Acceptable Use Policy

All customers ordering and using Private WebHost services must agree to be bound by the AUP.

This Acceptable Use Policy applies to all persons and entities (collectively, "customers") using the products and services of Private WebHost. The policy is designed to protect the security, integrity, reliability, and privacy of the Private WebHost networks and the products and services it offers its customers. Private WebHost reserves the right to modify this policy at any time, effective immediately upon posting of the modification. Your use of Private WebHost's products and services constitutes your acceptance of the Acceptable Use Policy in effect at the time of your use. You are solely responsible for any and all acts and omissions that occur during or relating to your use of the service, and you agree not to engage in any unacceptable use of the service.

Unacceptable use includes, but is not limited to, any of the following:

  • Posting, transmission, re-transmission, or storing material on or through any of Private WebHost products or services, if in the sole judgment of Private WebHost, such posting, transmission, re-transmission, or storage is: (a) in violation of any law or regulation of the Republic of Panama, or Switzerland (including rights protected by copyright, trade secret, patent or other intellectual property or similar laws or regulations); (b) threatening or abusive; (c) obscene; (d) indecent; or (e) defamatory. Each customer shall be responsible for determining what laws or regulations are applicable to his or her use of the products and services.
  • Installation or distribution of "pirated" or other software products that are not appropriately licensed for use by the customer.
  • Deceptive marketing practices.
  • Actions that restrict or inhibit anyone - whether a customer of Private WebHost or otherwise - in his or her use or enjoyment of Private WebHost products and services or that generate excessive network traffic through the use of automated or manual routines that are not related to ordinary personal or business use of Internet services.
  • Introducing malicious programs into the Private WebHost network or servers or other products and services of Private WebHost (e.g., viruses, trojan horses and worms).
  • Causing or attempting to cause security breaches or disruptions of Internet communications. Examples of security breaches include but are not limited to accessing data of which the customer is not an intended recipient or logging into a server or account that the customer is not expressly authorized to access. Examples of disruptions include but are not limited to port scans, flood pings, packet spoofing and forged routing information.
  • Executing any form of network monitoring that will intercept data not intended for the customer.
  • Circumventing user authentication or security of any host, network or account.
  • Interfering with or denying service to any user other than the customer's host (e.g., denial of service attack).
  • Using any program/script/command or sending messages of any kind designed to interfere with or to disable a user's terminal session.
  • Attempting to circumvent or alter the processes or procedures to measure time, bandwidth utilization or other methods to document the "use" of Private WebHost's products or services.
  • Sending unsolicited mail messages, including the sending of "junk mail" or other advertising material to individuals who did not specifically request such material, who were not previous customers of the customer or with whom the customer does not have an existing business relationship (e.g., E-mail "spam"); or distributing, advertising or promoting software or services that have the primary purpose of encouraging or facilitating unsolicited commercial E-mail or spam.
  • Harassment, whether through language, frequency, or size of messages.
  • Unauthorized use or forging of mail header information.
  • Solicitations of mail or any other E-mail address other than that of the poster's account or service with the intent to harass or collect replies.
  • Creating or forwarding "chain letters" or other "pyramid schemes" of any type.
  • Use of unsolicited E-mail originating from within the Private WebHost network or networks of other Internet Service Providers on behalf of or to advertise any service hosted by Private WebHost or connected via the Private WebHost network.
  • No failure or delay in exercising or enforcing this policy shall constitute a waiver of the policy or of any other right or remedy. If any provision of this policy is deemed unenforceable due to law or change in law, such a provision shall be disregarded, and the balance of the policy shall remain in effect.
  • 0 Users Found This Useful
Was this answer helpful?

Related Articles

Terms and Conditions

Term and Conditions The customer agrees to a month-to-month contract term for services unless...

Private Policy

Privacy Policy What information do we collect? When you place an order, we collect information...