Welcome to the CloudVelox, Inc. Acceptable Use Policy, which describes the guidelines applicable to your use of the services provided by CloudVelox, Inc. (“CloudVelox Services”). You are responsible for ensuring that your use of the CloudVelox Services, including any content that you provide, upload, or otherwise make available to the CloudVelox Services (“User Content”), complies with these guidelines.

You will not use, or permit or encourage others to use, the CloudVelox Services for any illegal, harmful, or offensive use or to transmit, store, display, distribute or otherwise make available User Content that is illegal, harmful, or offensive. Examples of prohibited use or content include:

  • Illegal Activities: Any activities that violate applicable law, rule, or regulation, including advertising, transmitting, or making available gambling sites or services or distributing, uploading, downloading, enabling, or promoting child pornography.
  • Harmful or Fraudulent Activities: Activities that may be harmful to others or our operations, business, or reputation, including offering fraudulent goods, services, schemes, or promotions (e.g., make-money-fast schemes, ponzi and pyramid schemes, phishing, or pharming), or engaging in other deceptive practices.
  • Infringing Content:  Content that may infringe, misappropriate, or violate the rights of any third party, such as, but not limited to, copyrights, trademarks, and rights of privacy or publicity.
  • Offensive Content: Obscene, vulgar, or offensive content; defamatory content; content that harasses, threatens, or abuses other persons or groups; sexual content or nudity involving persons under the age of 18; and content depicting non-consensual sex acts.
  • Harmful Content: Content or technology that may damage, interfere with, intercept, or expropriate any data, information, program, or systems, including viruses, malware, Trojan horses, worms, time bombs, corrupted files, or cancelbots.

You will not use the CloudVelox Services to violate the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a “System”). Examples of prohibited use include:

  • Unauthorized Access: Accessing or using any System without permission, including attempting to probe, scan, or test the vulnerability of a System or to breach any security, access control or authentication measures used by a System.
  • Interception: Monitoring of data or traffic on a System without permission.
  • Falsification of Origin: Forging TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route. This prohibition does not include the use of aliases or anonymous remailers.

You will not engage in activities of any kind that may interfere with or disrupt the functioning of any of the CloudVelox Services or the servers and networks used to provide any CloudVelox Service.

You will not make network connections to any users, hosts, or networks unless you have permission to communicate with them. Examples of prohibited use include:

  • Monitoring or Crawling: Monitoring or crawling of a System that impairs or disrupts the System being monitored or crawled.
  • Denial of Service (DoS): Sending a target communications requests in a manner such that the target either cannot respond to legitimate traffic or responds so slowly that it becomes ineffective.
  • Intentional Interference. Interfering with the proper functioning of any System, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, or flooding techniques.
  • Operation of Certain Network Services. Operating network services like open proxies, open mail relays, or open recursive domain name servers.
  • Avoiding System Restrictions. Using physical or electronic means to avoid any use limitations placed on any System, such as access and storage restrictions.

You will not distribute, publish, send, or facilitate the sending of unsolicited commercial or mass e-mail or other messages, promotions, advertising, or solicitations (e.g., “spam”), including commercial advertising and informational announcements. You will not alter or obscure mail headers or assume a sender’s identity without the sender’s explicit permission. You will not collect replies to messages sent from another internet service provider if those messages violate this Acceptable Use Policy or the policies of that provider.