CUSTOMER HOSTING PRODUCT AGREEMENT EXTENSION
IIW Hosting (hereinafter referred to as "Parent") and you (hereinafter referred to as "Customer")HAVEentered into a Customer Master Agreement effective from December 14, 2011 of which this "Customer Hosting
Product Agreement Extension" is a part.whereas Parent provides Web and Email Hosting Services;whereas the Customer wishes to place an Order for Web and/or Email Hosting Services ("Hosting Order") through the
Parent;Now, Therefore, for and in consideration of the mutual promises, benefits and covenants contained herein and for other good and valuable consideration, the receipt, adequacy and sufficiency of which
are hereby acknowledged, Parent and the Customer, intending to be legally bound, hereby agree as follows:
While certain attributes of the Hosting Order may consist of unlimited resources, Customer recognises that the Hosting Order is a shared hosting service, and that the Parent has the right in its sole
discretion to apply any hard limits on any specific attribute or resource on the Hosting Order at any given time without notice in order to prevent degradation of its services, or incase of any breach or
violation or threatened breach or violation of this Agreement, or incase Parent learns of a possibility of breach or violation of this Agreement which Parent in its sole discretion determines to be
appropriate, or to protect the integrity and stability of the Parent Products and the OrderBox, or to avoid any liability, civil or criminal, on the part of Parent and/or Service Providers, or for any other
appropriate reason. The Customer agrees that Parent and Service Providers, and the contractors, employees, directors, officers, representatives, agents and affiliates, of Parent and Service Providers, are not
liable for loss or damages that may result from any of the above.
Customer, or its contractors, employees, directors, officers, representatives, agents and affiliates and OrderBox Users, either directly or indirectly, shall not use or permit use of the Hosting Order, in
violation of this Agreement, and for any of the activities described below -
- As a backup/storage device.
-
For any unacceptable or inappropriate material as determined by Parent in its sole discretion, including but not limited to Topsites, IRC Scripts/Bots, Proxy Scripts/Anonymizers, Pirated Software/Warez,
Image Hosting Scripts (similar to Photobucket or Tinypic), AutoSurf/PTC/PTS/PPC sites, IP Scanners, Bruteforce Programs/Scripts/Applications, Mail Bombers/Spam Scripts, Banner-Ad services (commercial
banner ad rotation), File Dump/Mirror Scripts (similar to rapidshare), Commercial Audio Streaming (more than one or two streams), Escrow/Bank Debentures, High-Yield Interest Programs (HYIP) or Related
Sites, Investment Sites (FOREX, E-Gold Exchange, Second Life/Linden Exchange, Ponzi, MLM/Pyramid Scheme), Sale of any controlled substance without prior proof of appropriate permit(s), Prime Banks
Programs, Lottery Sites, MUDs/RPGs/PPBGs, Hateful/Racist/Harassment oriented sites, Hacker focused sites/archives/ programs, Sites promoting illegal activities, Forums and/or websites that distribute or
link to warez/pirated/illegal content, Bank Debentures/Bank Debenture Trading Programs, Fraudulent Sites (Including, but not limited to sites listed at aa419.org & escrow-fraud.com), Mailer Pro.
- Use over 25% of system resources, including but not limited to Memory, CPU, Disk, Network, and Bandwidth capacity, for longer than 90 seconds in any consecutive 6 hour period.
- Execute long-running, stand-alone, unattended server-side processes, bots or daemons.
- Run any type of web spiders or indexers.
- Run any software that interfaces with an IRC (Internet Relay Chat) network.
- Run, host, or store any P2P client, tracker, software, server, files, content or application, including bittorrent.
- Participate in any P2P or file-sharing networks.
- Run any gaming servers.
- Run cron entries with intervals of less than 15 minutes.
- Store over 100,000 files.
- Constantly create and delete large numbers of files on a regular basis, or cause file system damage.
- Run any MySQL queries longer than 15 seconds.
- Divide Multi-Domain Hosting Orders into smaller packages to resell. Multi-Domain Hosting Orders may be used by only one company/Customer to host multiple domain names/websites.
-
Use excessive resources which in the Parent's sole discretion result in damage or degradation to the performance, usage, or experience of OrderBox, other users, other orders, and any of Parent's services.
- Store a large number of media files (audio, video, etc.), wherein the limit is at Parent's sole discretion.
- Send over 100 messages per hour per user and/or 300 messages per hour for a domain name. Receive a high volume of emails, by a user or domain name, in any given period of time.
- Use the email service for sending or receiving unsolicited emails.
-
Use the email service for sending or receiving emails through automated scripts hosted on your website. For sending out promotional emails, email campaigns, etc., we recommend using the Mailing Lists
feature rather than using your email account. Upon detection of such mails going through the regular mailing system, such mails will get classified as spam even though the recipient might have opted in
for receiving such mails. This would lead to immediate cessation of mail sending capabilities for the user or the domain name. Frequent violation would lead to permanent suspension of the domain name.
-
Sending mails to invalid recipient email addresses. On receipt of too many bounce back messages due to invalid recipient email addresses, the user sending such mails would get blocked. Frequent violation
would lead to permanent suspension of the domain name.
-
Sending mails from an email address that is not valid and which results in triple bounces would result in suspension of the user sending such mails. Frequent violation would lead to permanent suspension
of the domain name.
-
Send emails with malicious content. Such emails could be emanating from user(s) whose machine(s) are infected with a virus or malware and such activity could be happening without the user(s) knowledge or
user(s) could be unknowingly sending out emails whose receivers may deem them as unsolicited.
- Purchase/use a Dedicated IP Address without installing an SSL Certificate.