SIGN UP TODAY AND GET AN EXTRA 25% CLOUD CREDIT! ...more info

Acceptable Use Policy

1.       BigDaddyHost ("Company") Service constitutes acceptance of agreement to Company Acceptable Use Policy ("AUP"). The AUP is intended for Company products and services with the goal of protecting Company Subsidiaries, Affiliates, Employees, and Clients. This policy applies to the use of all Company products, websites, copyrights, and services owned or operated by Company, as well as any and all data sent, transferred, received, stored, or accessed in the Company network. Other products or services offered by Company may have additional terms and conditions that govern over this policy in the case of inconsistencies. 

2.       This AUP, inclusive of the following prohibited activities below, is an integral part of the hosting agreements with Company. Company services are for the lawful use of Company´s Clients, and if Company finds the Client in violation of the below prohibited activities Client´s services may be subject to suspension and/or removal from Company network. This policy is a non-exclusive list of actions prohibited by Company. Company reserves the right to modify these policies at any time, with changes becoming effective immediately upon posting. 

3. Security

 — Company does not provide system administrators or security advisors to aid Clients in the security of their server. It is the sole responsibility of the Client to properly secure their server. Company assumes no legal liability for the actions or data created, or posted by its Clients. Each Client is responsible for all data transmitted, or received by, to, or through Company services. Company will cooperate with law enforcement on any criminal or suspected criminal acts by means which Company may deem necessary including but not limited to handing over personal information, data, or hardware to aid law enforcement with their investigations. Law officials may request that Client not be notified on issues relating to criminal acts; Company reserves the right to comply with this request. 

4.Purpose

  This Acceptable Use Policy has been formulated with the following goals in mind: 

a.       Ensure the security, reliability and privacy of Company´s network and systems, and the networks and systems of others. 

b.      Preserve the value of the Internet as a resource for information and free expression. 

c.       Preserve the privacy and security of Company´s Clients and other Internet users. 

d.      Discourage irresponsible practices which degrade the usability of network resources and thus the value of Internet services. 

e.      Avoid situations that may cause Company to incur legal liability. 

f.        Maintain the image and reputation of Company as a responsible provider. 

5. Anti-SPAM Provisions

— Company operates under a strict "No Spam" policy. The sending of any unsolicited e-mail advertising messages from, to, or through Company´s services may result in the imposition of civil liability against the sender, in accordance with California Business & Professions Code Section 17538.45. A copy of the California Business & Professions Code may be obtained on-line from http://www.leginfo.ca.gov. Company reserves the right to check all known commercial and public databases for information regarding prior history of unsolicited mail sending, and blacklisting, and may choose to deny or terminate services based on this information. Individuals identified as "ROKSO" level abusers will be denied service immediately. Company uses the databases of associations such as Five-Ten Software Group, MAPS, SORBS, Spamhaus, UCE protect, Njabl, and CBL to identify previous and current spammers. Company receives feedback from other large Internet Service Providers about spam their Clients report, ISPs such as Road Runner, Comcast, SBCglobal, MSN, and Outblaze

a.       SPAM — To protect outside sources, Company´s Solicited Bulk E-mailers are required to remove complaints by methods including but not limited to creating a no-mail list. Company respects the CAN SPAM act; however, Company´s Client is required to follow a stricter Double Opt-In policy as well as having an opt-out in all e-mails. Bulk e-mailers may be required to provide the complete opt-in information as well as provide proof of previous business relationships with the recipients. 

                                                               i.      Double Opt-In (Confirmed Opt-In) — A user adds his name to a list by entering his e-mail address into the list operator´s system, whether through a form on a webpage or entry into a contest or some other method.  The e-mail list software then sends out a confirmation message, asking for the user to confirm his addition to the list. If the user replies to that message from the e-mail address that was signed up, he will be subscribed to the list. If the user does not reply to that message, he will receive no further mailings at all. This method drastically reduces the number of unwanted e-mails (SPAM) being sent to unhappy recipients, which is why Company requires it for all e-mail lists operated by Clients. 

                                                             ii.      Client may not make Usenet postings which advertise a website, e-mail account, or other service provided by or through Company, to any newsgroup whose charter does not specifically allow such advertisements. Client may not send unsolicited bulk e-mail (UBE) or post advertisements to Usenet (except where specifically allowed by newsgroup charters) from a service provided by or through Company. Client may not host "spam-friendly" Web sites, including spam software sites. Client may not send UBE which advertises a website, e-mail account, or other service provided by or through Company. Client may not send e-mail to any person who does not wish to receive it. If a recipient asks to stop receiving email, Client must immediately and permanently cease to send that individual any further e-mail. 

                                                            iii.      E-Mail Spam/Unsolicited Bulk E-Mail (UBE)/Unsolicited Commercial E-mail (UCE) — Use of services to send e-mails to users in a pre-generated list or self-created list. Unsolicited Bulk / Commercial E-mails are sent to users that do not wish to receive the e-mail notification of products Client wishes to sell or advertise. 

1.Mobile Phone Spam — Use of e-mail services to send unsolicited text messages advertising a product or website. 

2.Forum Spam — Use of e-mail services to advertise or post on a forum content related to a product Client wishes to sell. 

3. Newsgroup Spam — Use of e-mail services to advertise or commit forgery through the use of newsgroups 

4. Blank Spam — Use of e-mail services to send e-mails containing no subject or content. Commonly used as a harvesting tactic designed to find valid e-mail addresses. 

iv.      E-mail Address Harvesting — Use of Company services to obtain or create unconfirmed mailing lists with the intention of selling, distributing, or spamming is strictly forbidden.  

1.       Spam Bots — A script or program that searches human readable text for e-mail addresses and collects them in an e-mail list. 

2.       E-mail List Gathering ProgramsOther scripts or programs that are used for gathering e-mail address from varying sources. 

                                                             v.      Spamvertising — Sending spam with content advertising websites, or containing IPs that are on Company services, or sending spam from Company services advertising web content outside of Company networks is prohibited. 

6.Harmful Materials

 — Use and access to Company services is for lawful use only, and it is the responsibility of the Client to use their best judgment of what is acceptable material. Using Company´s network, services, or systems to store or send content which is illegal according to the laws of United States of America, the state of California, the city of San Diego, or any International treaties respected by the United States of America, is not permitted for any reason. Client may not display, transmit, advertise, distribute, or sell harmful materials. Client may not store or send any material deemed either illegal or inappropriate from Company networks, including but not limited to child pornography. 

a.       Material Harmful to Minors — Images depicting persons under the age of 18 engaging in unlawful sexual acts. Pornographic materials viewable by persons under the age of 18 without proof of age. 

b.      Obscene Content — E-mails, messages, phone messages, or posts with content that is threatening, or harassing any other individual. Harassment, whether through content, frequency, or size using e-mail or Usenet messages. 

c.       Destructive Programs — Software or hardware containing programs such as Viruses, Worms, Trojans or other malicious programs with intent of causing harm to an individual´s computer or server. 

7. Copyrighted Materials

 — Company expressly forbids the use of copyrighted materials without written permission from the owner of that material. Company follows all rules and regulations set forth by the DMCA ("http://thomas.loc.gov/cgi-bin/query/z?c105:H.R.2281.ENR:"). Client may not engage in an attempt to infringe, store or send any material deemed either illegal or inappropriate for Company networks, including but not limited copyrighted images, software, or music. 

a.       Copyright InfringementAdvertising, selling, distributing, or marketing material that infringes a copyright, trademark, or any other proprietary right to any intellectual property including but not limited to photographs, trade secrets, and/or property. 

8. Fraudulent Materials

 — Company requires that all Clients provide accurate information regarding name, address, and a working phone number to identify each Client. Client may not use Company services to impersonate another individual by altering source IP address information, or forging e-mail/Usenet headers or other identifying information. Client may not make any attempt to fraudulently conceal, forge, or otherwise falsify one´s identity in connection with use of the Company service. Clients must not utilize Company services to distribute fraudulent materials to others. 

a.       Fraudulent Activities  

                                                               i.      Attempting to buy or sell products or services, or offering fraudulent goods, services, or promotions. 

                                                             ii.      Forwarding or otherwise propagating chain letters or "e-mail hoaxes," whether or not the recipient wishes to receive them, unless such propagation is both solicited and in the clear context of debunking or discrediting chain letters/hoaxes. 

                                                            iii.      Forgery or Disguising Client Identity  

1.       Falsifying or modifying data to fraudulently disguise one´s self as someone else with the intention of deceiving another user, including but not limited to forging e-mail headers or e-mail "munging". 

2.       Transmitting any electronic communication, including e-mail, using the name or address of another person or organization, for purposes of deception. 

3.       Impersonating another individual by altering source IP address information, or forging e-mail/Usenet headers or other identifying information. 

9. Phishing Materials

 — The use of Company services to gather personal information about victims of phishing is strictly forbidden. Client may not perpetrate, engage in, or take part in the use of phishing scams, including but not limited to impersonating another individual by altering source IP address information or forging e-mail/Usenet headers or other identifying information. 

a.       Phishing Scams — Including but not limited to sending e-mails with links to bogus websites that look similar to actual sites, or sending e-mails about Client impersonating a representative of Paypal, Ebay, or Bank Employee, with the intention of acquiring personal information such as credit card information, Social Security Number, personal e-mails, home addresses, etc. 

10. Hacking

 — Use of Company services to perform attacks on other servers or computers outside of or within Company premises is strictly forbidden. Client may not intercept or attempt to intercept, through any method, network traffic intended for other Clients. Client may not use or store any type of software which is designed to, or is likely to, abuse or negatively impact internet service, including, but not limited to, port scanners, hacking tools, ping flooding programs, security/root exploits, packet sniffers, and SPAM software. Denial of service, including, but not limited to, any form of Internet packet flooding, packet corruption, or abusive attack intended to impact the proper functioning of any party’s internet servers or services are forbidden. 

a.       Hacking — Use of the service to breach or access a person´s server, computer, or software with the intent of gaining access to or destruction of data without that person´s permission or consent. 

b.      Net Scanning — Use of services to search outside networks for open firewalls, or server ports in an attempt to exploit a vulnerability or weakness in the device. 

c.       SSH attacks / Brute Force attack / Dictionary AttackUsing the services to engage in an attack on a separate entities server or computer with an unlawful script or program that attempts to guess a users credentials.

d.      DDos/Dos Attacks — An attack on a person´s network, server, or computer that creates multiple requests repetitively in an attempt to slow down or crash that person´s network connectivity 

e.      Ping/Syn FloodsAn attack that creates multiple echo requests and sends them to its target repeatedly in an attempt to slow down or crash the targets network connectivity. 

11. Proxy

 — Company services do not allow others to openly relay e-mail or services through Client services. Client may not allow the use of another party´s electronic mail server to relay e-mail without express permission from Company. Running proxy servers, such as squid or BNC, is not allowed unless they are available only to users whose verified contact information is known by the proxy operator and can be disclosed to Company or law enforcement authorities upon request. All usage of such services must be brought to the attention of the Company security team and cleared by the Security Manager before Client begin running such services. 

a.       Mail Proxy — Use of Company services to run any kind of Mail Proxy is not permitted.  

i.Open Mail Proxy — A server that has been set up to allow any user to relay mail through it. 

ii.Secure Mail ProxyA server that has been set up to only allow specific users to relay their mail through it. 

b.      Web Proxy — A serverthat allows users to forward requests to other servers. Company may allow certain proxy servers at their own discretion and under separate terms.  

i.     Open Web Proxy — A proxy server that allows users to remain anonymous.

12.Enforcement

 — Complaints about Clients/representatives or end-users of a Company Client will be forwarded to the Company Abuse Department for action. If violations of the Company Acceptable Use Policy occur, Company reserves the right to terminate services or take action to stop the offending Client from violating Company´s AUP as Company deems appropriate, without notice. Violation of any Company AUP policies may be subject to a fine of up to $500 USD for each incidence of violation. Failure to respond or handle an issue of violation in a timely manner is considered a violation of this AUP. 

13.Client Responsibilities

 — It is the responsibility of the Client to ensure that all of their Clients abide by this policy. If a Client wishes to use a service to send mail, it is the responsibility of the Client to make sure that their Forward and Reverse DNS records match, to set a PTR record in the online account manager to a non-generic name, and if the Client has a control panel on their server they must set a distinct non-generic PTR for each domain they plan to send mail from.