Services are purchased for a period of one month. The time period begins at the exact moment of service activation, and expires at the same moment on the next month, unless the next month is shorter, in which case a different expiration date will be calculated. You are notified of an expiration date for a service on the appropriate dashboard for that service. Failure to renew the service or make contact with us notifying us when you intend to renew the service may result in suspension and later termination of the expired service at any time after the expiry date has passed.
All services which are legal in the US and locale where a service is provisioned are allowed except for the following exceptions: Automated mass-mailing of any kind: no automated mass-mailing is allowed except with explicit approval of our network engineering group Use of tools intended to waste bandwidth: on plans which provide unmetered bandwidth, tools designed to waste the bandwidth, such as but not limited to, iperf and TOR configured as an aggressive bridge node, are prohibited. Open Proxies, Open Mail Relays and TOR Exit Nodes Cryptocurrency miners High yield interest program (HYIP) or Multi-level Marketing (MLM) sites Penetration-testing tools: penetration-testing tools are only allowed in the context of auditing your own services, or in the event that you have explicit documentation of consent.
Where required to by law, DMCA notifications must be generated by an actual natural person and electronically mailed to firstname.lastname@example.orgOur interpretation of the DMCA classifies us as a network infrastructure provider pursuant to 17 USC 512(b). Thusly, if a downstream customer has their own DMCA contact, you must contact them directly. Furthermore, we do not have the ability to take down specific infringing content published by downstream customers.
Order Forms Our site uses an order form for customers to request services. We collect sensitive information which is used only for our purposes. No third party receives any type of information from us. Contact information from the order forms is used to get in touch with the customer when necessary. Billing information that is collected is used to bill the user for services. Vistor IP addresses are recorded for use by our billing software and analytics system. This web site has security measures in place to protect the loss, misuse, and alteration of the information under our control. We use strong SSL encryption to ensure security of your data in transit. Information collected on this site is strictly for our use, NO OTHER OUTSIDE PERSONS MAY VIEW YOUR PERSONAL INFORMATION SUCH BILLING INFORMATION, ETC.