{"id":797,"date":"2024-11-09T00:38:08","date_gmt":"2024-11-09T00:38:08","guid":{"rendered":"https:\/\/hosting.digimarketingnc.com\/semi-dedicated-servers-acceptable-use-policy\/"},"modified":"2024-11-09T00:38:26","modified_gmt":"2024-11-09T00:38:26","slug":"semi-dedicated-servers-acceptable-use-policy","status":"publish","type":"page","link":"https:\/\/hosting.digimarketingnc.com\/es\/terms-and-conditions\/semi-dedicated-servers-acceptable-use-policy\/","title":{"rendered":"Semi-Dedicated Servers Acceptable Use Policy"},"content":{"rendered":"
\r\n\t\tAn Acceptable Use Policy (AUP)<\/strong> is a set of rules and conditions systematized by a network, \r\n\t\tsystem or a website owner that define and restrict the ways in which the network, system or \r\n\t\twebsite may be utilized. \r\n\t<\/p>\r\n\t \r\n\t\tThe AUP of the Service Provider<\/strong> is aimed at explicitly outlining the purposes for which customers \r\n\t\tCANNOT use our SEMI-DEDICATED hosting services and position data on our network servers. \r\n\t<\/p>\r\n\t \r\n\t\tThis Acceptable Use Policy (AUP) is accepted as part of the Semi-Dedicated Terms of Service<\/a> \r\n\t\teach customer agrees to abide by when signing up for a Semi-Dedicated server account with our \r\n\t\thosting services. Any violation of these AUP terms will be considered as violation of our \r\n\t\tSemi-Dedicated Terms of Service.\r\n\t<\/p>\r\n\t \r\n\t\tWe - the Service Provider, shall be the final part to determine whether an act constitutes a violation \r\n\t\tof this AUP and misuse of our services. We reserve our right to respond accordingly and\/or \r\n\t\timmediately terminate the provision of the services, shall we become aware, and\/or have \r\n\t\tsufficient evidence, of any prohibited conduct outlined in this AUP, or any other action \r\n\t\tthreatening the secure environment of our Semi-Dedicated hosting customers and\/or network \r\n\t\tof servers. We shall be the sole arbiter in determining the sufficiency of the present evidences. \r\n\t<\/p>\r\n\t \r\n\t\tIn order to protect our company's reputation and responsibilities, and guarantee robust \r\n\t\tand reliable Semi-Dedicated hosting services to all our customers, as well as the privacy \r\n\t\tand security of all our individual users, we - the Service Provider - hereby state the following \r\n\t\tAUP conditions to come into force for each user signing up for a Semi-Dedicated server \r\n\t\taccount with our hosting services: \r\n\t<\/p>\r\n\r\n\t \r\n\t\t\t\tAny Semi-Dedicated hosting customer in violation of our system or network security will be \r\n\t\t\t\tsubject to criminal and civil liability, as well as immediate account termination. Examples \r\n\t\t\t\tinclude, but are not limited to the following: \r\n\t\t\t<\/p>\r\n\t\t\t \r\n\t\t\t\t\t\tUnauthorized access, use, probe, or scan of our system's security, \r\n\t\t\t\t\t\tauthentication measures, data or traffic. Interference with the service to \r\n\t\t\t\t\t\tany user, host or network including, but not limited to: e-mail bombing, \r\n\t\t\t\t\t\tflooding, deliberate attempts to overload the system and broadcast attacks, \r\n\t\t\t\t\t\tforging of any TCP\/IP packet header or any part of the header information in \r\n\t\t\t\t\t\tan e-mail or newsgroup posting.\r\n\t\t\t\t\t<\/p>\r\n\t\t\t\t<\/li>\r\n\t\t\t\t \r\n\t\t\t\t\t\tAny attempt at doing harm to a server or a customer of the Service Provider's services:\r\n\t\t\t\t\t<\/p>\r\n\t\t\t\t\t \r\n\t\t\t\t\t\t The Service Provider will immediately and resolutely react to any attempt at \r\n\t\t\t\t\t\t misuse of an Internet account or computer, or any attempt to gain access to \r\n\t\t\t\t\t\t an internet account or computer by a Service Provider Semi-Dedicated hosting customer \r\n\t\t\t\t\t\t unauthorized by the account\/computer owner. Such attempts include, but are \r\n\t\t\t\t\t\t not limited to the following: 'Internet scamming' (tricking other people into \r\n\t\t\t\t\t\t releasing their passwords, etc.), password robbery, security hole scanning, \r\n\t\t\t\t\t\t running proxy - proxy lists and any kind of proxy scripts (including, but not \r\n\t\t\t\t\t\t limited to php proxy and nph proxy), introducing of any computer programs (viruses, \r\n\t\t\t\t\t\t Trojan horses, trap doors, back doors, worms, time bombs, packet bombs, cancel bots, \r\n\t\t\t\t\t\t etc.) that are intended to negatively interfere with, intercept, irreversibly damage \r\n\t\t\t\t\t\t or take hold of any system, data or personal information. It WILL NOT matter \r\n\t\t\t\t\t\t whether the attacked account or computer belongs or not to the Service Provider's services. \r\n\t\t\t\t\t\t The fraud will be subject to actions based on the very nature of the attack \r\n\t\t\t\t\t\t and those may represent a warning, an account suspension or cancellation, \r\n\t\t\t\t\t\t and\/or civil or criminal legal actions.\r\n\t\t\t\t\t<\/p>\r\n\t\t\t\t<\/li>\r\n\t\t\t\t \r\n\t\t\t\t\t\tBackground operations\/programs on servers:\r\n\t\t\t\t\t<\/p>\r\n\t\t\t\t\t \r\n\t\t\t\t\t\t-\u0098Background process' is a program that runs in the background of the operating system. \r\n\t\t\t\t\t\tWhat is specific for a background process is that, once started, it runs simultaneously \r\n\t\t\t\t\t\twith other foreground processes. This means that, the shell executing the background operation \r\n\t\t\t\t\t\tdoes not wait for it to finish or terminate, as it does with foreground processes, \r\n\t\t\t\t\t\tbut is free to start executing more operations along with the background one. Typical \r\n\t\t\t\t\t\tbackground processes are ircd, irc bot, bnc, and many others.\r\n\t\t\t\t\t<\/p>\r\n\t\t\t\t\t \r\n\t\t\t\t\t\tBackground processes are not permitted on any of our Semi-Dedicated servers, as they \r\n\t\t\t\t\t\tusually lead to CPU overload and can be used for malicious and\/or illegal actions. As \r\n\t\t\t\t\t\tour primary task is to provide highest quality web hosting service to all our customers, \r\n\t\t\t\t\t\twe cannot permit any background processes to be executed and threaten the performance of \r\n\t\t\t\t\t\tour server network. \r\n\t\t\t\t\t<\/p>\r\n\t\t\t\t<\/li>\r\n\t\t\t\t \r\n\t\t\t\t\t\tExcessive use of system resources:\r\n\t\t\t\t\t<\/p>\r\n\t\t\t\t\t \r\n\t\t\t\t\t\tIn order to ensure higher server performance and quality of the Semi-Dedicated \r\n\t\t\t\t\t\tserver hosting service, all Semi-Dedicated server accounts are subject to certain \r\n\t\t\t\t\t\tresource limitations concerning, but not limited to, server CPU usage, database \r\n\t\t\t\t\t\tusage, etc. If a hosting account exceeds the allowed amount of system resources, \r\n\t\t\t\t\t\tthe account owner will be immediately notified to take actions in order to decrease \r\n\t\t\t\t\t\tthe usage. If such action is not instantly taken by the owner, the account will be \r\n\t\t\t\t\t\tsuspended. When an excessive CPU usage is detected the account owner may be also \r\n\t\t\t\t\t\tsuggested to place an order for a CPU upgrade or a higher-resources Semi-Dedicated, \r\n\t\t\t\t\t\tVPS or Dedicated hosting package. \r\n\t\t\t\t\t<\/p>\r\n\t\t\t\t\t \r\n\t\t\t\t\t\tIf any Semi-Dedicated server hosting account is found to be causing degradation \r\n\t\t\t\t\t\tof the server and\/or our hosting network's performance, regardless of the reason, \r\n\t\t\t\t\t\tthe account will be subject to suspension or immediate removal, depending on the \r\n\t\t\t\t\t\tsituation. The Service Provider will be the sole arbiter in determining whether a given \r\n\t\t\t\t\t\taccount is excessively using the server resources and\/or causing server degradation.\r\n\t\t\t\t\t<\/p>\r\n\t\t\t\t<\/li>\r\n\t\t\t<\/ul>\r\n\t\t<\/li>\r\n\t\t \r\n\t\t\t\tSPAMMING IS PROHIBITED. Users MAY NOT utilize our Semi-Dedicated server hosting \r\n\t\t\t\tservices to transmit, distribute or deliver any unsolicited bulk or commercial \r\n\t\t\t\tmessages over the Internet (an action known as \"spam\" or \"spamming\"). \r\n\t\t\t<\/p>\r\n\t\t\t \r\n\t\t\t\tSpamming is a violation of ethic norms and will be interpreted as an infringement. \r\n\t\t\t\tThe Service Provider will not tolerate the sending of unsolicited bulk or commercial messages \r\n\t\t\t\tthrough our Semi-Dedicated server server hosting services, as well as through another \r\n\t\t\t\tservice that is mentioning, in some way, our customer's domain name or implies the \r\n\t\t\t\tutilization of our server network or our e-mail services for sending the unsolicited \r\n\t\t\t\tbulk or messages. \r\n\t\t\t<\/p>\r\n\t\t\t \r\n\t\t\t\tSPAMVERTISING IS PROHIBITED. 'Spamvertizing' refers to the practice of sending \r\n\t\t\t\tunsolicited spam messages for the purpose of advertising a particular website. \r\n\t\t\t<\/p>\r\n\t\t\t \r\n\t\t\t\tIf such e-mails are relayed through 3rd party (e-mail spoofing) and\/or are promoting \r\n\t\t\t\ta domain hosted on our servers, this will lead to immediate account suspension unless \r\n\t\t\t\tan evidence of legitimacy for non-involvement of the domain owner in the particular \r\n\t\t\t\tillegal action is provided. \r\n\t\t\t<\/p>\r\n\t\t\t \r\n\t\t\t\t'E-mail spoofing' is a fraudulent e-mail activity in which the sender's (3td party) \r\n\t\t\t\te-mail address and other parts of the e-mail header are changed so as to appear that \r\n\t\t\t\tthe e-mail has been sent from a different source (e-mail address owner\/server). \r\n\t\t\t<\/p>\r\n\t\t\t \r\n\t\t\t\t'Unsolicited message' is a message that is sent against the privacy policy of a \r\n\t\t\t\tnewsgroup, or is sent to a recipient without their explicit permission. We, at our \r\n\t\t\t\tsole discretion, shall determine whether any of the messages you are sending is spam \r\n\t\t\t\tor spamvertizing. For your information, spamming generally includes, but is not \r\n\t\t\t\tlimited to the following\r\n\t\t\t<\/p>\r\n\t\t\t \r\n\t\t\t\tBLOCK REMOVAL: If Customer actions have caused Company mail servers or Company IP \r\n\t\t\t\taddress ranges to be placed on black hole lists and other mail filtering software \r\n\t\t\t\tsystems used by companies on the Internet, the Customer will incur a $100 charge to the \r\n\t\t\t\tCustomer's account and $100 per hour for administrative charges incurred to remove and \r\n\t\t\t\tprotect mail servers and IP ranges.\r\n\t\t\t<\/p>\r\n\t\t\t \r\n\t\t\t\tMASS MAILINGS: Sending mass unsolicited email is considered spam. Unsolicited email is \r\n\t\t\t\tdefined as email sent to a recipient who has not double-opted in to mailings from the Customer. \r\n\t\t\t\tSenders of mass mailings must maintain complete and accurate records of all opt-ins, including \r\n\t\t\t\tthe email and its headers if applicable, and provide such records to the Company upon request. \r\n\t\t\t\tIf positive and verifiable proof of opt-in cannot be provided, complaints from recipients of \r\n\t\t\t\tthe mailing are considered proof they did not subscribe and the mailing is unsolicited.\u00a0\r\n\t\t\t<\/p>\r\n\t\t\t \r\n\t\t\t\tMAILING LISTS: Company's mass mailing rules also apply to mailing lists, list servs, or mailing \r\n\t\t\t\tservices contracted for by the Customer. The policy is stated as follows: An acceptable mailing \r\n\t\t\t\tlist will be focused at a targeted audience that has voluntarily signed up for e-mail information \r\n\t\t\t\tusing a double opt-in process or that has made their e-mail address available to the Customer for \r\n\t\t\t\tdistribution of information. The list must also allow for automatic removal by all end Customers \r\n\t\t\t\twith non-distribution in the future\r\n\t\t\t<\/p>\r\n\t\t<\/li>\r\n\t\t \r\n\t\t\t\tCONTENT published or transmitted via the Service Provider's Semi-Dedicated hosting services includes \r\n\t\t\t\twebsite content, email content, forum\/blog postings, chat content, and\/or any other type of \r\n\t\t\t\tcontent hosted on our servers, published online or transmitted through our Semi-Dedicated server \r\n\t\t\t\thosting services. \r\n\t\t\t<\/p>\r\n\t\t\t \r\n\t\t\t\tThe user of our Semi-Dedicated server hosting services is NOT permitted to post online content \r\n\t\t\t\tor have links to content that:\r\n\t\t\t<\/p>\r\n\t\t\t \r\n\t\t\t\tCopyrighted material must not be placed on customers' Semi-Dedicated accounts without \r\n\t\t\t\tthe explicit permission of the copyright owner or a person specifically authorized to give \r\n\t\t\t\tsuch permission by the copyright owner. Upon receipt of a claim for copyright infringement, \r\n\t\t\t\tor a notice of such violation, we will immediately run full investigation and, upon confirmation, \r\n\t\t\t\twill promptly remove the infringing material from the services. Further procedures (in accordance \r\n\t\t\t\twith our stated below corrective measures) will be carried out if necessary. We will assume no \r\n\t\t\t\tliability to any customer of the Semi-Dedicated hosting services for the removal of any such material. \r\n\t\t\t<\/p>\r\n\t\t<\/li>\r\n\t\t \r\n\t\t\t\tWe reserve our right to be the sole arbiter in determining the seriousness of each infringement \r\n\t\t\t\tof this AUP and to immediately take corrective actions. \r\n\t\t\t<\/p>\r\n\t\t\t \r\n\t\t\t\tWe will disable the customer's Semi-Dedicated hosting account if we deem necessary, at \r\n\t\t\t\tour sole discretion. Upon closing of the customer's account we will send an e-mail notification \r\n\t\t\t\tto the customer, stating the reason for the termination and quoting our terms' chapter that has been \r\n\t\t\t\tviolated. The customer will be given an opportunity to respond and take measures to remedy the situation \r\n\t\t\t\tshould he\/she consider him\/herself abused by a third party. Upon fulfilling of this obligation, we may \r\n\t\t\t\tre-activate the customer's Semi-Dedicated account, if we find, at our own discretion, sufficient evidence \r\n\t\t\t\tpro customer's side. \r\n\t\t\t<\/p>\r\n\t\t\t \r\n\t\t\t\tClosed Semi-Dedicated accounts due to repeated violations will not be re-activated. A backup may \r\n\t\t\t\tbe requested, however it will be subject to certain penalty fees imposed according to the breach \r\n\t\t\t\tof this AUP terms. The final penalty fee will be determined by the type and frequency of the violations. \r\n\t\t\t<\/p>\r\n\t\t<\/li>\r\n\t\t \r\n\t\t\t\tIf you need to report a violation of this AUP agreement or believe that you or your system has been \r\n\t\t\t\tsubject to attack originating from our hosting network, please contact us immediately. Our team will \r\n\t\t\t\tfully investigate the situation and provide you with professional assistance. \r\n\t\t\t<\/p>\r\n\t\t<\/li>\r\n\t\t \r\n\t\t\t\tWe reserve our right to change this AUP at any time, without prior notice. We encourage our \r\n\t\t\t\tSemi-Dedicated hosting users to periodically review this Acceptable Use Policy and our Semi-Dedicated \r\n\t\t\t\tTerms of Service.\r\n\t\t\t<\/p>\r\n\t\t<\/li>\r\n\t<\/ol>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":785,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-797","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/hosting.digimarketingnc.com\/es\/wp-json\/wp\/v2\/pages\/797"}],"collection":[{"href":"https:\/\/hosting.digimarketingnc.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hosting.digimarketingnc.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hosting.digimarketingnc.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hosting.digimarketingnc.com\/es\/wp-json\/wp\/v2\/comments?post=797"}],"version-history":[{"count":0,"href":"https:\/\/hosting.digimarketingnc.com\/es\/wp-json\/wp\/v2\/pages\/797\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/hosting.digimarketingnc.com\/es\/wp-json\/wp\/v2\/pages\/785"}],"wp:attachment":[{"href":"https:\/\/hosting.digimarketingnc.com\/es\/wp-json\/wp\/v2\/media?parent=797"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}\r\n\t\t
\r\n\t\t
SYSTEM ABUSE<\/h2>\r\n\t\t\t
\r\n\t\t\t\t
EMAIL POLICIES<\/h2>\r\n\t\t\t
\r\n\t\t\t\t
\r\n\t\t\t\t
INAPPROPRIATE OR UNLAWFUL CONTENT<\/h2>\r\n\t\t\t
\r\n\t\t\t\t
COPYRIGHTS<\/h2>\r\n\t\t\t
CORRECTIVE ACTIONS<\/h2>\r\n\t\t\t
REPORTING VIOLATIONS<\/h2>\r\n\t\t\t
REVISIONS<\/h2>\r\n\t\t\t