Acceptable Use Policy

This Acceptable Use Policy (AUP) sets forth the guidelines and rules for the use of BigBoxHost's services.


Introduction

This Acceptable Use Policy (referred to as "AUP") governs the use of the network of internet properties, products, materials, and online services provided by BigBoxHost (referred to as "we," "our," or "BigBoxHost"). This AUP applies to all customers and users (referred to as "you," "customers," or "users") who access and use our Services through visiting our websites, purchasing Services, or registering accounts. It is important to use the Services in a manner consistent with their intended purpose and in accordance with the Terms of Service agreement between you and BigBoxHost.

While the examples provided in this AUP are not exhaustive, we reserve the right to modify the AUP at any time. Any revisions will be posted on our Services, and by continuing to use the Services, you agree to be bound by the latest version of this AUP. Terms not defined in this AUP can be found in our Terms of Service. It is your responsibility to comply with this AUP, and you are also required to ensure that your end users comply with it. Any violation of this AUP, whether by you or your end users, may result in the suspension or termination of your access to the Services and the deletion of your account.

We take the enforcement of this AUP seriously and reserve the right to take appropriate action in response to any violation. Such actions may include suspending or terminating your use of the Services, as well as deleting your account. It is essential that you familiarize yourself with this AUP and ensure that your activities and the activities of your end users are in compliance with its provisions. If you have any questions or concerns regarding this AUP, please contact our support team for further assistance.


Prohibited Activities

Illegal Use: You may not use our services for any illegal or unauthorized purpose. This includes but is not limited to engaging in any activity that violates applicable laws, regulations, or rights of third parties.

Abuse and Harassment: You must not engage in any activity that is abusive, harassing, or harmful to others. This includes but is not limited to sending unsolicited messages, distributing malware or viruses, or engaging in any form of cyberbullying.

Intellectual Property Infringement: You may not use our services to infringe upon the intellectual property rights of others. This includes but is not limited to unauthorized use, distribution, or reproduction of copyrighted material, trademarks, trade secrets, or patents.

Spam and Unsolicited Communications: Sending spam or unsolicited bulk communications, including emails, messages, or advertisements, is strictly prohibited. You must obtain explicit consent from recipients before sending any commercial communications.

Network Disruption: Any activity that disrupts or interferes with the proper functioning of our network or systems is prohibited. This includes but is not limited to hacking, distributing denial-of-service attacks, or attempting to gain unauthorized access to systems or accounts.


Content Guidelines

You may not use the Services for any unlawful or abusive purpose. Prohibited activities include:

Lawful Content: You are responsible for ensuring that all content you transmit, store, or host using our services is lawful. This includes complying with all applicable laws, regulations, and intellectual property rights.

Offensive Content: You must not use our services to transmit or store any content that is defamatory, obscene, pornographic, or otherwise offensive. Content that promotes violence, discrimination, or illegal activities is strictly prohibited.

Copyrighted Material: You may not use our services to transmit, store, or distribute copyrighted material without appropriate authorization or a valid legal basis.

Harmful Content: Content or other computer technology that may damage, interfere with, surreptitiously intercept, or expropriate any system, program, or data, including viruses, Trojan horses, worms, time bombs, or cancelbots are prohibited. Any activities that are illegal, tortious, that violate the rights of others, or that may be harmful to others, our operations or reputation, including disseminating, promoting or facilitating child pornography, offering or disseminating fraudulent goods, services, schemes, or promotions, make-money-fast schemes, ponzi and pyramid schemes, phishing, or pharming are strictly prohibited.

Unlawful Pornography: Disseminating child pornography or depictions of nudity or sexual activity obtained or disseminated without the consent of those depicted (e.g., “revenge pornography”).

Violent, Harassing, or Abusive Content: Content that aims to incite or make threats of violence against any individual, promotes acts of terrorism, intends to harass, abuse, or violate the privacy of others, poses a risk to the physical safety or well-being of individuals or public safety, or encourages harm based on factors such as race, ethnicity, national origin, religion, caste, sexual orientation, gender, gender identity, serious disease or disability, or immigration status.

Controlled Substances: Engaging in the illegal sale or distribution of controlled substances, which encompasses both illegal drugs and prescription drugs being sold or distributed unlawfully. This includes any activities that violate applicable laws and regulations pertaining to controlled substances.

Resource Usage: Your use of our services should not excessively consume resources, impairing the performance or availability of our services for other users. This includes but is not limited to CPU, memory, bandwidth, or disk space usage.


E-Mail or SPAM or Other Message Abuse

You agree not to engage in the distribution, publication, sending, or facilitation of unsolicited mass email or other messages, promotions, advertising, or solicitations (commonly known as "spam"), including commercial advertising and informational announcements. This includes altering or obscuring mail headers or assuming a sender's identity without explicit permission. You must also refrain from collecting replies to messages sent from another internet service provider if those messages violate our AUP or the acceptable use policy of that provider. It is your responsibility to make reasonable efforts to secure any device or network under your control to prevent the unauthorized use of bulk or commercial email, including the installation of antivirus software, firewall software, and operating system and application software patches and updates. You are strictly prohibited from taking any action that would result in any of our IP addresses being listed on any abuse database, such as Spamhaus.

In compliance with the laws and regulations governing bulk or commercial email in your jurisdiction, your bulk or commercial email must meet certain requirements. These include having a privacy policy or similar disclosure posted for each domain associated with the mailing, implementing means to track anonymous complaints, and refraining from obscuring the source of your email. Additionally, you must prominently display an email address for complaints, such as abuse@yourdomain.com, on any website associated with the email and promptly respond to messages sent to that address. It is essential that your intended recipients have provided their consent to receive email through an opt-in procedure or similar affirmative means, and you must be able to produce evidence of such consent within 72 hours upon request by the recipient or BigBoxHost. Furthermore, you must employ reasonable measures to verify that the person giving consent is the rightful owner of the email address in question. The recipient's email address must be included in the body of the message or in the "TO" line of the email, and you are obligated to honor any revocations of consent and notify recipients accordingly.


Security Violations

Ensuring the security and integrity of our network and systems is of utmost importance at BigBoxHost. We expect all users to comply with the following security requirements and refrain from engaging in any activities that compromise the security, privacy, or reliability of our services, network, or infrastructure:

  1. Unauthorized Access: You must not attempt to gain unauthorized access to any accounts, systems, networks, or data belonging to BigBoxHost or other users. This includes but is not limited to password cracking, social engineering, or any form of unauthorized intrusion.
  2. Malicious Activities: You are strictly prohibited from engaging in any malicious activities that may disrupt or compromise the operation of our services or harm other users or their systems. This includes, but is not limited to, distributing malware, launching DDoS attacks, or conducting any form of unauthorized scanning or probing of networks.
  3. Data Breaches: Any activity that results in the unauthorized access, acquisition, or disclosure of sensitive data is strictly prohibited. You must not attempt to exploit vulnerabilities or engage in any activity that compromises the confidentiality or integrity of data stored on our systems or networks.
  4. Fraudulent Activities: Engaging in fraudulent activities, including but not limited to identity theft, impersonation, or fraudulent financial transactions, is strictly prohibited. You must not use our services or infrastructure for any fraudulent purposes or to deceive others.
  5. Denial of Service: Conducting activities that result in the disruption or denial of service to other users or our systems is strictly prohibited. This includes, but is not limited to, launching or participating in DDoS attacks, flooding networks with excessive traffic, or engaging in any other activity that impairs the availability or performance of our services.

Failure to comply with these security requirements may result in the immediate suspension or termination of your account and may also lead to legal action if deemed necessary. We take security seriously and will cooperate fully with law enforcement authorities in investigating any security violations. Help us maintain a secure environment for all users by adhering to these guidelines and promptly reporting any security concerns or suspected violations.


Authorization for Use

By using our services, you acknowledge and agree to the following

Compliance with AUP: You agree to abide by the terms and conditions outlined in this Acceptable Use Policy (AUP). This includes refraining from any actions that violate the policy or compromise the integrity, security, or availability of our services.

Adherence to Applicable Laws: It is your responsibility to comply with all applicable laws and regulations that govern your use of our services. This includes but is not limited to criminal laws, privacy laws, intellectual property laws, export control laws, tax laws, and any other regulatory requirements relevant to your industry or jurisdiction.

Professional Conduct: You agree to use our services in a professional manner and in accordance with industry best practices. This includes respecting the rights of others, maintaining the confidentiality of sensitive information, and refraining from engaging in any activities that may be deemed unethical, harmful, or disruptive to our services or other users.


Our Monitoring and Enforcement

We may monitor the use of our services, including content, communications, and system resources, to detect any violations of our AUP or suspicious activities that may pose a risk to our infrastructure or users. This monitoring may involve automated tools and manual reviews, and it is conducted in accordance with applicable laws and regulations.

If we identify any activity that violates our AUP, we reserve the right to take appropriate action to address the violation. This may include issuing warnings, suspending or terminating user accounts, removing or blocking access to content, disabling services, or taking legal action as necessary.

In cases where a violation is suspected or confirmed, we may communicate with the user involved to gather additional information, provide guidance, or request corrective measures to resolve the issue. We encourage open dialogue and cooperation to address any concerns and ensure compliance with our policies.


General List of Violation of AUP

The following is a general list of violations of our Acceptable Use Policy (AUP). Please note that this list is not exhaustive, and we reserve the right to determine, in our sole discretion, whether a particular conduct violates our AUP. The violations include, but are not limited to:

  1. Child Pornography - Hosting, Distributing, or Linking to Pornography Involving a Person Under Legal Age
  2. Copyright Infringement - Hosting, Distributing, or Linking to Copyright Infringed Materials
  3. CPU/Memory/Resource Abuse - Consuming Excessive Amount of Server Resources Causing Server Performance Issues
  4. DoS Source - Source of Denial of Service Attack
  5. DoS Target - Target of Denial of Service Attack
  6. Forgery - Faking an IP Address, Hostname, E-Mail Address, or Header
  7. Fraud Site - Hosting or Linking to a Website Intended to Deceive the Public
  8. HYIP - Hosting or Linking to a High Yield Investment Program Website
  9. Identity Theft - Hosting, Distributing, or Linking to Stolen Account Identification Information
  10. Infection - Hosting, Distributing, or Linking to Exploits, Trojans, Viruses, or Worms
  11. IRC - Hosting Internet Relay Chat Server not authorized by BigBox Host
  12. Mass Storage - Storing Mass Amounts of Backups, Archives, Videos, etc.
  13. Phishing - Identity Theft by Email Under False Pretense
  14. Proxy Site - Hosting of or linking to an Anonymous Proxy Server
  15. Bulk Email - No more than 500 emails of similar content (Opt In)
  16. Spam Email - Unsolicited Commercial Email (UCE) or Unsolicited Bulk Email (UBE)
  17. Spam List - Hosting, Distributing, or Linking to Email Address Lists for Spam
  18. Spam Site - A Site Advertised by Spam Email or Spam Web
  19. Spam Ware - Hosting, Distributing, or Linking to Software Designed for Spamming
  20. Spam Web - Unsolicited, Bulk, or Forged Site Advertisement in Web Logs, Forums, or Guestbooks
  21. Spamhaus/RBL - Spam Causing Blacklisting of an IP at www.spamhaus.org/RBL for Malicious Activity
  22. Terrorist Site - Hosting or Linking to a Site Advocating Terrorism
  23. Toolz - Hosting, Distributing, or Linking to Tools or Instructional Material on Hacking/Cracking or Other Illegal Activity
  24. Trademark - Hosting, Distributing, or Linking to Trademark Infringed Materials
  25. Warez - Hosting, Distributing, or Linking to Crackz, Hackz, KeyGenz, Serialz, or Pirated Software
  26. Any other material BigBox Host judges to be threatening or obscene.

Reporting of Violations of this AUP

We rely on the cooperation of our users to maintain a safe and compliant environment. If you become aware of any violation of this AUP, you will immediately notify us and provide us with assistance, as requested, to stop or remedy the violation. To report any violation of this AUP, please contact us at abuse@bigboxhost.com.


Date

This Acceptable Use Policy were last updated on July 13, 2023.