Acceptable Use Policy
Congratulations! You’ve just embarked on a journey to make the internet a better place. Here at General Hosting, our Acceptable Use Policy is your trusty map, guiding you through the wild terrain of digital conduct. Think of it as a GPS for good behavior—no detours into the murky waters of mischief or the confusing forests of foul play. Buckle up, keep your hands and feet inside the ride at all times, and let’s make sure we’re all on the same page for a smooth and secure hosting experience!
Abuse Definitions
1.1: Resource Abuse
1.1.1 Resource Abuse consists of any activity, intentional or otherwise, that consumes sufficient system resources to negatively affect other clients or equipment.
1.2: Unsolicited Communications
1.2.1 Any email-based communications sent without the consent of the recipient.
1.2.2 Knowingly permitting or initiating Unsolicited Communications is grounds for immediate termination, and a permanent ban from any future service.
1.3: Malicious Content
1.3.1 Any type of script, code, or other file that performs harmful action, either to the user affected or as a bulk action triggered by the user.
1.3.2 Any content that violates the laws of the country the service resides within.
1.3.3 Knowingly permitting or hosting Malicious Content is grounds for immediate termination, and a permanent ban from any future service.
Remedial Action
2.1: Intentional / Malicious Abuse
2.1.1 Intentional / Malicious usage is defined as any action knowingly performed by the user, or persons user has authorized to access the service, that is categorized in the above Abuse Definitions.
2.1.2 All services on the user’s account will immediately be terminated without compensation, saved for situations where a court order demands evidence be turned over to law enforcement.
2.1.3 The user will be permanently banned from holding any further service with Hosting General and related companies.
2.2: Order of Execution During Abuse Offenses
2.2.1 The offending service will be brought offline, and left in a suspended state.
2.2.2 A support ticket will be opened to the service owner detailing the offense and the necessary steps required to resolve the situation.
2.2.3 Once the service owner replies to the ticket acknowledging that they understand the issue and how to correct the problem, the service will be reactivated and the service owner will have 48 hours to prevent any further abuse.