SIGN UP TODAY AND GET AN EXTRA 25% CLOUD CREDIT! ...more info
Acceptable Use Policy
1. BigDaddyHost ("Company")
Service constitutes acceptance of agreement to Company Acceptable Use Policy
("AUP"). The AUP is intended for Company products and services with the goal of
protecting Company Subsidiaries, Affiliates, Employees, and Clients. This
policy applies to the use of all Company products, websites, copyrights, and
services owned or operated by Company, as well as any and all data sent,
transferred, received, stored, or accessed in the Company network. Other
products or services offered by Company may have additional terms and
conditions that govern over this policy in the case of inconsistencies.
2. This AUP,
inclusive of the following prohibited activities below, is an integral part of
the hosting agreements with Company. Company services are for the lawful use of
Company´s Clients, and if Company finds the Client in violation of the below
prohibited activities Client´s services may be subject to suspension and/or
removal from Company network. This policy is a non-exclusive list of actions
prohibited by Company. Company reserves the right to modify these policies at
any time, with changes becoming effective immediately upon posting.
3. Security
— Company
does not provide system administrators or security advisors to aid Clients in
the security of their server. It is the sole responsibility of the Client to
properly secure their server. Company assumes no legal liability for the
actions or data created, or posted by its Clients. Each Client is responsible
for all data transmitted, or received by, to, or through Company services.
Company will cooperate with law enforcement on any criminal or suspected
criminal acts by means which Company may deem necessary including but not
limited to handing over personal information, data, or hardware to aid law
enforcement with their investigations. Law officials may request that Client
not be notified on issues relating to criminal acts; Company reserves the right
to comply with this request.
4.Purpose
This
Acceptable Use Policy has been formulated with the following goals in
mind:
a. Ensure the
security, reliability and privacy of Company´s network and systems, and the
networks and systems of others.
b. Preserve the
value of the Internet as a resource for information and free expression.
c. Preserve the
privacy and security of Company´s Clients and other Internet users.
d. Discourage
irresponsible practices which degrade the usability of network resources and
thus the value of Internet services.
e. Avoid
situations that may cause Company to incur legal liability.
f.
Maintain the image and reputation of Company as a responsible
provider.
5. Anti-SPAM Provisions
— Company
operates under a strict "No Spam" policy. The sending of any unsolicited e-mail
advertising messages from, to, or through Company´s services may result in the
imposition of civil liability against the sender, in accordance with California
Business & Professions Code Section 17538.45. A copy of the California
Business & Professions Code may be obtained on-line from
http://www.leginfo.ca.gov. Company reserves the right to check all known commercial
and public databases for information regarding prior history of unsolicited
mail sending, and blacklisting, and may choose to deny or terminate services
based on this information. Individuals identified as "ROKSO" level abusers will
be denied service immediately. Company uses the databases of associations such
as Five-Ten Software Group, MAPS, SORBS, Spamhaus,
UCE protect, Njabl, and CBL to identify previous and
current spammers. Company receives feedback from other large Internet Service
Providers about spam their Clients report, ISPs such as Road Runner, Comcast, SBCglobal, MSN, and Outblaze.
a. SPAM — To
protect outside sources, Company´s Solicited Bulk E-mailers are required to
remove complaints by methods including but not limited to creating a no-mail
list. Company respects the CAN SPAM act; however, Company´s Client is required
to follow a stricter Double Opt-In policy as well as having an opt-out in all
e-mails. Bulk e-mailers may be required to provide the complete opt-in
information as well as provide proof of previous business relationships with
the recipients.
i.
Double Opt-In (Confirmed Opt-In) — A user adds his name to a list
by entering his e-mail address into the list operator´s system, whether through
a form on a webpage or entry into a contest or some other method. The
e-mail list software then sends out a confirmation message, asking for the user
to confirm his addition to the list. If the user replies to that message from
the e-mail address that was signed up, he will be subscribed to the list. If
the user does not reply to that message, he will receive no further mailings at
all. This method drastically reduces the number of unwanted e-mails (SPAM)
being sent to unhappy recipients, which is why Company requires it for all
e-mail lists operated by Clients.
ii.
Client may not make Usenet postings which advertise a website,
e-mail account, or other service provided by or through Company, to any
newsgroup whose charter does not specifically allow such advertisements. Client
may not send unsolicited bulk e-mail (UBE) or post advertisements to Usenet
(except where specifically allowed by newsgroup charters) from a service
provided by or through Company. Client may not host "spam-friendly" Web sites,
including spam software sites. Client may not send UBE which advertises a
website, e-mail account, or other service provided by or through Company.
Client may not send e-mail to any person who does not wish to receive it. If a
recipient asks to stop receiving email, Client must immediately and permanently
cease to send that individual any further e-mail.
iii.
E-Mail Spam/Unsolicited Bulk E-Mail (UBE)/Unsolicited Commercial
E-mail (UCE) — Use of services to send e-mails to users in a pre-generated list
or self-created list. Unsolicited Bulk / Commercial E-mails are sent to users
that do not wish to receive the e-mail notification of products Client wishes
to sell or advertise.
1.Mobile Phone Spam — Use of
e-mail services to send unsolicited text messages advertising a product or
website.
2.Forum Spam — Use of
e-mail services to advertise or post on a forum content related to a product
Client wishes to sell.
3. Newsgroup Spam — Use of
e-mail services to advertise or commit forgery through the use of
newsgroups
4. Blank Spam — Use of
e-mail services to send e-mails containing no subject or content. Commonly used
as a harvesting tactic designed to find valid e-mail addresses.
iv.
E-mail Address Harvesting — Use of Company services to
obtain or create unconfirmed mailing lists with the intention of selling,
distributing, or spamming is strictly forbidden.
1. Spam Bots — A script
or program that searches human readable text for e-mail addresses and collects
them in an e-mail list.
2. E-mail List Gathering Programs — Other scripts or programs that are
used for gathering e-mail address from varying sources.
v.
Spamvertising — Sending
spam with content advertising websites, or containing IPs that are on Company
services, or sending spam from Company services advertising web content outside
of Company networks is prohibited.
6.Harmful Materials
— Use
and access to Company services is for lawful use only, and it is the
responsibility of the Client to use their best judgment of what is acceptable
material. Using Company´s network, services, or systems to store or send
content which is illegal according to the laws of United States of America, the
state of California, the city of San Diego, or any International treaties
respected by the United States of America, is not permitted for any reason.
Client may not display, transmit, advertise, distribute, or sell harmful
materials. Client may not store or send any material deemed either illegal or
inappropriate from Company networks, including but not limited to child
pornography.
a. Material
Harmful to Minors — Images depicting persons under the age of 18 engaging in
unlawful sexual acts. Pornographic materials viewable by persons under the age
of 18 without proof of age.
b. Obscene
Content — E-mails,
messages, phone messages, or posts with content that is threatening, or
harassing any other individual. Harassment, whether through content, frequency,
or size using e-mail or Usenet messages.
c. Destructive
Programs — Software
or hardware containing programs such as Viruses, Worms, Trojans or other malicious
programs with intent of causing harm to an individual´s computer or
server.
7. Copyrighted Materials
— Company
expressly forbids the use of copyrighted materials without written permission
from the owner of that material. Company follows all rules and regulations set
forth by the DMCA ("http://thomas.loc.gov/cgi-bin/query/z?c105:H.R.2281.ENR:"). Client may not engage in an attempt to
infringe, store or send any material deemed either illegal or inappropriate for
Company networks, including but not limited copyrighted images, software, or
music.
a. Copyright
Infringement — Advertising, selling, distributing, or
marketing material that infringes a copyright, trademark, or any other
proprietary right to any intellectual property including but not limited to
photographs, trade secrets, and/or property.
8. Fraudulent Materials
— Company
requires that all Clients provide accurate information regarding name, address,
and a working phone number to identify each Client. Client may not use Company
services to impersonate another individual by altering source IP address
information, or forging e-mail/Usenet headers or other identifying information.
Client may not make any attempt to fraudulently conceal, forge, or otherwise
falsify one´s identity in connection with use of the Company service. Clients
must not utilize Company services to distribute fraudulent materials to
others.
a. Fraudulent
Activities
i.
Attempting to buy or sell products or services, or offering
fraudulent goods, services, or promotions.
ii.
Forwarding or otherwise propagating chain letters or "e-mail
hoaxes," whether or not the recipient wishes to receive them, unless such
propagation is both solicited and in the clear context of debunking or
discrediting chain letters/hoaxes.
iii.
Forgery or Disguising Client Identity
1. Falsifying
or modifying data to fraudulently disguise one´s self as someone else with the
intention of deceiving another user, including but not limited to forging
e-mail headers or e-mail "munging".
2. Transmitting
any electronic communication, including e-mail, using the name or address of
another person or organization, for purposes of deception.
3. Impersonating
another individual by altering source IP address information, or forging
e-mail/Usenet headers or other identifying information.
9. Phishing Materials
— The
use of Company services to gather personal information about victims of
phishing is strictly forbidden. Client may not perpetrate, engage in, or take
part in the use of phishing scams, including but not limited to impersonating
another individual by altering source IP address information or forging
e-mail/Usenet headers or other identifying information.
a. Phishing
Scams — Including
but not limited to sending e-mails with links to bogus websites that look
similar to actual sites, or sending e-mails about Client impersonating a
representative of Paypal, Ebay,
or Bank Employee, with the intention of acquiring personal information such as
credit card information, Social Security Number, personal e-mails, home
addresses, etc.
10. Hacking
— Use
of Company services to perform attacks on other servers or computers outside of
or within Company premises is strictly forbidden. Client may not intercept or
attempt to intercept, through any method, network traffic intended for other
Clients. Client may not use or store any type of software which is designed to,
or is likely to, abuse or negatively impact internet service, including, but
not limited to, port scanners, hacking tools, ping flooding programs,
security/root exploits, packet sniffers, and SPAM software. Denial of service,
including, but not limited to, any form of Internet packet flooding, packet
corruption, or abusive attack intended to impact the proper functioning of any
party’s internet servers or services are forbidden.
a. Hacking — Use of
the service to breach or access a person´s server, computer, or software with
the intent of gaining access to or destruction of data without that person´s
permission or consent.
b. Net Scanning — Use of
services to search outside networks for open firewalls, or server ports in an
attempt to exploit a vulnerability or weakness in the device.
c. SSH attacks
/ Brute Force attack / Dictionary Attack — Using
the services to engage in an attack on a separate entities server or computer
with an unlawful script or program that attempts to guess a
users credentials.
d. DDos/Dos Attacks — An attack
on a person´s network, server, or computer that creates multiple requests
repetitively in an attempt to slow down or crash that person´s network
connectivity
e. Ping/Syn Floods — An attack that
creates multiple echo requests and sends them to its target repeatedly in an
attempt to slow down or crash the targets network connectivity.
11. Proxy
— Company
services do not allow others to openly relay e-mail or services through Client
services. Client may not allow the use of another party´s electronic mail
server to relay e-mail without express permission from Company. Running proxy
servers, such as squid or BNC, is not allowed unless they are available only to
users whose verified contact information is known by the proxy operator and can
be disclosed to Company or law enforcement authorities upon request. All usage
of such services must be brought to the attention of the Company security team
and cleared by the Security Manager before Client begin running such
services.
a. Mail Proxy — Use of
Company services to run any kind of Mail Proxy is not permitted.
i.Open Mail Proxy — A server that has been set up to allow any user to relay mail through it.
ii.Secure Mail Proxy — A server that has
been set up to only allow specific users to relay their mail through it.
b. Web Proxy — A serverthat allows users to forward requests to other servers. Company may allow
certain proxy servers at their own discretion and under separate terms.
i. Open Web Proxy — A proxy server that allows users to remain anonymous.
12.Enforcement
— Complaints
about Clients/representatives or end-users of a Company Client will be
forwarded to the Company Abuse Department for action. If violations of the
Company Acceptable Use Policy occur, Company reserves the right to terminate
services or take action to stop the offending Client from violating Company´s
AUP as Company deems appropriate, without notice. Violation of any Company AUP
policies may be subject to a fine of up to $500 USD for each incidence of
violation. Failure to respond or handle an issue of violation in a timely
manner is considered a violation of this AUP.
13.Client Responsibilities
— It is the responsibility of the Client to ensure that all
of their Clients abide by this policy. If a Client wishes to use a service to
send mail, it is the responsibility of the Client to make sure that their
Forward and Reverse DNS records match, to set a PTR record in the online
account manager to a non-generic name, and if the Client has a control panel on
their server they must set a distinct non-generic PTR for each domain they plan
to send mail from.