Documents


Acceptable Use Policy (AUP)

The Service Provider AUP is binding on all users of our services. All customers must comply with its terms.

Inappropriate use can be divided into 3 main categories:

  • Illegal Use
  • Malicious Use
  • Use that threatens network integrity

Service Provider reserves the right to make changes to the AUP at any time to address emerging threats. Changes to the AUP shall come into force from the moment they are published on the website in8inity.com.

Forbidden

  1. Illegal Use

    • Any activity deemed illegal in any of the territories in which the service is provided;
    • Storage or transmission of materials that violate copyrights or trademarks;
    • Possession or transmission of child pornography;
    • Using the Services to engage in or assist in fraud, identity theft, or other malicious or fraudulent activities, including the solicitation or distribution of fraudulent activities; goods, services, schemes, promotions;
    • Use of services for distribution, control or other interaction with malicious computer programs (viruses, trojans, worms, spyware and other malicious software);
    • Software or other media piracy;
    • Violation of local import/export laws.

  2. Malicious Use

    • Harassment of any person or entity, whether through open threat, threatening language, or simply refusal to accept a cease and desist request;
    • Penetration/vulnerability testing or unauthorized access to the Service Provider network and any Service Provider operating or administrative systems;
    • Unauthorized penetration/vulnerability testing or network access of any other object or system;
    • Electronic impersonation of another person or organization or other methods of deception;
    • SPAM; Unsolicited emails, unsolicited advertising, messages designed to disrupt other services, messages containing malicious content;
    • Farming email addresses or other individual online identifiers;
    • Phishing;
    • Unauthorized interception of messages or other data;
    • Network services such as open proxies, open mail relays, or open recursive domain name servers.

  3. Use that threatens the integrity of the network

    • General interference with the Service Provider network or its monitoring systems;
    • Actions as a result of which the Service Provider network becomes the object of a DDoS or other targeted attack;
    • Anything that causes our IP space to be blacklisted in suspicious or malicious databases (Spamhaus, etc.);
    • Actions that lead to the shutdown of the Service Provider network by a government decree;
    • Any action that results in interruptions in the provision of services to other Service Provider customers.
up UP