{"id":794,"date":"2024-11-09T00:38:08","date_gmt":"2024-11-09T00:38:08","guid":{"rendered":"https:\/\/hosting.digimarketingnc.com\/acceptable-use-policy\/"},"modified":"2024-11-09T00:38:26","modified_gmt":"2024-11-09T00:38:26","slug":"acceptable-use-policy","status":"publish","type":"page","link":"https:\/\/hosting.digimarketingnc.com\/es\/terms-and-conditions\/acceptable-use-policy\/","title":{"rendered":"Pol\u00edtica De Uso Aceptable"},"content":{"rendered":"
Pol\u00edtica De Uso Aceptable<\/strong><\/p>\r\n An Acceptable Use Policy (AUP) is a set of\r\nrules\r\nand conditions compiled\r\nby a network, system or a website owner. These rules explicitly\r\ndefine and restrict the ways in which the respective network, system\r\nor website may be used. <\/p>\r\n \r\nThe AUP of the Service Provider <\/b>aims to clearly outline\r\nthe\r\npurposes for which our customers CANNOT utilize our hosting services\r\nand position data on our network servers. <\/p>\r\n \r\nThis Acceptable Use Policy (AUP) is an integral part of the Web\r\nHosting Terms of Service<\/a> which each customer\r\nagrees to\r\nabide by when signing up for an account with our web hosting company.\r\nAny violation of this AUP will be\r\ndeemed a\r\nviolation of our Web Hosting Terms of Service.<\/p>\r\n \r\nWe, at our own discretion, shall determine whether an act constitutes\r\na breach of this AUP terms and misuse of our services. We reserve our\r\nright to be the sole arbiter in determining the sufficiency of the\r\npresented evidences. We will respond accordingly, and\/or immediately\r\nterminate the provision of the services, shall we receive report,\r\nand\/or have sufficient proof, of any prohibited conduct outlined in\r\nthis AUP, or any other activity threatening the security of our\r\nhosting environment and\/or our network of hosting servers. <\/p>\r\n \r\nIn order to protect our company\u2019s reputation and responsibilities,\r\nand guarantee state-of-the-art and reliable hosting services to all\r\nour customers, as well as privacy and security for all users, we \u2013\r\nthe Service Provider <\/b>- hereby outline the following AUP\r\nrules and\r\nconditions to come into force for each customer signing up for a web\r\nhosting account with our company:<\/p>\r\n 1.\r\nSystem Abuse<\/u><\/a><\/p>\r\n 2.\r\nSpam and\r\nSpamvertizing<\/u><\/a><\/p>\r\n 3.\r\nInappropriate\r\nor Unlawful Content<\/u><\/a><\/p>\r\n 4.\r\nCopyrights<\/u><\/a><\/p>\r\n 5.\r\nCorrective Actions<\/u><\/a><\/p>\r\n 6.\r\nReporting\r\nVioltaions<\/u><\/a><\/p>\r\n 7.\r\nRevisions<\/u><\/a><\/p>\r\n \r\n \r\n1. SYSTEM ABUSE<\/span><\/b><\/p>\r\n Any\r\ncustomer in violation of our system or network security is subject to\r\ncriminal and civil liability, as well as immediate account\r\ntermination. Examples include, but are not limited to the following: <\/p>\r\n Unauthorized access, use, probe, or scan of our\r\nsystem\u2019s security,\r\nauthentication measures, data or traffic. Interference with the\r\nservice to any user, host or network including, but not limited to:\r\ne-mail bombing, flooding, deliberate attempts to overload the system\r\nand broadcast attacks, forging of any TCP\/IP packet header or any\r\npart of the header information in an e-mail or newsgroup posting.<\/p>\r\n <\/li>\r\n Any\r\nattempt at\r\ndoing harm to a server or a customer of our web hosting services:<\/p>\r\n <\/li>\r\n<\/ul>\r\n the Service Provider will immediately and\r\nresolutely react to any attempt at misuse of an\r\nInternet account or computer, or any attempt to gain access to an\r\ninternet account or computer by a Service Provider's customer\r\nunauthorized by the account\/computer owner. Such attempts include,\r\nbut are not limited to the following: 'Internet scamming'\r\n(tricking other people into releasing their passwords, etc.),\r\npassword robbery, security hole scanning, running proxy - proxy lists\r\nand any kind of proxy scripts (including, but not limited to php\r\nproxy and nph proxy), introducing of any computer programs (viruses,\r\nTrojan horses, trap doors, back doors, worms, time bombs, packet\r\nbombs, <\/font>cancel\r\nbots,\r\netc.) that are\r\nintended to negatively interfere with, intercept, irreversibly damage\r\nor take hold of any system, data or personal information. It WILL NOT\r\nmatter whether the attacked account or computer belongs or not to\r\nthe Service Provider's services. The fraud will be subject to actions based\r\non the very nature of the attack and those may represent a warning,\r\nan account suspension or cancellation, and\/or civil or criminal legal\r\nactions.<\/p>\r\n Background\r\noperations\/programs on servers:<\/p>\r\n <\/li>\r\n<\/ul>\r\n \r\n\u2018Background process\u2019 is a program that runs in the background of\r\nthe operating system. What is specific for a background process is\r\nthat, once started, it runs simultaneously with other foreground\r\nprocesses. This means that, the shell executing the background\r\noperation does not wait for it to finish or terminate, as it does\r\nwith foreground processes, but is free to start executing more\r\noperations along with the background one. Typical background\r\nprocesses are ircd, irc bot, bnc, and many others.<\/p>\r\n \r\nBackground processes are not permitted on any of our shared hosting\r\nservers, as they usually lead to CPU overload and can be used for\r\nmalicious and\/or illegal actions. As our primary task is to provide\r\nhighest quality web hosting service to all our customers, we cannot\r\npermit any background processes to be executed and threaten the\r\nperformance of our server network. Our shared hosting system does not\r\nallow a big multitude of users to simultaneously use the system\r\nmemory and processing time of our servers.<\/p>\r\n Excessive use of system resources:<\/p>\r\n <\/li>\r\n<\/ul>\r\n In\r\norder to ensure higher server performance and quality of hosting\r\nservice all shared hosting plans are subject to certain resource\r\nlimitations concerning, but not limited to, server CPU usage, Memory\r\nusage, disk-space and traffic. If a hosting account exceeds the\r\nallowed amount of system resources the account owner will be\r\nimmediately notified to take actions in order to reduce the usage. If\r\nsuch action is not instantly taken by the owner the account will be\r\nsuspended. If an excessive CPU usage is detected the account owner\r\nwill be suggested to place an order for a CPU usage upgrade or\r\nupgrade to a plan which allows higher CPU usage. <\/p>\r\n If\r\nany hosting account is found to be causing degradation of the server\r\nand\/or our hosting network\u2019s performance, regardless of the reason,\r\nthe account will be subject to suspension or immediate removal,\r\ndepending on the situation. The Service Provider will be the sole arbiter\r\nin determining whether a given account is excessively using the\r\nserver resources and\/or causing a server degradation. <\/p>\r\n \r\n \r\n2. SPAM\r\nAND SPAMVERTIZING<\/span><\/b> <\/p>\r\n \r\nSPAMMING IS PROHIBITED. Users MAY NOT\r\nutilize<\/span>\r\nour web hosting s<\/span>ervices\r\nto transmit,\r\ndistribute or deliver any unsolicited bulk or commercial messages\r\nover the Internet (an action known as \"spam\" or\r\n\"spamming\"). <\/p>\r\n \r\nSpamming is a<\/span> violation<\/span>\r\nof ethic norms and <\/span>will\r\nbe interpreted as\r\nan infringement. <\/span>the Service Provider\r\nw<\/span>ill\r\nnot tolerate the sending of unsolicited bulk or commercial messages\r\nthrough our services, as well as through another service that is\r\nmentioning, in some way, our customer\u2019s domain name or implies the\r\nutilization of our network or our e-mail services for sending the\r\nunsolicited bulk or messages. <\/p>\r\n \r\nSPAMVERTISING IS PROHIBITED. 'Spamvertizing\u2019 refers to the\r\npractice of sending unsolicited spam messages for the purpose of\r\nadvertising a particular website. <\/p>\r\n If\r\nsuch e-mails are relayed through 3rd<\/sup> party\r\n(e-mail\r\nspoofing) and\/or are promoting a domain hosted on our servers, this\r\nwill lead to immediate account suspension unless an evidence of\r\nlegitimacy for non-involvement of the domain owner in the particular\r\nillegal action is provided. <\/p>\r\n \u2019E-mail\r\nspoofing\u2019\r\nis a fraudulent e-mail activity in which the sender\u2019s (3td party)\r\ne-mail address and other parts of the e-mail header are changed so as\r\nto appear that the e-mail has been sent from a different source\r\n(e-mail address owner\/server). <\/p>\r\n \r\n'Unsolicited message\u2019 is a message that is sent against the\r\nprivacy policy of a newsgroup, or is sent to a recipient without\r\ntheir explicit permission. We, at <\/span>our\r\nsole\r\ndiscretion, shall determine<\/span>\r\nwhether any of\r\nthe messages you are sending<\/span>\r\nis spam or\r\nspamvertizing. For your information, spamming generally includes, but\r\nis not limited to the following<\/p>\r\n Sending of unsolicited\r\nmessages in bulk, or sending of unsolicited\r\ne-mails, w<\/span>hich provoke\r\ncomplaints from\r\nrecipients;<\/p>\r\n <\/li>\r\n Sending of junk mail;<\/p>\r\n <\/li>\r\n Use of distribution lists that include people\r\nwho have not given\r\nprior explicit <\/span>permission\r\nto be involved\r\nin such a distribution process;<\/p>\r\n <\/li>\r\n Posting commercial ads to USENET newsgroups\r\nthat do not permit it;<\/p>\r\n <\/li>\r\n Posting articles containing binary encoded data\r\nto non-binary\r\nnewsgroups;<\/p>\r\n <\/li>\r\n Excessive and repeated posting of off-topic\r\nmessages to newsgroups;<\/p>\r\n <\/li>\r\n Excessive and repeated cross-posting;<\/p>\r\n <\/li>\r\n E-mail harassment of\r\nanother Internet Customer or Customers,\r\nincluding but not limited to, transmitting of any threatening,\r\nlibellous or obscene material, or material of any nature that may be\r\ndeemed offensive;<\/p>\r\n <\/li>\r\n E-mailing of\r\nage-inappropriate communications or content to anyone\r\nunder the age of 18.<\/p>\r\n <\/li>\r\n<\/ul>\r\n 3.\r\nINAPPROPRIATE\r\nOR UNLAWFUL CONTENT<\/span><\/b>\r\n<\/p>\r\n CONTENT\r\npublished or transmitted via the Service Provider\u2019s hosting services\r\nincludes website content, email content, forum\/blog postings, chat\r\ncontent, and\/or any other type of content hosted on our servers,\r\npublished online or transmitted through our network\u2019s services. <\/p>\r\n The\r\nuser of our services is NOT permitted to post online content or have\r\nlinks to content that:<\/p>\r\n is\r\ndefamatory, abusive or obscene, violates a person\u2019s\r\nreputation\/privacy, is reasonably deemed offensive by the web\r\ncommunity, is anti-religious or anti-human rights, or contains any\r\ntype of threatening or hate speech, encourages harassment or\r\nphysical harm to any group or individual, or is otherwise\r\nmalicious\/fraudulent and may result in complaints\/liabilities\/or\r\nretaliation against the Service Provider by offended viewers; <\/p>\r\n <\/li>\r\n promotes\r\nor\r\nencourages illegal activities (e.g. illegal drugs, illegal gambling,\r\narms trafficking, etc.) or violates any applicable law, statute,\r\nordinance or regulation, including but not limited to the laws and\r\nregulations governing export control, unfair competition, false\r\nadvertising, consumer protection, etc. <\/p>\r\n <\/li>\r\n represents\r\npornography \u2013 any type of pornographic\/adult material, including\r\nchild pornography, or advertisements of pornographic websites;<\/p>\r\n <\/li>\r\n represents\r\ninfringement on copyright, patents, trademarks, trade secrets, or\r\nthird party's intellectual property or proprietary rights, including\r\npirated computer programs, hacking\/phreaking software, warez or any\r\ntype of software\/content (including also ROMs, ROM Emulators, media\r\nfiles \u2013 MP3, AVI, .RM, etc., torrent files, and others) that is\r\ncopyrighted, is NOT uploaded in compliance with its license\r\nagreement or is NOT freely available for distribution.<\/p>\r\n <\/li>\r\n<\/ul>\r\n \r\n \r\n4. COPYRIGHTS<\/span><\/b><\/p>\r\n \r\nCopyrighted material must not be placed on customers' accounts\r\nwithout the explicit permission of the copyright owner or a person\r\nexplicitly authorized to give such permission by the copyright owner.\r\nUpon receipt of a claim for copyright infringement, or a notice of\r\nsuch violation, we will immediately run full investigation and, upon\r\nconfirmation, will promptly remove the infringing material from the\r\nServices. Further procedures (in accordance with our stated below\r\ncorrective measures) will be carried out if necessary. We will assume\r\nno liability to any Customer of the Services for the removal of any\r\nsuch material. <\/p>\r\n 5.\r\nCORRECTIVE\r\nACTIONS<\/span><\/b><\/p>\r\n \r\nWe reserve our right to be the sole arbiter in determining\r\nthe seriousness of each infringement <\/font>and to immediately take\r\ncorrective actions. <\/font>\r\n<\/p>\r\n We will\r\ndisable the customer's account if we deem necessary, at our sole discretion. Upon closing of the customer\u2019s\r\naccount we will send an e-mail notification to the customer, stating\r\nthe reason for the termination and quoting our terms\u2019 chapter that\r\nhas been violated. The customer will be given an opportunity to\r\nrespond and take measures to remedy the situation should he\/she\r\nconsider him\/herself abused by a third party. Upon fulfilling of this\r\nobligation, we may re-activate the customer\u2019s account, if we find,\r\nat our own discretion, sufficient evidence pro customer\u2019s side.\r\n<\/p>\r\n Closed\r\naccounts due to repeated violations will not be re-activated. A\r\nbackup may be requested, however it will be subject to certain\r\npenalty fees imposed according to the breach of this AUP terms. The\r\nfinal penalty fee will be determined by the type and frequency of the\r\nviolations.\r\n<\/p>\r\n 6.\r\nREPORTING\r\nVIOLATIONS<\/span><\/b>\r\n<\/p>\r\n If\r\nyou need to report a violation of this AUP agreement or believe that\r\nyou or your system has been subject to attack originating from our\r\nweb hosting system, please contact us immediately. Our professional\r\nteam will investigate the situation and provide you with full\r\nassistance. \r\n<\/p>\r\n <\/p>\r\n
\r\n<\/p>\r\n<\/a>\r\n
\r\n
\r\n<\/p>\r\n\r\n
\r\n
\r\n
\r\n<\/p>\r\n
\r\nback to top<\/a>\r\n
\r\n<\/p>\r\n\r\n
\r\nback to top<\/a>\r\n
\r\n\r\n
\r\nback to top<\/a>\r\n
\r\n<\/p>\r\n
\r\n<\/p>\r\nback to top<\/a>\r\n
\r\n<\/p>\r\n
\r\n<\/p>\r\n
\r\nback to top<\/a>\r\n<\/p>\r\n
\r\n<\/p>\r\n