SlideShare a Scribd company logo
1 of 3
Download to read offline
Acceptable Use Policy

The following are considered violations of DDoshostingprotection AUP (Acceptable Use
Policy):
1. Illegal usage: Use of the DDoshostingprotection service for illegal purposes, or in
support of illegal activities. DDoshostingprotection reserves the right to cooperate with legal
authorities and/or injured third parties in the investigation of any suspected crime or civil
wrongdoing.
2. Threats: Use of the DDoshostingprotection service to transmit any material (by e-mail,
uploading, posting or otherwise) that threatens or encourages bodily harm or destruction of
property.
3. Harassment: Use of the DDoshostingprotection service to transmit any material (by e-
mail, uploading, posting or otherwise) that harasses another.
4. Forgery or impersonation: Adding, removing or modifying identifying network header
information in an effort to deceive or mislead is prohibited. Attempting to impersonate any
person by using forged headers or other identifying information is prohibited. The use of
anonymous remailers or nicknames does not constitute impersonation.
5. Fraudulent activity: Use of DDoshostingprotection service to make fraudulent offers to
sell or buy products, items, or services, or to advance any type of financial scam such as
"pyramid schemes" and "chain letters."
6. Unsolicited commercial e-mail / unsolicited bulk e-mail (SPAM): Use of the
DDoshostingprotection service to transmit any unsolicited commercial or unsolicited bulk e-
mail is expressly prohibited. Violations of this type will result in the immediate termination
of the offending DDoshostingprotection account.


IMPORTANT NOTICE
Anyone hosting websites or services on their server that support spammers or cause any of
our IP space to be listed in any of the various Spam Databases will have their server
immediately removed from our network. The server will not be reconnected until such time
that you agree to remove ANY and ALL traces of the offending material immediately upon
reconnection and agree to allow us access to the server to confirm that all material has
been COMPLETELY removed. Severe violations may result in immediate and permanent
removal of the server from our network without notice to the customer. Any server guilty of
a second violation WILL be immediately and permanently removed from our network
without notice.
7. E-mail / News Bombing: Malicious intent to impede another person's use of electronic
mail services or news will result in the immediate termination of the offending
DDoshostingprotection account.

8. E-mail / Message Forging: Forging any message header, in part or whole, of any
electronic transmission, originating or passing through the DDOSHOSTINGPROTECTION
service is in violation of this AUP.

9. Usenet Spamming: DDOSHOSTINGPROTECTION has a zero tolerance policy for the use
of its network for the posting of messages or commercial advertisements, which violate the
rules, regulations, FAQ or charter of any newsgroups or mailing list. Commercial messages
that are appropriate under the rules of a newsgroup or mailing list or that are solicited by
the recipients are permitted.

10. Unauthorized access: Use of the DDOSHOSTINGPROTECTION service to access, or to
attempt to access, the accounts of others, or to penetrate, or attempt to penetrate, security
measures of DDOSHOSTINGPROTECTION is or another entity's computer software or
hardware, electronic communications system, or telecommunications system, whether or
not the intrusion results in the corruption or loss of data, is expressly prohibited and the
offending DDOSHOSTINGPROTECTION account is subject to immediate termination.

11. Copyright or trademark infringement: Use of the DDOSHOSTINGPROTECTION
service to transmit any material (by e-mail, uploading, posting or otherwise) that infringes
any copyright, trademark, patent, trade secret or other proprietary rights of any third party,
including, but not limited to, the unauthorized copying of copyrighted material, the
digitization and distribution of photographs from magazines, books, or other copyrighted
sources, and the unauthorized transmittal of copyrighted software.

12. Collection of personal data: Use of the DDOSHOSTINGPROTECTION service to
collect, or attempt to collect, personal information about third parties without their
knowledge or consent.

13.      Network       disruptions        and       unfriendly  activity: Use     of      the
DDOSHOSTINGPROTECTION service for any activity which affects the ability of other people
or systems to use DDOSHOSTINGPROTECTION Services or the Internet. This includes
"denial of service" (DOS) attacks against another network host or individual user.
Interference with or disruption of other network users, services or equipment is prohibited.
It is the Member's responsibility to ensure that their network is configured in a secure
manner. A Subscriber may not, through action or inaction, allow others to use their network
for illegal or inappropriate actions. A Subscriber may not permit their network, through
action or inaction, to be configured in such a way that gives a third party the capability to
use their network in an illegal or inappropriate manner. Unauthorized entry and/or use of
another company and/or individual's computer system will result in immediate account
termination. DDOSHOSTINGPROTECTION will not tolerate any subscriber attempting to
access the accounts of others, or penetrate security measures of other systems, whether or
not the intrusion results in corruption or loss of data.
14. Fraud: Involves a knowing misrepresentation or misleading statement, writing or
activity made with the intent that the person receiving it will act upon it.


15. Infringement of Copyright, Patent, Trademark, Trade Secret, or Intellectual
Property Right: Distribution and/or posting of copyrighted or the aforementioned
infringements will not be tolerated.

16. Distribution of Viruses: Intentional distributions of software that attempts to and/or
causes damage, harassment, or annoyance to persons, data, and/or computer systems are
prohibited. Such an offense will result in the immediate termination of the offending
account.

17. Inappropriate Use of Software: Use of software or any device that would facilitate a
continued connection, i.e. pinging, while using DDOSHOSTINGPROTECTION services could
result in suspension service.

18. Third Party Accountability: DDOSHOSTINGPROTECTION subscribers will be held
responsible and accountable for any activity by third parties, using their account that
violates guidelines created within the Acceptable Use Policy.

19. Adult content: Adult content is allowed.

20.  IP   Addresses: Using          IP   addresses     that    were     not     assigned       by
DDOSHOSTINGPROTECTION.

21. Support to Terrorists: Using DDOSHOSTINGPROTECTION services to provide support
or resources (including concealing or disguising the nature, location, source, or ownership of
support or resources) to any organization designated by the U.S. government as a terrorist
organization pursuant Section 219 of the Immigration and Nationality Act.

22. Gambling: Using DDOSHOSTINGPROTECTION services for or to promote gambling that
is or may be prohibited or restricted by any state or federal gambling laws or regulations.

23. Harm to Minors / Child Pornography: Using DDOSHOSTINGPROTECTION services to
harm minors in any way or transmitting (by email, uploading, posting or otherwise),
distributing, downloading, copying, caching, hosting or storing on a server any child
pornography as defined by U.S. law. Adult content is allowed.

24. Privacy Policy: Any personal information received will only be used to fill your order.
We will not sell or redistribute your information to anyone.

25. Refund Policy: If you are not 100% satisfied with your purchase, within 120 days from
the purchase date, we will fully refund the cost of your order.

26. Violation of Security: Violating        or   attempting   to   violate    the   security   of
DDOSHOSTINGPROTECTION systems.

More Related Content

What's hot

11. cs sr p - computer misuse act 1990
11. cs   sr p - computer misuse act 199011. cs   sr p - computer misuse act 1990
11. cs sr p - computer misuse act 1990missstevenson01
 
Acceptable Use Policy
Acceptable Use PolicyAcceptable Use Policy
Acceptable Use Policybutest
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality reportJonan Momo
 
Terms and conditions
Terms and conditionsTerms and conditions
Terms and conditionsTom Marshall
 
Briefpack library system license terms & privacy policy 2020
Briefpack library system license terms & privacy policy 2020Briefpack library system license terms & privacy policy 2020
Briefpack library system license terms & privacy policy 2020EmmanuelGazelle
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-finalAldrin SuperGo
 
4 2 essentials Internet Usage Policy
4 2 essentials   Internet Usage Policy4 2 essentials   Internet Usage Policy
4 2 essentials Internet Usage PolicyWirralCT
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use PolicyJennifer Whitt
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlineemarlh
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)scobycakau
 
Internet usepolicy
Internet usepolicyInternet usepolicy
Internet usepolicyAnkit Juneja
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime actCP-Union
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyNani Owen
 

What's hot (16)

11. cs sr p - computer misuse act 1990
11. cs   sr p - computer misuse act 199011. cs   sr p - computer misuse act 1990
11. cs sr p - computer misuse act 1990
 
Acceptable Use Policy
Acceptable Use PolicyAcceptable Use Policy
Acceptable Use Policy
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
Terms and conditions
Terms and conditionsTerms and conditions
Terms and conditions
 
Briefpack library system license terms & privacy policy 2020
Briefpack library system license terms & privacy policy 2020Briefpack library system license terms & privacy policy 2020
Briefpack library system license terms & privacy policy 2020
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 
NYPD Twitter Strategy
NYPD Twitter StrategyNYPD Twitter Strategy
NYPD Twitter Strategy
 
4 2 essentials Internet Usage Policy
4 2 essentials   Internet Usage Policy4 2 essentials   Internet Usage Policy
4 2 essentials Internet Usage Policy
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use Policy
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
 
Internet usepolicy
Internet usepolicyInternet usepolicy
Internet usepolicy
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Similar to ddos protection

Saudi Arabia's Anti-Cyber Crime Law
Saudi Arabia's Anti-Cyber Crime LawSaudi Arabia's Anti-Cyber Crime Law
Saudi Arabia's Anti-Cyber Crime LawAbiel Abuy
 
Acceptable Use Policy.docx
Acceptable Use Policy.docxAcceptable Use Policy.docx
Acceptable Use Policy.docxSALU18
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditTamir Harper
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillTeeth Maestro
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]leslieannpt
 
It policy (ver 1.0)
It policy (ver  1.0)It policy (ver  1.0)
It policy (ver 1.0)sentmery5
 
Ten commandments
Ten commandmentsTen commandments
Ten commandmentslsanford84
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentcparimala
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionHannah323676
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentRajshekar786
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement toolsMarkDennielMontiano
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportAbdul Rehman
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber lawsishmecse13
 
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓNPOLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓNLuis Antonio Bustillos López
 
Site terms and conditions of use
Site terms and conditions of useSite terms and conditions of use
Site terms and conditions of useMarvinda Rajed
 

Similar to ddos protection (20)

Saudi Arabia's Anti-Cyber Crime Law
Saudi Arabia's Anti-Cyber Crime LawSaudi Arabia's Anti-Cyber Crime Law
Saudi Arabia's Anti-Cyber Crime Law
 
Acceptable Use Policy.docx
Acceptable Use Policy.docxAcceptable Use Policy.docx
Acceptable Use Policy.docx
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEdit
 
IT ACT Sec 66.ppt
IT ACT Sec 66.pptIT ACT Sec 66.ppt
IT ACT Sec 66.ppt
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime Bill
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
 
It policy (ver 1.0)
It policy (ver  1.0)It policy (ver  1.0)
It policy (ver 1.0)
 
Ten commandments
Ten commandmentsTen commandments
Ten commandments
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement tools
 
Anti Spam Policy
Anti Spam PolicyAnti Spam Policy
Anti Spam Policy
 
Notice to client form
Notice to client formNotice to client form
Notice to client form
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 Report
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓNPOLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
 
Site terms and conditions of use
Site terms and conditions of useSite terms and conditions of use
Site terms and conditions of use
 

ddos protection

  • 1. Acceptable Use Policy The following are considered violations of DDoshostingprotection AUP (Acceptable Use Policy): 1. Illegal usage: Use of the DDoshostingprotection service for illegal purposes, or in support of illegal activities. DDoshostingprotection reserves the right to cooperate with legal authorities and/or injured third parties in the investigation of any suspected crime or civil wrongdoing. 2. Threats: Use of the DDoshostingprotection service to transmit any material (by e-mail, uploading, posting or otherwise) that threatens or encourages bodily harm or destruction of property. 3. Harassment: Use of the DDoshostingprotection service to transmit any material (by e- mail, uploading, posting or otherwise) that harasses another. 4. Forgery or impersonation: Adding, removing or modifying identifying network header information in an effort to deceive or mislead is prohibited. Attempting to impersonate any person by using forged headers or other identifying information is prohibited. The use of anonymous remailers or nicknames does not constitute impersonation. 5. Fraudulent activity: Use of DDoshostingprotection service to make fraudulent offers to sell or buy products, items, or services, or to advance any type of financial scam such as "pyramid schemes" and "chain letters." 6. Unsolicited commercial e-mail / unsolicited bulk e-mail (SPAM): Use of the DDoshostingprotection service to transmit any unsolicited commercial or unsolicited bulk e- mail is expressly prohibited. Violations of this type will result in the immediate termination of the offending DDoshostingprotection account. IMPORTANT NOTICE Anyone hosting websites or services on their server that support spammers or cause any of our IP space to be listed in any of the various Spam Databases will have their server immediately removed from our network. The server will not be reconnected until such time that you agree to remove ANY and ALL traces of the offending material immediately upon reconnection and agree to allow us access to the server to confirm that all material has been COMPLETELY removed. Severe violations may result in immediate and permanent removal of the server from our network without notice to the customer. Any server guilty of a second violation WILL be immediately and permanently removed from our network without notice.
  • 2. 7. E-mail / News Bombing: Malicious intent to impede another person's use of electronic mail services or news will result in the immediate termination of the offending DDoshostingprotection account. 8. E-mail / Message Forging: Forging any message header, in part or whole, of any electronic transmission, originating or passing through the DDOSHOSTINGPROTECTION service is in violation of this AUP. 9. Usenet Spamming: DDOSHOSTINGPROTECTION has a zero tolerance policy for the use of its network for the posting of messages or commercial advertisements, which violate the rules, regulations, FAQ or charter of any newsgroups or mailing list. Commercial messages that are appropriate under the rules of a newsgroup or mailing list or that are solicited by the recipients are permitted. 10. Unauthorized access: Use of the DDOSHOSTINGPROTECTION service to access, or to attempt to access, the accounts of others, or to penetrate, or attempt to penetrate, security measures of DDOSHOSTINGPROTECTION is or another entity's computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in the corruption or loss of data, is expressly prohibited and the offending DDOSHOSTINGPROTECTION account is subject to immediate termination. 11. Copyright or trademark infringement: Use of the DDOSHOSTINGPROTECTION service to transmit any material (by e-mail, uploading, posting or otherwise) that infringes any copyright, trademark, patent, trade secret or other proprietary rights of any third party, including, but not limited to, the unauthorized copying of copyrighted material, the digitization and distribution of photographs from magazines, books, or other copyrighted sources, and the unauthorized transmittal of copyrighted software. 12. Collection of personal data: Use of the DDOSHOSTINGPROTECTION service to collect, or attempt to collect, personal information about third parties without their knowledge or consent. 13. Network disruptions and unfriendly activity: Use of the DDOSHOSTINGPROTECTION service for any activity which affects the ability of other people or systems to use DDOSHOSTINGPROTECTION Services or the Internet. This includes "denial of service" (DOS) attacks against another network host or individual user. Interference with or disruption of other network users, services or equipment is prohibited. It is the Member's responsibility to ensure that their network is configured in a secure manner. A Subscriber may not, through action or inaction, allow others to use their network for illegal or inappropriate actions. A Subscriber may not permit their network, through action or inaction, to be configured in such a way that gives a third party the capability to use their network in an illegal or inappropriate manner. Unauthorized entry and/or use of another company and/or individual's computer system will result in immediate account termination. DDOSHOSTINGPROTECTION will not tolerate any subscriber attempting to access the accounts of others, or penetrate security measures of other systems, whether or not the intrusion results in corruption or loss of data.
  • 3. 14. Fraud: Involves a knowing misrepresentation or misleading statement, writing or activity made with the intent that the person receiving it will act upon it. 15. Infringement of Copyright, Patent, Trademark, Trade Secret, or Intellectual Property Right: Distribution and/or posting of copyrighted or the aforementioned infringements will not be tolerated. 16. Distribution of Viruses: Intentional distributions of software that attempts to and/or causes damage, harassment, or annoyance to persons, data, and/or computer systems are prohibited. Such an offense will result in the immediate termination of the offending account. 17. Inappropriate Use of Software: Use of software or any device that would facilitate a continued connection, i.e. pinging, while using DDOSHOSTINGPROTECTION services could result in suspension service. 18. Third Party Accountability: DDOSHOSTINGPROTECTION subscribers will be held responsible and accountable for any activity by third parties, using their account that violates guidelines created within the Acceptable Use Policy. 19. Adult content: Adult content is allowed. 20. IP Addresses: Using IP addresses that were not assigned by DDOSHOSTINGPROTECTION. 21. Support to Terrorists: Using DDOSHOSTINGPROTECTION services to provide support or resources (including concealing or disguising the nature, location, source, or ownership of support or resources) to any organization designated by the U.S. government as a terrorist organization pursuant Section 219 of the Immigration and Nationality Act. 22. Gambling: Using DDOSHOSTINGPROTECTION services for or to promote gambling that is or may be prohibited or restricted by any state or federal gambling laws or regulations. 23. Harm to Minors / Child Pornography: Using DDOSHOSTINGPROTECTION services to harm minors in any way or transmitting (by email, uploading, posting or otherwise), distributing, downloading, copying, caching, hosting or storing on a server any child pornography as defined by U.S. law. Adult content is allowed. 24. Privacy Policy: Any personal information received will only be used to fill your order. We will not sell or redistribute your information to anyone. 25. Refund Policy: If you are not 100% satisfied with your purchase, within 120 days from the purchase date, we will fully refund the cost of your order. 26. Violation of Security: Violating or attempting to violate the security of DDOSHOSTINGPROTECTION systems.