Services are purchased for a period of one month. The time period begins at the exact moment of service activation, and expires at the same moment on the next month, unless the next month is shorter, in which case a different expiration date will be calculated. You are notified of an expiration date for a service on the appropriate dashboard for that service. Failure to renew the service or make contact with us notifying us when you intend to renew the service may result in suspension and later termination of the expired service at any time after the expiry date has passed.
In some circumstances, we may terminate your service and refund any remaining credit on the account back to the payment method.
We may terminate the service in conditions where business continuity is impossible in a specific location or region and no substitute is available; Court orders: we may be ordered by a court to terminate your services, due to criminal activity; Excessive abuse complaints: we may terminate your service if we receive, in our view, too many abuse complaints concerning one or more of your services; Fraud: we will terminate your service if we believe that the payment method used was fraudulent, or service was initiated from an IP address that was previously associated with a terminated account; Harrassing or threatening staff: we will terminate your service immediately if you harrass, intimidate or threaten a member of our staff; Activity that is expressly forbidden by our AUP: we may terminate service that is being used to directly violate our AUP, on a case-by-case basis.
All services which are legal in the US and locale where a service is provisioned are allowed except for the following exceptions: Automated mass-mailing of any kind: no automated mass-mailing is allowed except with explicit approval of our network engineering group Use of tools intended to waste bandwidth: on plans which provide unmetered bandwidth, tools designed to waste the bandwidth, such as but not limited to, iperf and TOR configured as an aggressive bridge node, are prohibited. Open Proxies, Open Mail Relays and TOR Exit Nodes Cryptocurrency miners High yield interest program (HYIP) or Multi-level Marketing (MLM) sites Penetration-testing tools: penetration-testing tools are only allowed in the context of auditing your own services, or in the event that you have explicit documentation of consent.
Where required to by law, DMCA notifications must be generated by an actual natural person and electronically mailed to email@example.comOur interpretation of the DMCA classifies us as a network infrastructure provider pursuant to 17 USC 512(b). Thusly, if a downstream customer has their own DMCA contact, you must contact them directly. Furthermore, we do not have the ability to take down specific infringing content published by downstream customers.
Order Forms Our site uses an order form for customers to request services. We collect sensitive information which is used only for our purposes. No third party receives any type of information from us. Contact information from the order forms is used to get in touch with the customer when necessary. Billing information that is collected is used to bill the user for services. Vistor IP addresses are recorded for use by our billing software and analytics system. This web site has security measures in place to protect the loss, misuse, and alteration of the information under our control. We use strong SSL encryption to ensure security of your data in transit. Information collected on this site is strictly for our use, NO OTHER OUTSIDE PERSONS MAY VIEW YOUR PERSONAL INFORMATION SUCH BILLING INFORMATION, ETC.