Acceptable use policy

DEFINITIONS:

  • Host, we, our = Teracore, the Webhosting Provider.
  • Owner, User, You, Your = You, The paying Customer.

The Acceptable Use Policy is an integral part of your agreement with Teracore for the provision of services (collectively the “Services”) set forth on the Hosting plans page.

This Policy is designed to help protect our customers from irresponsible and/or illegal activities. The Policy is a non-exclusive list of the actions prohibited by Teracore and Teracore reserves the right to modify the Policy at any time, effective upon notice to you. Teracore reserves the sole and absolute right to interpret, apply, define and implement this Policy.

WORDPRESS HOSTING

Teracore provides managed hosting exclusively for WordPress (https://wordpress.org) and WordPress compatible plugins and themes. Any other software applications or frameworks is forbidden. Teracore retains the right to audit all customer supplied code for performance and/or security concerns and allow or disallow at sole discretion.

ILLEGAL USE

The use of our services in a manner which is defined or deemed to be illegal is a violation of this policy. This includes, but is not limited to: death threats, threats of terrorism, threats of harm to individuals, multi-level marketing or “Ponzi schemes”, doxing and other invasions of privacy, credit card fraud, racketeering, defamation, slander, and other illegal activities.

OFFENSIVE CONTENT

You may not use any of Teracore’s services to distribute content or links to content that we believe:

  • Relates in any manner to child pornography, bestiality, or non-consensual sex acts;
  • Incites or threatens violence;
  • Is deceptive under consumer protection laws of any jurisdiction, including multi-level marketing, Ponzi schemes or pyramid schemes;
  • Violates a person’s privacy;
  • Creates a risk to a person’s safety or health, creates a risk to public safety or health, compromises national security or interferes with a investigation by law enforcement;
  • Improperly exposes trade secrets or other confidential or proprietary information of another person;
  • Is intended to assist others in defeating technical copyright protections;
  • Infringes on another person’s copyright, trade or service mark, patent or other property right;
  • Promotes illegal drugs, violates export control laws, relates to illegal gambling or illegal arms trafficking;
  • Is otherwise illegal or solicits conduct that is illegal under laws applicable to you or to Teracore;
  • Is otherwise malicious or fraudulent, or may result in retaliation against Teracore by offended recipients; or
  • Is intended to harass or threaten.

DENIAL OF SERVICE

The use of Teracore’s services to conduct denial of service (“DOS”) attacks or distributed denial of service (“DDOS”) attacks is prohibited.

SERVER ABUSE

Any attempts to undermine or cause harm to a Teracore server or a subscriber of Teracore’s services is prohibited including, but not limited to:

  • Logging into a server or account that you are not authorized to access;
  • Accessing data or taking any action to obtain services not intended for you or your use;
  • Tampering, hacking, modifying, or otherwise corrupting or breaching security or authentication measures without proper authorization;
  • Transmitting material that contains viruses, trojan horses, worms, time bombs, cancelbots or other computer programming routines or engines with the intent or effect of damaging, destroying, disrupting or otherwise impairing a computer’s functionality or the operation of the Host’s systems;
  • Interfering with, intercepting or expropriating any system, data or information to which you do not have the right to access; and
  • Interfering with service to any user, host or network including, without limitation, by means of overloading, “flooding”, “mail-bombing”, or “crashing” any computer system.

FRAUDULENT ACTIVITIES

Teracore prohibits the use of our services or network for fraudulent activities

DISTRIBUTION OF MALWARE

Teracore prohibits the storage, distribution, fabrication, or use of malware including virus software, root kits, password crackers, adware, keystroke capture programs and other programs normally used in malicious activity.

PHISHING

Teracore strictly prohibits any activity associated with Phishing or systems designed to collect personal information (name, account numbers, user names, passwords, etc.) under false pretense. Splash pages, phishing forms, email distribution, proxy email or any relation to phishing activities will result in immediate removal.

HYIP OR PONZI SCHEMES

High Yield Investment Plans or Ponzi schemes with the intent to defraud end users are illegal and not allowed on the network. This includes hosting, linking and or advertising via email websites or schemes designed to defraud.

VULNERABILITY MONITORING AND TESTING

Any attempts to breach security or authentication measures, penetrate or test the vulnerability of a Teracore system, network, or web application is a violation of this policy. Vulnerability testing may only be conducted with written consent from Teracore.

UNSOLICITED MAIL

You may not send unsolicited email. Email is unsolicited if you have no pre-existing relationship with the recipient, unless the recipient has published or otherwise provided his or her email address in a manner which implies consent to receive the email. You may not send email of any kind to a person who has indicated that they do not wish to receive it. Any such email shall comply with all laws and regulations, including without limitation, the CAN SPAM Act.

MESSAGE SOURCE

You may not obscure the source of your email in any manner, including by intentionally omitting, forging, or misrepresenting message headers or return addresses.

EMAIL ABUSE COMPLAINTS

Complaints from email recipients and third party abuse agencies (e.g. SpamHaus or Spamcop) shall be deemed proof of the facts stated therein unless you provide compelling evidence to the contrary. Teracore shall have the right to terminate your mail service if we receive excessive or repeated complaints from your email recipients, regardless of whether you are in breach of this policy or are otherwise at fault.

BLACKLISTING/RETALIATION

Teracore may terminate your Services if your email address or related IP number(s) is/are blacklisted by any third party, or Host is retaliated against as a result of your use of the mail system, regardless of whether you are in breach of this policy or are otherwise at fault.

HOST ADMINISTRATIVE ACCESS

You, the customer, acknowledges that to facilitate efficient server management, inventory and related activities, the Teracore servers include a Teracore administrative account and password. All reasonable precautions are made by Teracore to maintain the security of these tools and the privacy of client data. You will not tamper, hinder, delete or in anyway change the functioning of these tools.

Resellers: If you resell, rent or otherwise allow third parties to use any Host Services, you are responsible for use of the Services by such third parties in violation of this AUP to the same extent as if you were using Host Services yourself. You are also responsible for all accounting and support for your end customers.

DISCLOSURE TO LAW ENFORCEMENT

Occasionally, Host is required by law to submit customer information to law enforcement officials when presented with a valid subpoena or order from a court or governmental entity. Information requested is disclosed as directed pursuant to the subpoena or order. Host utilizes great care in keeping customer information safe and private and will only release information described in the subpoena order. Host will notify customer of the information request to the extent permitted by the subpoena or order.

REPORTING VIOLATION OF THE ACCEPTABLE USE POLICY

Teracore accepts reports of alleged violations of this Policy via email.

Reports of alleged violations must be verified and include name, contact information, IP address, and description of the violation. Host owes no duty to third parties reporting alleged violations; provided, however, Host will use commercially reasonable efforts to review all verified third party reports and will take appropriate actions as described within the resolution process as set forth in Table A below.

RESOLUTION PROCESS FOR VIOLATIONS OF HOST’S ACCEPTABLE USE POLICY

The ultimate goal of this AUP by Host is to balance the rights of our customers while ensuring full compliance of this AUP. The goal of our Resolution Process is to mitigate service interruptions while resolving potential violations under this AUP. Our sales, support and abuse staff is dedicated to working with the customer in resolving potential violations, and are available via phone or email. The resolution process below provides the process for resolving all potential violations. Timing for resolution differs according to the degree of the violation, the nature of the violation, involvement of law enforcement, involvement of third party litigation, or other related factors. Overall, Host is dedicated to working with the customer in resolving all potential violations prior to any service interruptions.

STEP 1: FIRST ALLEGED VIOLATION OF AUP:

A ticket will be generated under Host to obtain the customer’s master user account with information regarding the potential violation of Host’s AUP. This is often a fact-finding email requiring further information or notifying customer of the potential violation and the required actions to resolve the issue.

STEP 2: ACKNOWLEDGEMENT OF VIOLATION OF AUP:

A ticket is generated under the customer’s master user account with information specific to the violation. This ticket will also include any additional facts about the situation and will notify customer of the action required to resolve the violation.

STEP 3: VIOLATION OF AUP DISREGARDED, NOT PROPERLY ADDRESSED, OR CONTINUING VIOLATION IF A TICKET HAS BEEN DISREGARDED, NOT PROPERLY ADDRESSED, OR RESOLVED BY THE CUSTOMER FOR A SPECIFIED PERIOD OF TIME:

Host engineers will turn the public network port to the specified dedicated services off. Access to the dedicated services may then be achieved through the secure private service network for customer resolution. As soon as the violation is addressed, the public access shall be restored and service will continue as normal.

STEP 4: FAILURE TO ADDRESS VIOLATION AND RESOLVE VIOLATION:

If customer fails to address the violation AND resolve the violation, a suspension of services may occur in Host’s sole discretion. This is a last resort for Host and only results when the customer completely fails to participate in Host’s resolution process. A permanent suspension of services includes reclamation of all dedicated services and the destruction of customer’s data.

Disclaimer: Host retains the right, at its sole discretion, to refuse new service to any individual, group, or business. Host also retains the right to discontinue service to customers with excessive and/or multiple repeated violations.