Hosting Terms & Acceptable Use Policy
These Hosting Terms and Acceptable Use Policy ("AUP") establish the legal framework governing the utilization of all hosting infrastructure and related services provided by Aryavig ("we," "our," "us"). By procuring or accessing our hosting solutions, you explicitly agree to comply with these binding terms. Violations of this AUP may result in immediate service suspension, permanent termination, or legal recourse as circumstances warrant.
1. General Hosting Service Terms
1.1 Service Availability & Performance
We are committed to delivering reliable service availability and optimal performance metrics; however, specific uptime guarantees vary according to your selected hosting tier. Scheduled maintenance operations may be conducted periodically, with advance notification provided to clients whenever feasible.
1.2 Client Responsibilities & Obligations
As a hosting client, you assume full responsibility for
- Maintaining comprehensive, current data backups independent of our systems
- Securing authentication credentials and access control mechanisms
- Ensuring timely updates to all website applications and content management systems
- Verifying that all scripts, plugins, and extensions remain free from vulnerabilities and malicious code
- Monitoring resource consumption and maintaining within allocated plan limits
1.3 Financial Terms & Renewal Procedures
- Hosting services are invoiced according to selected billing cycles (monthly, quarterly, annually)
- Service renewals occur automatically unless formally canceled in writing prior to renewal date
- Payment failures may result in service suspension following a 7-day grace period, with potential data removal after 30 days of non-payment
1.4 Data Backup Provisions
While we implement automated backup systems on designated service tiers, clients bear ultimate responsibility for maintaining independent, verifiable backup copies of all critical data and digital assets.
1.5 Resource Allocation & Utilization
Hosting resources including CPU allocation, memory utilization, network bandwidth, and storage capacity must remain within the specified thresholds of your service plan. We reserve the right to throttle, limit, or suspend accounts demonstrating excessive resource consumption beyond fair usage parameters.
1.6 Prohibited Technical Operations
The following technical activities are strictly prohibited:
- Execution of unauthorized background processes or daemon services
- Utilization of hosting environment as primary file storage or archival repository
- Cryptocurrency mining operations or blockchain computation activities
- Deployment of automated bots, web crawlers, or data scraping tools that impact server performance
- Database operations or script executions causing disproportionate resource consumption
2. Acceptable Use Policy (AUP)
This section explicitly defines permitted and prohibited utilization of our hosting infrastructure.
2.1 Prohibited Content Categories
Illegal or Unlawful Material
You may NOT host, distribute, or store
- Pirated software, media content, or intellectual property violations
- Hacking tools, exploit kits, or security circumvention utilities
- Unauthorized copies of licensed software or digital products
- Stolen data, personal information, or confidential records
- Malware, viruses, ransomware, or other malicious code
Adult or Explicit Content
Strictly prohibited materials include:
- Pornographic imagery or video content
- Sexually explicit material of any nature
- Adult entertainment hosting or streaming services
- Escort services or sexually oriented commercial platforms
Violent or Harmful Content
Including but not limited to:
- Threats of violence or intimidation
- Hate speech targeting protected characteristics
- Extremist propaganda or terrorist related material
- Content inciting violence or illegal activities
Fraudulent or Deceptive Platforms
Prohibited activities include:
- Phishing schemes or credential harvesting operations
- Fake authentication portals or impersonation websites
- Scam operations or fraudulent business practices
- Brand impersonation or unauthorized representation
Copyright Infringing Material
You must possess appropriate licensing or ownership rights for all hosted content, including text, images, software, and multimedia assets.
2.2 Prohibited Operational Activities
Email System Abuse
- Transmission of unsolicited commercial email (spam)
- Bulk email distribution without explicit recipient consent
- Operation of mass mailing scripts or email bombing tools
- Maintenance of open mail relays or unsecured SMTP services
Network Infrastructure Abuse
- Initiating or participating in DDoS attacks
- Conducting port scanning or network reconnaissance
- Flooding networks with excessive packet traffic
- Unauthorized penetration testing or security assessment
Security Policy Violations
- Attempting to compromise server integrity or access controls
- Circumventing security mechanisms or access restrictions
- Distributing malicious code or exploitation frameworks
- Unauthorized access attempts to other systems or networks
Resource Utilization Abuse
Activities causing service degradation include:
- Excessive cron job execution frequency
- High volume API requests impacting performance
- Inefficient database queries consuming disproportionate resources
- Sustained high CPU utilization affecting shared environments
3. Customer Data Protection & Privacy
We maintain strict confidentiality regarding client data and implement comprehensive privacy safeguards. Access to client files occurs only under specific circumstances:
- Explicit client authorization for technical support purposes
- Legal compliance obligations or valid court orders
- Security incident investigation or abuse verification procedures
- System maintenance requiring temporary administrative access
4. Service Suspension & Termination Protocols
We reserve the unilateral right to suspend or terminate hosting services for:
- Material violation of this Acceptable Use Policy
- Persistent non-payment of service fees
- Activities posing security threats to infrastructure or other clients
- Hosting prohibited content categories as defined herein
- Repeated resource abuse despite formal warnings
- Engagement in illegal or fraudulent activities
Severe policy violations may result in immediate service termination without refund eligibility.
5. Abuse Management Framework
5.1 Abuse Reporting Mechanism
To report security incidents, policy violations, or suspicious activities within our infrastructure:
Abuse Reporting Department
Email abuse@aryavig.com
Emergency Response security@aryavig.com
Please include the following information in abuse reports:
- Specific URLs or IP addresses involved
- Documenting screenshots or evidence files
- Detailed description of the violation
- Supporting documentation or log excerpts
- Your contact information for follow up inquiries
5.2 Investigation Protocol
Upon receiving an abuse report, our security team initiates a formal investigation:
- Comprehensive review of reported incidents and evidence
- Technical verification of alleged violations
- Direct communication with the account holder for clarification
- Potential temporary access restrictions during investigation
- Documented conclusion and appropriate remedial action
5.3 Enforcement Actions
Based on investigation findings, we may implement:
- Formal written warning with compliance requirements
- Temporary service suspension pending resolution
- Selective removal of violating content or scripts
- Permanent service termination for severe violations
- Legal notification to appropriate authorities when warranted
6. Security Maintenance Requirements
Client security obligations include:
- Regular updates to content management systems and applications
- Implementation of strong, unique authentication credentials
- Security hardening of custom scripts and applications
- Prompt removal of outdated or vulnerable software components
- Regular security auditing and vulnerability assessment
Accounts compromised through security negligence may be temporarily suspended to protect infrastructure integrity and other clients.
7. Liability Limitations
Aryavig expressly disclaims responsibility for:
- Data loss resulting from client side errors or omissions
- Service interruptions caused by client initiated activities
- Security breaches attributable to outdated software or weak credentials
- Consequences of client misuse or policy violations
- Vulnerabilities in third party applications or scripts
- Financial losses resulting from service interruptions
Clients bear ultimate responsibility for data integrity, backup maintenance, and overall website security posture.
8. Policy Modification Procedures
We reserve the right to modify this Acceptable Use Policy to reflect evolving industry standards, regulatory requirements, or service enhancements. Continued utilization of our hosting services following policy updates constitutes binding acceptance of revised terms.
For policy clarification or technical assistance:
Email support@aryavig.com
Response Time: Within 24 business hours