General Statement's Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what expects of them while using the service. All users of's Internet services: those who access some of our Services but do not have accounts, as well as those who pay a service fee to subscribe to the Services, must comply with this AUP and our TOS (Terms of Service). Use of any Service constitutes acceptance and agreement to's AUP as well as TOS (Terms of Service). Part of this policy was written under the framework of our parent provider's required AUP.


The purpose of the acceptable use policy is to inform all Customers of anticipated customer use. Due to the myriad of possibilities in maintaining a network comprised of thousands of servers, this document is intended to act as a guideline to service and not to be all encompassing.


Server Content does not actively monitor server content for review. believes in the free dissemination of information via our services. Server content will only be reviewed upon complaint by verified third parties. Content that does not violate local, state and federal law or the acceptable use policy is deemed in compliance and shall remain intact. Legal adult content is allowed on dedicated servers. Content deemed in violation will be addressed pursuant to the methods of resolution under the acceptable use policy.


Peer to Peer allows the use of internet peer to peer software for file sharing purposes. highly recommends strict oversight and management of peer to peer software environments due to the propensity to violate copyright law by sharing commercial software or copyright protected material. The sharing of copyright protected software and material is NOT allowed and is in direct violation of federal law and the acceptable use policy. Violation of the Peer to Peer policy will result in methods of resolution under the policy.


Copyright Infringement

Direct copyright infringement as defined and noted under Title 17, Section 512 of the United States Code are a direct violation of the acceptable use policy.


Illegal Use

Any use of dedicated services in direct attempt of statutory illegal activities is a direct violation of the acceptable use policy. This includes, but is not limited to: death threats, terroristic threats, threats of harm to another individual, multi-level marketing schemes, "ponzi schemes", invasion of privacy, credit card fraud, racketeering, defamation, slander, and other common illegal activities.


Pornography or content of a sexual nature has a zero stance policy on sexual or pornograhic content.  All content should be accpeptable for display in public places and child friendly.


Child Pornography has a zero stance policy on child pornography and related sites. The hosting of child pornography or related sites or contact information is in direct violation of federal law and the acceptable use policy.


Threats & Harassment

The network can be utilized for any type of individual, organizational or business use. This does not include threats or harassment to individuals, organizations or businesses unless it falls within the bounds of protected free speech under the first amendment. seeks to serve only as the medium of exchange for information and refrains from decisions on freedom of speech.


Fraudulent Activities prohibits utilizing dedicated services or network services for fraudulent activities. Notification of fraudulent activities by verified third parties can result in violation of the acceptable use policy.


Denial of Service absolutely prohibits the use of dedicated services or network services for the origination or control of denial of service attacks or distributed denial of service attacks. Any relation to DOS or DDOS type activity is a direct violation of the acceptable use policy.

Terrorist Websites prohibits the use of services for the hosting of terrorist related websites. This includes sites advocating human violence and hate crimes based upon religion, ethnicity, or country of origin.


Distribution of Malware prohibits the storage, distribution, fabrication, or use of malware including virus software, root kits, password crackers, adware, key stroke capture programs and other programs normally used in malicious activity. Programs used in the normal ordinary course of business are deemed acceptable. Example: Security Company hosting at analyzes the latest root kit for new security analysis software.

Phishing strictly prohibits any activity associated with Phishing or systems designed to collect personal information (name, account numbers, usernames, passwords, etc.) under false pretense. Splash pages, phishing forms, email distribution, proxy email or any relation to phishing activities will result in immediate removal.

Disclosure to Law Enforcement


Occasionally, is required by law to submit customer information to law enforcement officials when presented with a valid subpoena from a court with proper jurisdiction. Information requested is disclosed as directed pursuant to the subpoena. utilizes great care in keeping customer information safe and private and will only release information described in the subpoena. will notify customer of the information request as allowed by the subpoena.

Reporting Violation of the Acceptable Use Policy accepts reports of alleged violations of the acceptable use policy via email sent to Reports of alleged violations must be verified and include name, contact information, IP address, and description of the violation. owes no duty to third parties reporting alleged violations due to lack of privity in contract law. will review all verified third party reports and will take appropriate actions as described within the acceptable use policies.

Methods of Resolution for Violations under the Acceptable Use Policy


The ultimate goal of is to balance the rights and interest of our customers in the highly evolving internet world. understands the challenges of hosting companies, resellers, businesses, organizations and other customers who may have third party violations occur due to the nature of their business. The goal to our methods of resolution is to mitigate any service interruptions while resolving any potential violations under the policy. Our sales, support and abuse staff are dedicated to working with you in resolving potential violations and are available via phone or email. The methods of resolution below form the framework for a resolving all potential violations. Timing for resolution differs according to the degree of the violation, the nature of the violation, involvement of law enforcement, involvement of third party litigation, or other related factors. Overall, is dedicated to working with the Customer in resolving all potential violations prior to any service interruptions.


Step 1: First alleged violation of AUP: a support ticket with email notification will be generated with information regarding the potential violation of the acceptable use policy. This is often a fact finding email requiring further information or notifying Customer of the potential violation and the required actions to resolve the issue.


Step 2: Acknowledgement of violation of AUP: a support ticket with email notification with information specific to the violation. This ticket will also include any additional facts about the situation and will notify customer of the action required to resolve the violation.


Step 3: Violation of AUP disregarded, not properly addressed, or continuing violation: if a ticket has been disregarded, not properly addressed, or resolved by the customer for a specified period of time, engineers will turn the public network port to the specified dedicated services off. Access to the dedicated services is achieved through the secure private service network for Customer resolution. As soon as the violation is addressed, the public access is restored and service continues as normal.


Step 4: Failure to address violation and remove violation: if customer fails to address the violation AND resolve the violation, a suspension of services will occur. This is a last resort for and requires a complete failure in the resolution process on behalf of the Customer. A permanent suspension of services includes reclamation of all dedicated services and data destroyed at the end of the current billing cycle.

Disclaimer: retains the right, at its sole discretion, to refuse new service to any individual, group, or business. also retains the right to discontinue service with notice for repeated violation of the acceptable use policy over time.