AUP – Acceptance User Policy

This Acceptable User Policy (“AUP”) governs the usage of Services. This Policy is incorporated by reference into each contract enters into with customers for the provision of Services. In addition, this AUP is incorporated by reference into the Master.

Services Agreement

This AUP is to help and protect the customers of and customers’ use of Services constitute acceptance of this AUP. The purpose of this AUP is to inform the Customer ofthe acceptable uses of the Services. The use of Services must be consistent with applicable laws and must not conflict with the right of’s other customers. The Customer agrees to comply with this AUP. has the right to change or modify the terms of the AUP at any time, with intimation to the Customer. Customer’s use of the Services after changes to the AUP shall constitute acceptance of any changed or additional terms.

Prohibited Uses

All Services provided by shall be used by the Customer for lawful purposes only and as per applicable laws (including but not limited to privacy laws). Transmission,usage, storage, or presentation of any information, data or material in violation of theapplicable laws including the ‘prohibited contents’ are strictly prohibited. This includes, but is not limited to copyrighted material, trade secret, material in’s opinion isobscene, not in public interest, opposed to public policy or is an invasion of privacy of any person or entity.

The following list provides a number of general prohibited uses of the Services that are violations of this AUP. Please note that the following list does not represent a comprehensive or complete list of all prohibited uses. The prohibited uses include but are not limited to:

Illegal Material: Includes illegally exploited copyrighted works, commercial audio,video or music files, and any material that violates any applicable law or regulation of any country, and any material that is perceived to be misleading in any manner.

Unlawful Activities: The Services shall not be used in violation of applicable laws. This includes, but is not limited to:

  • Pornography (by publishing, submitting, receiving, uploading, downloading,posting, using, copying or otherwise producing, transmitting, distributing or storing pornography)
  • Unlawful activities (including gambling)
  • Threats, harassment and abuse of any individual, organization or business
  • Fraudulent activities
  • Terrorist websites or other sites advocating human violence and hate crimes based upon religion, ethnicity or country of origin
  • Unlawful plans or schemes or linking to and or advertising such plans or
    schemes. will be the sole arbiter in determining violations of this provision.Also prohibited are sites that promote any illegal activity or present content that may bedamaging to servers or any other server on the internet. Links to such materialsare also prohibited. Examples of unacceptable content or links: Pirated software Hacker programs or archives Warez sites.

Threatening Material or Content: The Services shall not be used to host, post,transmit or retransmit any content or material that harasses others or threatens the health or safety of others. In addition, reserves the right to decline to provide Services if the content of then Customer is determined by to be obscene, indecent,hateful, malicious, racist, defamatory, fraudulent, libelous, treasonous, excessively violent or promoting the use of violence or otherwise harmful to others.

Violation of Intellectual Property Rights: The Services shall not be used to publish,submit/receive,upload/download, post, use, copy or otherwise reproduce, transmit,retransmit, distribute or store any content/material or to engage in any activity that infringes or otherwise violates the intellectual property rights or privacy or publicity rights of, any Member or third party, including but not limited to any rights protected by any copyright, patent, trademark laws, trade secret or other intellectual property right now known or later recognized under applicable law.

Distribution of Malware and Phishing: The distribution, fabrication, or use of malware, including virus software, root kits, password crackers, adware, key strokecapture programs and other programs normally used in malicious activity is prohibited.

Any activity designed to collect personal information (name, account numbers,usernames, passwords, etc.) under false pretense is prohibited.

Commercial Advertising – Email

Spamming, or the sending of unsolicited email, from a hosting server or using an email address or domain that is maintained on a machine as reference is STRICTLY prohibited. Misuse of System Resources: Any attempt to undermine or cause harm to a server, or Customer, of is strictly prohibited. This includes, but is not limited to: using programs that consume excessive CPU time; allowing the use of mail services.

The Customer agrees and undertakes that

  • Any attempt to undermine or cause harm to any of the equipments, materials etc. of is strictly prohibited.
  • In case of abuse of the resources including equipments, materials, network etc.of, in any way, reserves the unqualified right to immediately deactivate the Services, without refund.
  • Denial of Service (DOS) attacks directed at, or any attempt to launch a DOS attack from servers are strictly prohibited. All infractions and or suspected infractions will be vigorously investigated and may result in immediate termination of Services.
  • Customer shall not violate systems or network security measures instituted by and any such violation may incur criminal or civil liability

Materials and Products

  • will exercise no control whatsoever over the content of the information passing through the network or on the Customer’s websites.
  • Use of any information obtained by way of is at the Customer’s own risk, and we specifically deny any responsibility for the accuracy or quality of information obtained through our services.
  • Connection speed represents the speed of connection to and does not represent guarantees of available end to end bandwidth. can only guarantee within its controlled network, availability of bandwidth to Customer’s subscribed Committed Information Rate”