emulators, media files like MP3, AVI, .RM, etc., torrent files, and others) that is copyrighted and is not uploaded in compliance with its license agreement or is not freely available for distribution.


4. INTELLECTUAL PROPERTY RIGHTS

Copyrighted material must not be placed on client accounts without the explicit permission of the copyright owner or an individual explicitly authorized by the copyright owner to grant such permission. Upon receiving a claim of copyright infringement or a notice of such a violation, we will immediately conduct a full investigation and, upon confirmation, will promptly remove the infringing material from our services. Further actions (as outlined in our corrective measures below) will be taken if necessary. We assume no liability to any client for the removal of any such material.


5. ENFORCEMENT MEASURES

We reserve the exclusive right to determine the severity of each infringement and to take immediate corrective action.

We will disable a client's account if we deem it necessary, at our sole discretion. Upon account closure, we will send an email notification to the client, stating the reason for termination and referencing the section of our terms that has been violated. The client will be given an opportunity to respond and take measures to rectify the situation if they believe they have been wrongly implicated by a third party. If this obligation is met, we may reactivate the client's account if we find, at our sole discretion, sufficient evidence supporting the client's position.

Accounts closed due to repeated violations will not be reactivated. A backup may be requested; however, it will be subject to penalty fees imposed according to the breach of these guidelines. The final penalty fee will be determined by the type and frequency of the violations.


6. NOTIFICATION OF INFRACTIONS

If you need to report a violation of these guidelines or believe that you or your system has been subjected to an attack originating from our web hosting system, please contact us without delay. Our professional team will investigate the situation and provide you with full assistance.


7. POLICY UPDATES

We reserve the right to modify these Guidelines for Acceptable Use at any time, without prior notice. We encourage our users to periodically review these guidelines and our Web Hosting Terms of Service.

tweb.host Reliable & Fast Web Hosting

Powering your online presence with reliable, high-performance hosting solutions. We offer a range of services from shared hosting to robust VPS, backed by cutting-edge technology and 24/7 expert support. Experience blazing-fast speeds, 99.9% uptime, and a commitment to your success. Choose us for a seamless and secure hosting journey. Your website deserves the best foundation!

centos
cpanel
hepsia
kvm
openvz
ubuntu
centos