acceptable-usage-policy

Contact Us

Call us today on
1300 728 268 for more information about our VPS acceptable usage policy.

Enjoy complete and professional service with our approved VPS acceptable usage policy

In order to provide a professional service, we have set up a few guidelines for users of our service. Some of these guidelines may seem strict, but they ensure a safe, functional, and trusted environment for all our customers to publish their information on the Web.

Many of our competitors do not require their customers to comply with these guidelines. If any of our potential customers are unwilling or unable to comply with these guidelines, we respectfully invite them to visit one of our competitors.

Use of our service

Whether directly or indirectly using our services, constitutes your acceptance of these terms and agreement to abide by them. We reserve the right to amend or adjust these terms at any time, though we'll do our best to notify you in advance. Your continued use of our services constitutes your acceptance of any changes we make.

You are solely and fully responsible for the contents of your account. Any and all repercussions will be borne solely by you as the account holder.

And whilst we don't want to make a whole pile of rules, in essence if you obey the laws of the country or state in which your VPS is located we shouldn't have any problems. However, there are certain things we will not tolerate and these need to be spelt out in plain English.

Things we will not tolerate

You may not publish/host any material that is grossly offensive, including, exploitation of children, blatant expressions of bigotry, hatred, harassment, defamation, or invasion of privacy.

Obscene publications* incl but not limited to Child Pornogaphry, Beastality, golden/scat (NZ), abduction/rape/snuff films.

Hacking, cracking, piracy, phreaking, phishing, scamming, warez, pyrotechnics, exploitive software or text that educates or encourages this activity and/or use.

Anything Tor related Eg: Tor hidden servers, exit nodes, relays, directories.

You may not store or index any material that violates or infringes on the copyright, intellectual property rights or trademark rights of any individual or organization, this includes housing a seed box for torrenting infringing content or any hosting of ROMs or Emulators.

IRC clients are OK. If you attract attention to yourself by spamming or getting DDoS'd your service will be terminated immediately. If we find that your VPS server is being used to direct/control any botnet, malicious content or traffic it will also be terminated immediately.

You are solely and fully responsible for the contents of your account. Any and all repercussions will be borne solely by you as the account holder.

Denial of Service

Any activity to implement or assist in the implementation of denial of service attack. TMC absolutely prohibits the use of Services for the origination, propagation or control of denial of service attacks ("DoS") or distributed denial of service attacks ("DDoS"). Customers may not utilize the Services to perform DoS or DDoS mitigation activities (such as service proxying or data scrubbing) which may result in attracting inbound denial of service attacks toward the Services. Any relation to DoS or DDoS type activity is a direct violation of TMC’s AUP.

Server Abuse

Any attempts to undermine or cause harm to a TMC server or subscriber of TMC is strictly prohibited including, but not limited to:

Logging into a server or account that you are not authorized to access.

Accessing data or taking any action to obtain services or information not intended for you or your use without the consent of the owner.

Tampering, hacking, modifying, or otherwise corrupting or breaching security or authentication measures without proper authorization.

Transmitting material that contains viruses, Trojan horses, worms, time bombs, cancelbots or other computer programming routines or engines with the intent or effect of damaging, destroying, disrupting or otherwise impairing a computer’s functionality or the operation of the TMC’s systems.

Monitoring data or traffic on any network or system without the express authorization of the owner of the system or network.

Interfering with, intercepting or expropriating any system, data or information which you do not have the right to access.

Interfering with service to any user, host or network including, without limitation, by means of overloading, "flooding", "mail bombing", or "crashing" any computer system.

You agree that we may quarantine or delete any data stored on the TMC network if the data is infected with a virus, or is otherwise corrupted, and has the potential to infect or corrupt the network or other customers’ data that is stored on the network.

Email Usage Policies

TMC does not support unsolicited email messages sent by users of our system ( also known as junk email or spam ). Users sending unsolicited email messages from our system will have all of their services temporarily suspended. They will then be contacted by TMC and informed of the suspension before having their services reinstated. A repeated offense may cause cancellation of service without refund of any fees.

Fraudulent Activities

TMC prohibits utilizing dedicated services or network services for fraudulent activities. Participation in fraudulent activities is in direct violation of state and federal law and TMC’s AUP.

Violation of Intellectual Property Rights

Violation of Intellectual Property Rights: The Services and/or Third Party Services shall not be used to publish, submit/receive, upload/download, post, use, copy or otherwise reproduce, transmit, retransmit, distribute or store any content/material or to engage in any activity that infringes, misappropriates or otherwise violates the intellectual property rights or privacy or publicity rights of TMC or any other party, including but not limited to any rights protected by any copyright, patent, trademark laws, trade secret, trade dress, right of privacy, right of publicity, moral rights or other intellectual property right now known or later recognized by statute, judicial decision or regulation.

Distribution of Malware

TMC prohibits the storage, distribution, fabrication, or use of malware including virus software, root kits, password crackers, adware, keystroke capture programs and other programs normally used in malicious activity. The use of such programs in the normal ordinary course of business, however, may be requested by Customer and approved by TMC on a case by case basis. Example: Security company using the Services to analyze the latest root kit for new security analysis/software.

Phishing

TMC strictly prohibits any activity associated with phishing or systems designed to collect personal information (name, account numbers, user names, passwords, etc.) under false pretense. Splash pages, phishing forms, email distribution, proxy email or any relation to phishing activities will result in immediate removal or suspension of Customer’s account.

Vulnerability Monitoring and Testing

You may not attempt to probe, scan, penetrate or test the vulnerability of a TMC system, subsystem or network or to attempt to breach security or authentication measures, whether by passive or intrusive techniques, without TMC’s express written consent.

Bulk Mail

You may not use any TMC Service to send Bulk Mail. “Bulk Mail” means email messages of similar content that are sent to more than two hundred and fifty (250) recipients. Attempts to circumvent this restriction by breaking up bulk email over time, using multiple accounts, or other means will be a violation of this restriction. A mail message sent to other users within your domain names hosted on the TMC system is not considered Bulk Mail.

Unsolicited Mail

You may not send unsolicited email. Email is unsolicited if you have no pre-existing relationship with the recipient, unless the recipient has published or otherwise provided his or her email address in a manner which implies consent to receive the email. You may not send email of any kind to a person who has indicated that they do not wish to receive it. This prohibition includes the direct sending and receiving of such messages, support of such messages via web page, splash page or other related sites, or the advertisement of such services. The falsifying of packet header, sender, or user information whether in whole or in part to mask the identity of the sender, originator or point of origin or knowingly deleting any author attributions, legal notices or proprietary designations or labels in a file that the Customer mails or sends. Any such email shall comply with all laws and regulations, including without limitation, The Unsolicated Electronic Messages Act 2007 (the UEM SPAM Act).

Message Source

You may not obscure the source of your email in any manner, including by intentionally omitting, forging, or misrepresenting messages headers or return addresses.

Email Abuse Complaints

Complaints from email recipients and third-party abuse agencies (e.g. SpamHaus or Spamcop) shall be deemed proof of the facts stated therein unless you provide reasonable evidence to the contrary. TMC shall have the right to terminate your mail service if we receive excessive or repeated complaints from your email recipients, regardless of whether you are in breach of this AUP or are otherwise at fault.

Blacklisting/Retaliation

TMC may terminate your Services if your email address or related IP number(s) is/are blacklisted by any third-party, or TMC is retaliated against as a result of your use of the mail system, regardless of whether you are in breach of this AUP or are otherwise at fault.

UseNet SPAM

The use of dedicated services to send, receive, forward, or post UseNet unsolicited email or posts is a direct violation of TMC’s AUP. This includes UseNet services located within the TMC network or unrelated third party networks.

Illegal Activities

Customers caught using our system for illegal activities, including but not limited to breaking into remote systems, credit card fraud, theft, vandalism, threats, or violence, will have their accounts immediately cancelled without refund of any fees.

Further Terms of Service

In no event will TMC be liable for any losses or damages arising out of the use of or inability to use TMC’s services or any content thereon. We take no liability in case of data loss, users should always keep their own backups of important data. We do offer a very cost effective backup service that we encourage all our clients to subscribe to as this adds extra data retention in any event of a node or data loss.

A billing dispute of any kind does not exempt you from paying current and future bills. Billing disputes resolved in the customer's favor will receive account credit for overpayment.

If any chargebacks occur on your account we reserve the right to suspend your service without notice and will terminate your service and recycle your server(s) if contact and payment not made within 3 days.

Right To Refuse Service

TMC reserves the right to refuse service to anyone for any reason. We enforce this policy to ensure a professional environment for the users of our system. This includes any programs, such as CGI programs that are using excessive amounts of system resources. Excessive amounts is defined as any amount that results in substantial degradation of server performance. TMC is the sole determinant of what constitutes degraded server performance. On some occasions, we allow heavy usage depending on the situation. However, additional fees may apply.

Share by: