This Acceptable Usage Policy (AUP) applies to all individuals, businesses, organizations, resellers, and end-clients (collectively, "users") using Cheetah Node services. Use of Cheetah Node resources constitutes acceptance of all policies in effect at the time of use. Modification to this policy may be made at any time and will be immediately effective upon posted changes.If found violating Acceptable Usage Policy (AUP), Cheetah Node reserve right to suspend or terminate a clients account/service
Abuse of Cheetah Node Systems and Resources:
Any damaging or abusive activity, whether unlawful or considered to be detrimental to the operations of Cheetah Node resources, is a violation of this policy. Any attempt to harm equipment owned by Cheetah Node, or hosted in its facilities, is strictly prohibited. Violations will result in legal action, to the fullest allowable extent.
Illegal Usage Restrictions:
Resources provided by Cheetah Node may be used only for lawful purposes. Examples of unlawful content include:
1)Unlicensed hosting of, linking to, or any involvement in the transmission of copyrighted media, applications, published works, or any data protected by trade secret, without sufficient rights to engage in this activity
2)Child pornography
3)Content deemed to be terroristic in nature
4)Material posted to incite violence
5)Fraudulent sites and other forms of "phishing"
6)Violations of import/export restrictions
Prohibited Usage Restrictions:
In addition to activities governed by law, Cheetah Node strictly prohibits:
1)Malware (malicious software) and/or botnets
2)Network and systems abuse scripts (Examples of such activity include, but are not limited to: DOS, DDOS, flooding, port scanning or probing, stressing CPU for longer periods etc)
3)Threatening, harassing, or obscene content
4)Unsolicited and/or mass advertising via forums, blogs, comment forms, and newsgroups
5)Mail bombing, email address harvesting, and/or unsolicited email
6)Excessive overutilization of resource limits
7) Hosting of Camfrog Servers,IRC Servers, TOR exit nodes are not allowed.
8) Hosting of any service that attracts incoming network attacks including but not limited to DOS, DDOS, flooding
Abusive Clientele:
Cheetah Node may, at its discretion, suspend or terminate the service of any client or reseller who is financially delinquent, abusive to or harassing Cheetah Node personnel, or causes general disruption to the operation of the company and service of its users.
Examples of such activity include, but are not limited to:
1)Verbal or written abuse of Cheetah Node personnel (obscene language, threats, etc.)
2)Excessive complaints or persistent disregard for alerts, warnings, and/or notices
3)Repeated reactivation of abusive users
4)Spamming Cheetah Node email addresses, ticket systems, and/or servers
5)Frequent late or bounced payments
6)Issuing chargebacks
7)Public harassment or derogatory, false, or exaggerated forum and discussion group postings
Bulk Email & Blacklisting:
Legitimate bulk email meets the following criteria:
1)ALL recipients have confirmed willingness to be added to a distribution list by clicking on confirmation links or by responding to verification emails.
2)Distributed messages include valid headers, removal instructions, and information on the method by which the subscribed addresses were obtained.
All the emails must be related to business website/blog/forum hosted on our servers/vps. You are not allowed to use our servers/vps just for sending mass email/email spam.
Cheetah Node reserves the right to require termination of any services involved in the transmission of unsolicited email.
If any activities lead to blacklisting, the involved client/reseller may be charged an abuse fee of $250.00.
Policy Violations:
Storage, presentation, or transmission of any material in violation of any laws, or otherwise prohibited by Cheetah Node, is cause for temporary account deactivation, server/service termination, or complete cancellation of all account services. The Cheetah Node abuse department will make an attempt to contact the involved client via email when the first sign of a possible violation is reprted/noted. This notification may occur before or after a service is disabled.
Alerts are provided as a courtesy. Prompt responses to alerts are required. When an alert is sent, the designated abuse contact is responsible for acknowledging his/her understanding of the offense and providing an adequate response, to the satisfaction of Cheetah Node, within 24 hours of the notice. Failure to sufficiently respond to an abuse alert will lead to suspension of any active services involved in abusive activity.A $200 network abuse fee will be charged if a customer is found abusing the Cheetah Node network.
Cheetah Node will not be responsible for securing virtual private servers, user accounts/web sites, or third-party applications.
Resource Usage:
Resource usage should be maintained within levels outlined in product descriptions and/or service contracts. Abuse caused by users or unauthorized parties may increase resource usage and lead to overage fees.
Overage fees apply to any service utilizing more than its assigned bandwidth allocation. Overages will be calculated based on overall amount of GigaBytes (GB) transferred in a monthly period. VPS Clients can view bandwidth usage statistics through the SolusVM VPS panel.
Bandwidth is supplied from a shared pool and is not supplied as guaranteed/dedicated bandwidth, unless advertised as such specifically.