Join Discord for More Offers!! 🚀🌟

Terms and Conditions

THE COMPANY is committed to the unrestricted transmission of information through the Internet and its various resources. Our goal is to deliver enterprise-quality IT services to our clients, acting as a medium for the exchange of all information. THE COMPANY commits to protecting the source and distribution of information, safeguarding the rights and privileges of those who use it. THE COMPANY does not intend to be a content watchdog; our duty in the information dissemination process is simply to act as a conduit between interested parties. Without contradicting any of the above, THE COMPANY adheres to all local, state, and federal laws governing its activities and the services it provides, directly related to our network and internal systems. The purpose of the Usage Policies is to inform all clients of the expected proper use of our services. Due to the vast number of possibilities presented in maintaining a network of servers, this document is presented to outline general guidelines but does not cover all possible scenarios.

Email Delivery

The sending of unsolicited email (SPAM) is a direct violation of the Usage Policies. This includes sending such messages, supporting such messages via a website, or promoting such services. A definition of SPAM can be found at this link: Legitimate email (non-SPAM) is allowed under the following parameters for shared web hosting services: A) One domain, and all email accounts belonging to it, can only send a total of 200 emails per hour. B) A single email can only have up to 20 recipients. For dedicated servers, it is allowed to send emails without restrictions on the quantity per hour or recipients, as long as the email is legitimate (non-SPAM).

Network Usage

Proper network usage involves utilizing it in any way, as long as no local, state, or federal laws are violated, no damage is done to the network, and it does not interfere with the use of the service by other users on the same network.


All clients are required to maintain and oversee security related to the services they contract, including shared web hosting and dedicated servers. Shared web hosting accounts require the client to take security measures such as password and file/folder permission management. Dedicated servers require basic security actions, including password management, port management, operating system updates, antivirus management, updates to other applications, security policy adjustments, and more. The client is ultimately responsible for the individual security of their server or shared hosting account.


The information contained in the services contracted with our company is 100% the responsibility of the customer. Therefore, the customer is solely responsible for performing necessary backups and ensuring the integrity of their data. In the event of data loss, our company is not responsible for any damage or loss the customer may suffer. It is the customer’s responsibility to carry out the necessary data recovery procedures to retrieve their files. It is crucial for customers to understand that the security and protection of their data are of vital importance to us. However, we cannot guarantee total security due to external factors beyond our control, such as cyberattacks and computer viruses. Therefore, we strongly recommend that customers take additional measures to protect their data, such as using strong passwords and implementing additional security measures in their system. Our company is not responsible for data loss due to hardware or software failures in our servers, configuration errors, or any other problems that may arise. It is the customer’s responsibility to ensure that their data is always protected. Although we offer backup options for our customers, these are provided as an additional service, and we do not guarantee the integrity or availability of backed-up data. Therefore, we highly recommend that customers regularly perform their own external backups.

Resource Usage

THE COMPANY reserves the right to suspend the service, without prior notice and without any right to a refund, if THE CLIENT makes excessive use of resources such as CPU, RAM, hard drives, network cards, and all other hardware and software resources that a server and its network have, to the extent that it affects other users on the same server or network.

Server Content

THE COMPANY does not actively monitor the content of hosting accounts. THE COMPANY believes in the free dissemination of information through our services. The content of an account will only be reviewed if a complaint is received from a third party. Content that does not violate any local, state, federal laws, or Usage Policies will be considered «in compliance» and will remain intact. Legal adult content is allowed within the framework of the law.

IP Address

All Internet Protocol (IP) addresses are owned and managed by THE COMPANY. IP addresses are non-transferable from THE COMPANY, and the customer has no ownership or transfer rights over them. All IP addresses are assigned by equipment. Attempting to use IP addresses not assigned by THE COMPANY is a violation of the Usage Policies.

Unsolicited Email (SPAM)

Sending unsolicited email (SPAM) is a direct violation of the Usage Policies. This includes sending such messages, supporting such messages via a website, or promoting such services.

Copyright Infringement

Direct infringement of copyright as defined and observed in the current FEDERAL LAW OF COPYRIGHT is a direct violation of the Usage Policies. THE CLIENT agrees to indemnify and hold THE COMPANY harmless from damages and/or claims resulting from the illegal use of protected or illegal materials.

Email Bombing

Sending, bouncing, rejecting, or forwarding email to specific user(s) in an attempt to interfere with or disrupt email services is a direct violation of the Usage Policies.


The use of dedicated services to send, receive, forward, or post unsolicited email or messages on USENET is a direct violation of the Usage Policies. This includes USENET services located within THE COMPANY‘s network or on third-party networks.

Illegal Use

Any use of dedicated services aimed at engaging in illegal activities is a direct violation of the Usage Policies. This includes, but is not limited to: death threats, terrorist threats, threats of harm to other individual or multilevel marketing schemes, invasion of privacy, credit card fraud, blackmail, defamation, and other common illegal activities.

Child Pornography

THE COMPANY has a zero-tolerance policy against child pornography and related sites. Hosting child pornography sites, related sites, or information for contact purposes is a direct violation of federal laws and Usage Policies.

Threats and Harassment

THE COMPANY‘s network can be used for any individual, organizational, or business use. This does not include threats or harassment to individuals, organizations, or businesses unless it falls within the limits of freedom of expression protected under federal laws.

Fraudulent Activities

THE COMPANY prohibits the use of dedicated services or network services for fraudulent activities. Notification of fraudulent activities by third parties may result in a violation of the Usage Policies.

Denial of Service (DOS – DDOS)

THE COMPANY absolutely prohibits the use of dedicated services or network services to originate or control DOS or DDOS attacks. Any activity related to executing a DOS or DDOS is a direct violation of the Usage Policies.

Terrorist Website

THE COMPANY prohibits the use of dedicated services for hosting websites related to terrorist activities. This includes sites that promote violence and hate crimes based on religion, ethnic origin, or country of origin.

Distribution of Malware

THE COMPANY prohibits the storage, distribution, manufacture, or use of malware, including viruses, worms, adware, spyware, password decryptors, and other programs used for destructive activities. Programs used as part of the everyday operation of a legitimate business are acceptable, for example, when a security company hosted by THE COMPANY analyzes malicious programs to develop security measures or software.

Identity Theft (Phishing)

THE COMPANY strictly prohibits any activity associated with identity theft and systems designed to store personal information (name, account numbers, usernames, passwords, etc.) under false pretenses. Pages of false identity, forms of identity theft, email distribution, or any activity related to identity theft will result in immediate service suspension.

Reporting Violations

THE COMPANY accepts reports of violations of the Usage Policies via email at [email protected] . Reports of alleged violations must be verified and include the name, contact information, IP address, and a description of the violation. THE COMPANY has no obligation to third parties reporting any alleged violations; however, THE COMPANY will review all verified reports from third parties and take appropriate actions as described within the Usage Policies.

Methods of Resolution of Usage Violations

THE COMPANY‘s goal is to balance the rights and interests of our clients in the rapidly changing world of the Internet. THE COMPANY understands the challenges faced by web hosting companies, resellers, businesses, organizations, and other clients that may incur violations by third parties due to the nature of their business. The goal of our resolution methods is to mitigate any service disruption while resolving a potential violation. Our staff is dedicated to working with you to address potential violations.

Service Suspension

THE COMPANY reserves the right, at its discretion, to not provide services to any individual, group, or business. THE COMPANY also reserves the right to suspend the service with prior notice to THE CLIENT, due to a violation of the Usage Policies.