What is Prohibited?

What Is Prohibited

Examples of prohibited usage of Parkinhost services for purpose of (but are not limited to):

  • Spamming, i.e. sending of unsolicited email from any Parkinhost server or any server located on the Parkinhost network is STRICTLY prohibited. Parkinhost will be the sole arbiter as to what constitutes a violation of this provision. This also includes Opt-in Opt-out mail programs and mail that either directly or indirectly references a domain contained within an account at Parkinhost;
  • Running Unconfirmed Mailing Lists. Subscribing email addresses to any mailing list without the express and verifiable permission of the email address owner is prohibited. All mailing lists run by Parkinhost customers must be Closed-loop (“Confirmed Opt-in”). The subscription confirmation message received from each address owner must be kept on file for the duration of the existence of the mailing list. Purchasing, selling, or utilizing lists of email addresses from 3rd parties for mailing to or from any Parkinhost hosted domain, or referencing any Parkinhost account, is prohibited;
  • Advertising, transmitting, or otherwise making available any software, program, product, or service that is designed to violate this ToS or the AUP/ToS of any other Internet Service Provider, which includes, but is not limited to, the facilitation of the means to send Uns

    What Is Prohibited

    Examples of prohibited usage of Veesp services for purpose of (but are not limited to):

    • Spamming, i.e. sending of unsolicited email from any Veesp server or any server located on the Veesp network is STRICTLY prohibited. Veesp will be the sole arbiter as to what constitutes a violation of this provision. This also includes Opt-in Opt-out mail programs and mail that either directly or indirectly references a domain contained within an account at Veesp;
    • Running Unconfirmed Mailing Lists. Subscribing email addresses to any mailing list without the express and verifiable permission of the email address owner is prohibited. All mailing lists run by Veesp customers must be Closed-loop (“Confirmed Opt-in”). The subscription confirmation message received from each address owner must be kept on file for the duration of the existence of the mailing list. Purchasing, selling, or utilizing lists of email addresses from 3rd parties for mailing to or from any Veesp hosted domain, or referencing any Veesp account, is prohibited;
    • Advertising, transmitting, or otherwise making available any software, program, product, or service that is designed to violate this ToS or the AUP/ToS of any other Internet Service Provider, which includes, but is not limited to, the facilitation of the means to send Unsolicited Bulk Email, initiation of pinging, flooding, mail-bombing, text-bombing, unsolicited bulk text messaging or denial of service attacks is prohibited;
    • Email address cultivating, or any unauthorized collecting of email addresses without prior notification of the email address owner is strictly prohibited;
    • Operating an account on behalf of, or in connection with, or reselling any service to, persons or firms listed in the Spamhaus Register of Known Spam Operations (ROKSO) database at www.spamhaus.org is prohibited;
    • All commercial email marketing companies must adhere to the Controlling the Assault of Non-Solicited Pornography And Marketing (CAN-SPAM) Act of 2003. In addition such companies are prohibited the sending of bulk mail from “disposable domain names” with whois privacy protection;
    • Facilitation and utilization of software used for organizing open proxy;
    • Virtual currency (cryptocurrency) mining (BitCoin, Ethereum, etc.);
    • Hosting and distribution of copyrighted materials (including, but not limited to audio/video media, software, text and images) without owning the rights to it;
    • Distribution and/or storage of any and all content forbidden by the legislation of the Russian Federation;
    • Taking part in denial of service attacks in any capacity;
    • Attempts of gaining unauthorized access to third party services;
    • Unauthorized use of third party services;
    • Scanning third party services and/or network;
    • Hosting and proliferation of phishing resources and materials related to phishing;
    • Hosting and proliferation of malware;
    • Running software without owning the appropriate license(s);
    • Selling, distribution or advertising of counterfeit goods or services;
    • Any activities falling under the definition of "Cybercrime".

    Veesp will be the sole arbiter as to what constitutes a violation of this provision.

    Examples of prohibited actions within Veesp infrastructure:

    – Any attempts to undermine or cause harm to a Veesp infrastructure or Client of Veesp is strictly prohibited including, but not limited to:

    • Logging into a server or account that you are not authorized to access;
    • Accessing data or taking any action to obtain services not intended for you or your use;
    • Attempting to probe, scan or test the vulnerability of any system, subsystem or network without the authorization of the owner;
    • Tampering, hacking, modifying, or otherwise corrupting or breaching security or authentication measures without proper authorization;
    • Transmitting material that contains viruses, Trojan horses, worms, time bombs, cancelbots or other computer programming routines or engines with the intent or effect of damaging, destroying, disrupting or otherwise impairing a computer’s functionality or the operation of the System;
    • Interfering with, intercepting or expropriating any system, data or information;
    • Interfering with service to any user, host or network including, without limitation, by means of overloading, “flooding,” “mailbombing,” or “crashing” any computer system;
    • Misuse of system resources, such as, by employing programs that consume excessive network capacity, CPU cycles, or disk IO. Exact Veesp infrastructure limitations are listed in SLA and may vary depending on service type provided to Client.

    Veesp will be the sole arbiter as to what constitutes a violation of this provision.

    Examples of Advertising & Promotions Limitations for Veesp clients (but are not limited to):

    In the following scenarios Veesp clients are prohibited from advertising, promoting or making claims related to services which are hosted upon infrastructure at Veesp. This limitation includes what is allowed to be stated on your website, to customers, in promotions and in advertising materials. This limitation applies to claims by the client which relate to services hosted by Veesp.

    • Claims related to DDoS Mitigation or any related service including, but not limited to, proxy protection, denial of service protection, denial of service mitigation or DDoS or DoS services;
    • Any illegal or unlawful activity;
    • Any services intended to defraud, scam, defame, coerce or entice others into an unlawful activities.

    Veesp will be the sole arbiter as to what constitutes a violation of this provision.

    olicited Bulk Email, initiation of pinging, flooding, mail-bombing, text-bombing, unsolicited bulk text messaging or denial of service attacks is prohibited;
  • Email address cultivating, or any unauthorized collecting of email addresses without prior notification of the email address owner is strictly prohibited;
  • Operating an account on behalf of, or in connection with, or reselling any service to, persons or firms listed in the Spamhaus Register of Known Spam Operations (ROKSO) database at www.spamhaus.org is prohibited;
  • All commercial email marketing companies must adhere to the Controlling the Assault of Non-Solicited Pornography And Marketing (CAN-SPAM) Act of 2003. In addition such companies are prohibited the sending of bulk mail from “disposable domain names” with whois privacy protection;
  • Facilitation and utilization of software used for organizing open proxy;
  • Virtual currency (cryptocurrency) mining (BitCoin, Ethereum, etc.);
  • Hosting and distribution of copyrighted materials (including, but not limited to audio/video media, software, text and images) without owning the rights to it;
  • Distribution and/or storage of any and all content forbidden by the legislation of the Russian Federation;
  • Taking part in denial of service attacks in any capacity;
  • Attempts of gaining unauthorized access to third party services;
  • Unauthorized use of third party services;
  • Scanning third party services and/or network;
  • Hosting and proliferation of phishing resources and materials related to phishing;
  • Hosting and proliferation of malware;
  • Running software without owning the appropriate license(s);
  • Selling, distribution or advertising of counterfeit goods or services;
  • Any activities falling under the definition of "Cybercrime".

Parkinhost will be the sole arbiter as to what constitutes a violation of this provision.

Examples of prohibited actions within Parkinhost infrastructure:

– Any attempts to undermine or cause harm to a Parkinhost infrastructure or Client of Parkinhost is strictly prohibited including, but not limited to:

  • Logging into a server or account that you are not authorized to access;
  • Accessing data or taking any action to obtain services not intended for you or your use;
  • Attempting to probe, scan or test the vulnerability of any system, subsystem or network without the authorization of the owner;
  • Tampering, hacking, modifying, or otherwise corrupting or breaching security or authentication measures without proper authorization;
  • Transmitting material that contains viruses, Trojan horses, worms, time bombs, cancelbots or other computer programming routines or engines with the intent or effect of damaging, destroying, disrupting or otherwise impairing a computer’s functionality or the operation of the System;
  • Interfering with, intercepting or expropriating any system, data or information;
  • Interfering with service to any user, host or network including, without limitation, by means of overloading, “flooding,” “mailbombing,” or “crashing” any computer system;
  • Misuse of system resources, such as, by employing programs that consume excessive network capacity, CPU cycles, or disk IO. Exact Parkinhost infrastructure limitations are listed in SLA and may vary depending on service type provided to Client.

Parkinhost will be the sole arbiter as to what constitutes a violation of this provision.

Examples of Advertising & Promotions Limitations for Parkinhost clients (but are not limited to):

In the following scenarios Parkinhost clients are prohibited from advertising, promoting or making claims related to services which are hosted upon infrastructure at Parkinhost. This limitation includes what is allowed to be stated on your website, to customers, in promotions and in advertising materials. This limitation applies to claims by the client which relate to services hosted by Parkinhost.

  • Claims related to DDoS Mitigation or any related service including, but not limited to, proxy protection, denial of service protection, denial of service mitigation or DDoS or DoS services;
  • Any illegal or unlawful activity;
  • Any services intended to defraud, scam, defame, coerce or entice others into an unlawful activities.

Parkinhost will be the sole arbiter as to what constitutes a violation of this provision.

  • 0 Users Found This Useful
Was this answer helpful?

Related Articles

Unmetered Bandwidth - VPS

Unmetered Bandwidth - VPSWord "UNMETERED BANDWIDTH" is assigned to the very high bandwidth...

What is Unmetered servers ?

Unmetered dedicated servers offer you a server that has no set of limitations on bandwidth usage,...

Ripe Verification

RIPE Network Coordination Center have very stringent application criteria for IP assignment....

Raid Levels

RAID (Redundant Array of Independent Disks) is a way of storing the same data in different places...

Restricted Activity / Illegal Activity

Illegal Activity : Any activity on our network that is a violation of any state or federal law is...

Powered by WHMCompleteSolution