Use the promotion code PROMO-10 for 10% recurring discount on our services

This AUP governs the use of's web hosting services. Violation of this AUP may result in suspension or termination of your service. In the event of a dispute between you and regarding the interpretation of this AUP,'s interpretation, in its reasonable commercial judgment, shall govern.

The following is the entire Acceptable User Policy ('AUP') agreement between and the personal or corporate account holder. provides web hosting, management, and script installation. has certain legal and ethical responsibilities consisting of the use of its servers and equipment involved in these services.'s general policy is to act as a provider of Internet presence. reserves the right to suspend or cancel a customer's access to any or all services provided by when we decide that the account has been inappropriately used.

WHAT IS APPROPRIATE USAGE? is designed to serve the web hosting needs of small, independently owned, and operated businesses in a single country. It is not appropriate to use our services to support large enterprises or internationally based businesses with a sustained demand that places an undue burden on our systems or negatively impacts use by small, independently owned, and operated businesses. is a shared web hosting service, which means that a number of customers' websites and other email or storage services are hosted from the same server. uses abuse controls to help ensure that the use of our services does not adversely affect the performance of our system or other customers' sites. It is not appropriate to use an account primarily as an online storage space or for archiving electronic files.


You do not have to worry about hitting a storage limit if you use our services consistently with the terms of Service and our acceptable usage policy. will increase your space along with your appropriate small business needs, but our abuse controls may impact the rate of growth or your folder size, and there may be a short delay while we assess your usage. In some cases, creating additional folders or subfolders will help ensure that the system works well for everyone. You will always be allowed to use as much disk space is applied to your account.


You may have noticed all of our accounts come with unlimited email accounts, sub-domains, FTP accounts, and in some cases domains. This is subject to how much disk space your account has. So you can create as many emails, sub-domains, etc as you want as long as it's within your disk space limit.


All accounts are protected by CloudLinux virtualization. The resources allocated to our clients through packages are not dedicated to the account, and no right to use the entirety of any resource is given. These are in place to lessen attack disruption and/or abusive behavior from affecting other customers on the same node. If you are persistently reaching these limits, we may request that you upgrade your plan (if applicable) or move to a more powerful environment such as a VPS or dedicated server. We retain the right to change these limits without notice and to suspend service(s) that are persistently reaching their resource limits.


All cPanel host nodes run daily backups of accounts, the maximum retention period is 45 days. This process happens during off-peak hours and may cause a decrease in server performance during this time, we are not responsible for any performance decrease during the process. Accounts using more than 100GB quota and/or 300,000 inodes are excluded from the backup process to ensure tasks are completed in a timely manner without hindering performance. We provide these backups as an emergency fail-safe and cannot guarantee their availability to users.

Backups older than 30 days in a user account may be removed from the server at our discretion.

You agree that we may remove impermissible data from our servers at any time at our sole discretion without notice. We may also delete the following types of files if we find them to be using excessive amounts of disk space, especially if affecting other users:
cPanel or other backups stored locally.
Softaculous backups stored locally.
Softaculous backup temp files.
Common CMS backups stored locally.
Common CMS backup temp files.
Common CMS backup logs.
Excessively sized error logs.
Any other large files deemed unnecessary for core website functionality or not containing any valuable data.


You may not publish or transmit via's service any content that reasonably believes:
a) constitutes child pornography;
b) is excessively violent, incites violence, threatens violence, or contains harassing content or hate speech;
c) is unfair or deceptive under the consumer protection laws of any jurisdiction, including chain letters and pyramid schemes;
d) is defamatory or violates a person's privacy;
e) creates a risk to a person's safety or health, creates a risk to public safety or health, compromises national security, or interferes with an investigation by law enforcement;
f) improperly exposes trade secrets or other confidential or proprietary information of another person;
g) is intended to assist others in defeating technical copyright protections;
h) clearly infringes on another person's trade or service mark, patent, or another property right;
i) promotes illegal drugs, violates export control laws, relates to illegal gambling, or illegal arms trafficking;
j) is otherwise illegal or solicits conduct that is illegal under laws applicable to you or to;
k) is otherwise malicious, fraudulent, or may result in retaliation against by offended viewers; does not accept material such as:
a) Proxy, Warez, Escrow, High Yield Investment Programs (HYIP), illegal Gambling, and Lottery sites.
b) Content 'published or transmitted via's service includes Web content, e-mail, bulletin board postings, chat, and any other type of posting or transmission that relies on any Internet service provided by
* can terminate service for any of the above reasons and it's at's sole discretion to issue a refund.


You must take reasonable security precautions. You must protect the confidentiality of your password, and you should change your password periodically.


Users who are targeted with frequent and/or disruptive attacks may have action taken against their service and/or account. If your service(s) are found to be impacting the experience of other users persistently, you will be notified via ticket and requested to prevent further damages from occurring or relocate to another provider.


Bulk commercial emails are not supported on's servers, we do however allow a maximum of 100 emails per hour from each cPanel account, which can be increased, within reason, on request. For any emails sent from your account, you must adhere to the following rules:

a) Your intended recipients have given their consent to receive e-mail via some affirmative means, such as an opt-in procedure;
b) Your procedures for soliciting consent include reasonable means to ensure that the person giving consent is the owner of the e-mail address for which the consent is given;
c) You may not obscure the source of your e-mail in any manner.
d) You otherwise comply with the CAN-SPAM Act and other applicable laws.

These policies apply to messages sent using your service, or to messages sent from any network by you or any person on your behalf that directly or indirectly refer the recipient to a site hosted via your service. In addition, you may not use a third-party e-mail service that does not practice similar procedures for all its customers.


You may not send any unsolicited e-mail, either in bulk or individually, to any person who has indicated that they do not wish to receive it. You must comply with the rules of any other network you access or participate in using your's services.


The following uses are prohibited on our network. Engaging in these activities on our services will result in an account and/or service suspension without notice.

Copyrighted content hosting and/or linking to pirated content
Open proxies
Stressers/booter websites
Mail/SMS bombers
Mass mail
Resource intensive activities (CPU, I/O, Network, etc)
IP spoofing
Network/port Scanning
Distribution of credentials and/or personal information
Denial of Service (DDoS attacks)
TOR exit nodes
Open DNS resolvers
Virtual currency (coin) mining
World Community Grid, Folding at Home, or similar software
HitLeap or any artificial traffic creation
HYIP websites
iBusinessPromoter or similar software
Vulnerability scanning
Social media crawlers
Illegal pornography
Telnet or SSH access scripts
Destructive activities including but not limited to phishing, malware, and/or distributing malicious content
Illegal activities including but not limited to ponzi schemes, pyramid schemes, phishing, scam websites, and pirating software
Video streaming
Content delivery networks (CDN)
Multics, CCcam, or any other card sharing software
Chinese private game servers and related websites
Any form of file hosting, file storage, cyberlocker, leeching, or similar activity is prohibited


You may not publish, distribute, or otherwise copy in any manner any music, software, art, or other work protected by copyright law unless:
a) you have been expressly authorized by the owner of the copyright for the work to copy the work in that manner.
b) you are otherwise permitted by established Canada copyright law to copy the work in that manner. will terminate the service of repeat copyright infringers.


You must have valid and current information on file with your domain name registrar for any domain hosted on the network.

DISCLAIMER is under no duty and does not by this AUP undertake a duty, to monitor or police our customers' activities and disclaim any responsibility for any misuse of the network.


You may not engage in illegal, abusive, or irresponsible behavior, including:

a) Unauthorized access to or use of data, systems, or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures (including those belonging to and its customers) without express authorization of the owner of the system or network;
b) monitoring data or traffic on any network or system without the authorization of the owner of the system or network;
c) Interference with service to any user, host, or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks;
d) Use of an Internet account or computer without the owner's authorization, including, but not limited to Internet scanning (tricking other people into releasing their passwords), password robbery, security hole scanning, and port scanning;
e) Forging of any TCP-IP packet header or any part of the header information in an e-mail or a newsgroup posting; or
f) Any conduct that is likely to result in retaliation against the network.
g) Use of's network in a way that unreasonably interferes with's other customer's use of the network


You must comply with the rules and conventions for postings to any bulletin board, chat group, or another forum in which you participate, such as IRC and USENET groups including their rules for content and commercial postings. These groups usually prohibit the posting of off-topic commercial messages or mass postings to multiple forums.

Powered by WHMCompleteSolution