Last updated 23rd October, 2022Acceptable Usage of ServicesWe offer a range of services that we think you should be able to use how and when you like. As a service provider we do have the obligation to help keep our network (and our upstreams) safe. Below we detail some simple - yet cruicial usage cirteria.
Hardware and physical systems
- Additional hardware tuning (also known as "overclocking") is not acceptable on our services without prior consent.
- Attempts to change, gain unauthorized access or disable any out-of-band access is strictly prohibited.
- Using our machines in a way that results in any "Crypto" gain is prohibited without prior consent.
Network and data flow
- We maintain control over our network, infrastructure and devices. Some of our devices may be controlled by data centers (upstreams) where we lease cabinet space and/or bandwidth as such we control your data and the data that flows on any systems maintained by us.
- You and/or customers (players) that connect through our network to access or distribute content are prohibited from obtaining and/or redistributing any unlawful materials, including but not limited to child pornography, intellectual property and/or unlawful hate-speech materials.
- Any use of "bandwidth mining" technologies falls under Section 1.3 and is not prohibited.
- IPTV (and/or any other media distribution services) is not prohibited on our network without prior consent and valid/current video streaming licenses for the content you are distributing.
Lawful usage
- Our services must only be used to serve lawful (content/purpose), as a company incorporated in the United Kingdom, England lawful content will be held under the standard of laws and regulations of the United Kingdom.
- You are not to store, redistribute or harbour content that is unlawful, this includes but is not limited to protected material by copyright, trademark, trade secrets and/or any other intellectual property laws applicable in the United Kingdom.
- You are prohibited to use our service(s) for any illegal activities, this is includes but is not limited to denial of service attacks (DDoS) and/or protection of sites advertising such services.
Operational security
- All systems on our network assume allow-list access methods. You must not attempt to gain unauthorized to our systems, other customer systems and/or external systems (regardless of if on our infrastructure). This also extends to attempting to gain access to expired or suspended products (regardless of reason).
- A user must not circumvent (also known as "hacking" or "cracking") any authentication method or security of any network, host or customer account. This extends to the temporary (or permanent) disruption to services known as DDoS attacks, see Section 3.3.
- You are prohibited from hosting public proxy services on our network or systems.
- You are prohibited from mis-using, forging or changing any IP packet headers. You are also prohibited from using our services for any type of spoofing.
- No unauthorized access and/or use of data, systems or network including attempts to scan, test or circumvent. You are not to test the vulnerability of any system without prior consent from us and any involved provider(s).
Restricted access
We reserve the right to restrict access to your service in the form of articial network limitations and temporary (or permeanent) suspensions in order to maintain a high service quality.
Some ways we may restrict your service are as follows (this is not an exhaustive list):
- Applying software limits to specific ports to reduce traffic of individual services.
- Temporary termination of services.
- Permanent termination of services and customer relations.
Any overusage of network (bandwidth) will be billed under applicable agreements. These agreements may be revised at any time without prior notice to customers.
Virtual private solutions
Virtual dedicated solutions are offered on a "shared model" (also known as fair-use) this introduces a varying degree of combined resources. Where possible we aim to balance our nodes fairly to ensure everyone is able to take full advantage of their service. We allocate services based on RAM (memory) and this is also the billing factor. As CPU time is shared between customers any one customer will only be able to utilise 1/3 of the nodes capacity (CLS 9 phy cores, PRO 4 phy cores).
In the event where a customer is deliberatley loading tasks to cause cpu hitch-time for other customers we will recommend they move over to a bare metal service or implement one of the following restrictions:
- Temporarily ratelimit your core speed and/or usage to reduce congestion.
- Pinning cores for specific services, ie allocated cores 0-8 to a specific virtual instance.
- Offer favourable converstion rates to a Bare Metal service.
- Give 30 days notice on contractual price change for additional resources used.
In the case where an overage of resources is bandwidth related, please see Section 5 of the acceptable use policy.