asp.net hosting
Home Support Contact us
10:00 AM IST - 5:00 PM IST : Monday - Friday 
Home Hosting Domains Order My Account Support Contact Us
 


Seal of Trust


Acceptable Use Policy

Our acceptable use policy ("AUP") is actively and strictly enforced.

Where the context admits: "We" & "Us" includes InlandHost and/or Cenvo Technologies of: Mangalore,Karnataka,India or any party acting on Cenvo Technologies implicit instructions. "You" includes the person purchasing the Services or any party acting on the customer's instructions. "The Registrant" includes the person applying for a domain name or any party acting on the Registrant's instructions. "The Registry" the relevant domain names Registry. "Server" means the computer server equipment operated by us in connection with the provision of the Services. "Web Site" means the area on the Server allocated by us to you for use by you as a site on the Internet.

Offending content or users are removed from our network, usually as soon as they are discovered, although we will always inform you when and why any action has been taken.

1. Illegality
In any form, including but not limited to the unauthorised distribution or copying of copyrighted software or other data, harassment, fraud, or trafficking in obscene material. The offer of sale of any counterfeit merchandise of a trademark holder will result in the immediate termination of your account.

2. Undesirable Content
Certain types of content are not permitted on our network. We do not host adult content of any description. Content relating to Hacking, Cracking, Warez and IRC is not allowed. Software downloads may only be hosted if you are the writer and copyright owner of the software, all other software including freeware, shareware and trial software is forbidden. Audio and video downloads may only be hosted if you are the creator and copyright owner of the work.
Examples of unacceptable material include:
  • Topsites
  • IRC Scripts/Bots
  • Proxy Scripts/Anonymizers
  • Pirated Software/Warez
  • Image Hosting Scripts (similar to Photobucket or Tinypic)
  • AutoSurf/PTC/PTS/PPC sites
  • IP Scanners
  • Bruteforce Programs/Scripts/Applications
  • Mail Bombers/Spam Scripts
  • Banner-Ad services (commercial banner ad rotation)
  • File Dump/Mirror Scripts (similar to rapidshare)
  • Commercial Audio Streaming (more than one or two streams)
  • Escrow/Bank Debentures
  • High-Yield Interest Programs (HYIP) or Related Sites
  • Investment Sites (FOREX, E-Gold Exchange, Second Life/Linden Exchange, Ponzi, MLM/Pyramid Scheme)
  • Sale of any controlled substance without prior proof of appropriate permit(s)
  • Prime Banks Programs
  • Lottery/Gambling Sites
  • MUDs/RPGs/PBBGs
  • Hacker focused sites/archives/programs
  • Sites promoting illegal activities
  • Forums and/or websites that distribute or link to warez/pirated/illegal content
  • Bank Debentures/Bank Debenture Trading Programs
  • Fraudulent Sites (Including, but not limited to sites listed at aa419.org & escrow-fraud.com)
  • Push button mail scripts
  • Broadcast or Streaming of Live Sporting Events (UFC, NASCAR, FIFA, NFL, MLB, NBA, WWE, WWF, etc)
  • Tell A Friend Scripts
InlandHost services, including all related equipment, networks and network devices are provided only for authorized customer use. InlandHost systems may be monitored for all lawful purposes, including to ensure that use is authorized, for management of the system, to facilitate protection against unauthorized access, and to verify security procedures, survivability, and operational security. During monitoring, information may be examined, recorded, copied and used for authorized purposes. Use of InlandHost system(s) constitutes consent to monitoring for these purposes.

Any account found connecting to a third party network or system without authorization from the third party is subject to suspension. Access to networks or systems outside of your direct control must be with expressed written consent from the third party. InlandHost may, at its discretion, request and require documentation to prove access to a third party network or system is authorized.

We reserve the right to refuse service to anyone. Any material that, in our judgment, is obscene, threatening, illegal, or violates our terms of service in any manner may be removed from our servers (or otherwise disabled), with or without notice.

Failure to respond to abuse notice via helpdesk within 12 hours may result in the suspension or termination of your services. All abuse issues must be dealt with via troubleticket/email and should be resolved within 48 hours or as indicated.

3. Bulk Email
The use of our network to send bulk email whether opt-in or otherwise, and the use of bulk email to promote a site on our network is strictly forbidden.

4. Commercial Advertisements with E-mail
We take a zero tolerance approach to the sending of Unsolicited Commercial E-mail (UCE) or SPAM over our network. Very simply, this means that customers of our company may not use or permit others to use our network to transact in UCE. Customers of our hosting service may not host, or permit hosting of, sites or information that is advertised by UCE from other networks. Violations of this policy carry severe penalties, including termination of service. Sending a message, especially an advertisement, to more than five recipients, is by itself spamming unless the individuals have specifically requested to be added to a mailing list on that topic. This includes commercial advertisements and informational messages sent to recipients via electronic mail (email) as well as off-topic messages posted in Usenet discussion groups where the recipient has not requested or invited the message. Mailing lists must be true opt-in mailing lists. Before sending any email to a listed user, a confirmation email, with a tracking number, must be sent to the new subscriber, to which they must respond with a confirmation that they wish to be added to the list. You must keep these confirmations on file, so that in the case that a spam complaint is made against you, you have proof that the user did indeed opt-in. In addition, you must provide at least one easy way to opt out; see the MAPS guidelines (http://mail-abuse.org/rbl/manage.html) for details. Opt-out requests must be honored immediately.

E-mail is a person-to-person medium, not a broadcast medium.

Customers of our hosting service are strictly prohibited from using or permitting others to use UCE or SPAM over our network. As our Customers are ultimately responsible for the actions of their clients over our company's network, it is advisable that Customers develop a similar, or stricter, policy for their clients.

Violation of our SPAM policy will result in severe penalties. Upon notification of an alleged violation of our SPAM policy, we will initiate an immediate investigation (within 48 hours of notification). During the investigation, we may restrict customer access to the network to prevent further violations. If a customer is found to be in violation of our SPAM policy, our company may, at its sole discretion, restrict, suspend or terminate customer's account. Further, we reserve the right to pursue civil remedies for any costs associated with the investigation of a substantiated policy violation. We will notify law enforcement officials if the violation is believed to be a criminal offense.

5. Misuse Of Resources
Including but not limited to employing applications which consume excessive CPU time, memory or storage space. Chat/IRC, web proxy and mailing list scripts are not allowed on our network under any circumstances. Streaming media can be a drain on web server resources and as such is not allowed. CGI based message forums which use flat file databases are often found to use excessive system resources, to avoid disappointment please use a PHP/ASP message forum. The use of web cam applications which maintain a constant FTP connection uploading an image at regular intervals is forbidden.
If you are unsure about content you intend to place on our network, please check with us before you do. We reserve the right to determine what constitutes acceptable use.

Version 1.1
 
Copyright © 2005-2014 Inland Host. All rights reserved.
InlandHost specialties: