1. Unsolicited email delivery (SPAM) limitation.
1.0. Mass mailing via e-mail or by other means of personal information exchange (including such instant messaging services as SMS, IRC, etc.) can be performed only on clear and unambiguous initiative of the recipients. Open publishing of someone’s email address or some other personal information exchange mean identifier cannot cause this address or ID to be included to any mass mailing list. Including the address, which was received by any means (via web-form, subscription bot, etc.) to the mass mailing list is possible only in case of presence of the proper technical subscription confirmation procedure, which proves that the address won’t get to the mailing list in any other way, than by the will of the address owner. Subscription confirmation procedure must exclude the possibility of the address to be added to the mass mailing list (either single or regular) on the third party initiative (i.e. people, who don’t actually own this address). The presence of the possibility for the subscriber to unsubscribe from the mail delivery without any difficulties by his will is obligatory. At the same time, the possibility to unsubscribe cannot be an excuse for including the addresses to the mass mailing list against the will of the address’ owner.
1.1. Placing any messages of advertising, commercial or agitation kind in any conference, except for the cases when such messages are clearly permitted by the rules of the conference or the placement of such messages has been coordinated with the owners and administrators of the conference in advance.
1.2. Delivery of emails and other messages, containing attached files and/or having a considerable size without preliminary approval of the recipient.
1.3. Delivery (against the direct initiative of the recipient):
a) of emails and other messages (including single ones) of advertising, commercial or agitation kind;
b) of emails and other messages, containing vulgar and offensive expressions and offers;
c) of emails and other messages with the request to resend this message to another valid user (chain letter delivery);
d) usage of impersonal (role) addresses in other way against their direct purpose, set by the address owner and/or their standards.
1.4. Placement of the materials, containing delivery offers, spam-databases selling offers or any other actions, promoting spam delivery are strictly forbidden, no matter whether this delivery is performed through our network or through external networks.
1.5. Placement of an article, containing attached files, in any conference, except for the cases when such attached files are clearly permitted by the rules of the conference or the placement of such messages has been coordinated with the owners and administrators of the conference in advance.
1.6. Delivery of information to those recipients, who have earlier expressed reluctance to receive this information specifically, information on this topic specifically of information from this sender specifically.
1.7. Usage of private or given information sources (mailboxes, email addresses, WWW pages, etc.) as contact information, while performing any of the above described actions, no matter which network point these actions have been performed from.
1.8. Activity, which promotes technical realization of spam delivery, i.e.:
- motivated scanning of information source content for the purpose of email and/or other message delivery services addresses gathering;
- spreading of software, designed for spam delivery;
- developing, updating, checking and spreading the databases, containing email and/or other message delivery services addresses (except for those cases, when the owners of these addresses, included to such a database have clearly expressed their agreement regarding their addresses’ placement in this specific database). At the same time, open publishing of any address cannot be considered as such an agreement.
2. Unauthorized access and network attacks.
Efforts, aimed at unauthorized access to network sources, performing of network attacks and phreaking (hacking, cracking, etc.) and participation in such actions is strictly prohibited, except for those cases, when the attack is performed according to clearly expressed agreement of the source’s owner or administrator. The following actions are also not permitted:
2.0. Actions, aimed at breaking the normal functioning of the network elements (computers, other hard- or software), which don’t belong to the user.
2.1. Actions, aimed at gaining unauthorized access to the network (computers, other hardware or information source), further usage of this access and destroying or modifying of software or data, which doesn’t belong to the user and without a confirmation, provided by the software or data owner or the information source administrator. Any type of access, which differs from the type, assumed by the source owner is considered as unauthorized one.
2.2. Transmission to the computers or other network hardware of useless or senseless data, which causes parasite load on these computers or hardware and also intermediate network spans in such a capacity, which exceeds the limit of minimal capacity, needed for network connectivity and separate network elements availability check.
2.3. Motivated network nodes scanning, performed for the purpose of internal network structure detection, revealing of the opened ports, etc. which exceeds the minimal limits, set for standard technical events running and is aimed at violation of points 2.0 and 2.1 of these Terms.
3. Following the terms, set by the source owner.
Each information or technical source owner of the network can set own terms for that source usage. The terms or the link, which refers to them are published on the source connection point by the owner or the administrator of that source and are obligatory for observation by each source user. The terms should be easily accessible and made with due account taken of the different level of users’ training. Terms of usage, set by the source owner shouldn’t violate the terms of other sources’ owners or lead to other sources’ abuse. The user should either accept the terms of source usage or immediately refuse from using it. In case the terms, set by the source owner contradict some of the points of present document, but any other sources are not abused, that source works according to its owner’s terms. In case the owner of several sources has clearly set the terms for some of his sources only, the other sources will work according to the terms, stated in present document.
4. Falsification.
Most of the sources of the network don’t require user identification and allow anonymous usage. However, in some cases the user is asked to provide information, which proves his/her identity and identifies the means, he/she uses in order to access the network. At the same time the user should not:
4.1. Use identification information (names, addresses, phone numbers, etc.) of a third person, except for those cases, when this person authorizes the user to use this information.
4.2. Falsify the IP address and the addresses, used by other network protocols, which take part in data transmitting within the Network.
4.3. Use non existent return addresses while sending emails and other messages.
4.4. To treat own identification information (especially passwords and other authorized access codes) carelessly, what may lead to some sources to be used by third party on behalf of this user (concealing the real action source in this way).
4.5. Register domain names closely similar to the name with the same brand and services, such as: google, facebook, etc. And do try to present your own resource of well-known services.
4.6. Use the hosting space to host viruses, scripts, etc., that infect computers or preserving (logged) user IDs and passwords without their consent.
5. Adjustment of private sources.
While working in the Internet, the user becomes its competent participant. This creates potential possibility for the third party to use these network sources, owned by that user. Due to this the user should take the appropriate measures of configuring his/her source so, that it would prevent the third party to use this source in a dishonest way, and in case of using it in such a way, let the user take prompt and efficient measures for stopping the dishonest actions. You can find the examples of potentially problem source adjustment below:
- open email retransmitters (open SMTP relays);
- public news publishing servers (conferences, groups), accessible for unauthorized users;
- means, by which the third person can conceal the connectivity source (open proxy-servers, etc.);
- public broadcasting local networks addresses, which let perform network attacks;
- delivery lists with not reliable subscription confirmation engines or which don’t let to unsubscribe;
- www-sites and other similar sources, which perform delivery to the third party per anonymous or not enough authenticated request.
6.1. 90% or more of your website’s content must be linked from HTML or similarly coded web pages. Your website consists of web pages of a standard design, essentially HTML based text and graphics. Downloadable files, media, streaming content or any file which consumes more than 500kb of space must not exceed 10% of your total used disk quota.
6.2. The website must not contain any data, related to hacking/cracking or links to it, any kind of adult content, any kind of copyright law breaking material (mp3, movies, warez, etc.).
6.3. Gambling business websites are prohibited.
6.4. Any kind of connecting private IRC services (IRC daemons, IRC bouncers, IRC proxies) to the global IRC system is prohibited.
6.5. Setup of any proxy servers and usage of any proxy technologies is prohibited.
6.6. Publishing of any online business sites, based on MLM is prohibited.
6.7. Running any bit-torrent / P2P application is prohibited.
6.8. Not allowed sites with pharmaceutical content (so-called "Pharma").
6.9. Restriction on the use of server resources:
6.9.1. Run processing scripts using 100% CPU time.
6.9.2. Run the scripts to process through cron scheduler at intervals less than 7 minutes.
6.9.3. The number of simultaneous connections on a Web server on one domain, must not exceed 100 connections per minute.
7. Data transfer policy for virtual, dedicated or co-location servers with unlimited data transfer quota.
7.1. The ratio of incoming data transfer to outgoing one should be 1:4. In case, this ratio is not kept, the used data transfer will be rated and billed in Megabytes or Gigabytes, depending on the hosting plan.
8. Refund Policy.
8.1. You may receive a refund if Your account is cancelled within the initial 30 days after sign up. If the account holder cancels after the time period specified, there will be no refund given. Refunds do NOT apply to dedicated and virtual servers, dedicated IP addresses, SSL certificates or domain registration related fees. Funds are not refundable in case of violations of the rules of the hosting (SPAM, hacking and etc.)
8.2. Request for refunds are accepted only through the official support request via e-mail or via the ticket system. Requests for refund via ICQ, Skype and phone are not accepted. The request must be sent from email address you entered during account registration. In a letter (ticket) must contain the following information:
- Passport details (full name, date and year of birth, passport number). If we doubted your information, we may ask you to send a copy of your documents.
- Username and password from the hosting panel.
- Domain name hosted with us.
- Argumentative reason why a request is made for a refund.
- Payment details (only for verification, be returned only on the details, where you came from payment).
8.3. Refunds shall be made within 7-14 working days from the date we receive your application properly decorated for a refund.
9. Privacy Policy.
9.1. This policy covers how we use your personal information. We take your privacy seriously and will take all measures to protect your personal information.
9.2. Any personal information received will only be used to fill your order. We will not sell or redistribute your information to anyone.