Acceptable Use Policy
Critical Hosting' Acceptable Use Policy ("Policy") is intended to help protect the Critical Hosting service, Critical Hosting clients and the Internet community in general from irresponsible or, in some cases, illegal activities, and the Client agrees to be bound by the Policy.
1. The Client and their end users shall not, nor shall they permit, enable, or assist others, to use the Services for any breach of any applicable law or generally accepted transmission or application protocols applicable to the Internet or any part of it or to anything connected to it or to any user of it. Such prohibited use includes but is not limited to the following:
a. civil infringement of and/or criminal offences relating to IPRs; or
b. commission of any criminal offence (including deliberate transmission of computer viruses) under the Computer Misuse Act 1990 (UK) or any similar legislation in any country; or
c. knowingly or recklessly transmitting, displaying or posting to a publicly accessible service any material which is unlawful or actionably defamatory or an invasion of privacy, breach of an intellectual property right or breach of a right of publicity in any jurisdiction with which any publicly accessible service reasonably appears to have any connection or from which it may reasonably be apprehended that a publicly accessible service is likely to be significantly accessed; or
d. transmitting, transferring, displaying or posting to a publicly accessible service any material in breach of the Data Protection Act 1998 (UK) or similar legislation in any other country or of any material which is confidential or is a trade secret or which affects the national security of the United Kingdom or the said territory or which may expose Critical Hosting to any retribution or penalty under the laws and/or regulations and/or decrees of the United Kingdom or any other country relating to the export of or dealing with military or potentially military resources; or
e. use of the Services or the Internet in any manner which is a violation or infringement of any rights of any kind or nature (whether like to any of the foregoing or otherwise) of any person, firm or company; or
f. any sending of unsolicited email messages or any mass mailing of unsolicited advertising material by the Client; or
g. any activity that potentially could harm the Critical Hosting Network, its clients' networks or other networks, including but not limited to traffic flooding, malicious overflows, etc; or
h. any activity that Critical Hosting decides at its absolute discretion is an unsuitable use of the Services.
2. The Client is responsible for:
a. Maintaining email addresses of the forms firstname.lastname@example.org and email@example.com for receiving complaints of network abuse activities, as suggested by Internet Official Protocol Standard RFC 2142. Typically, these email addresses will forward emails to the real user accounts of the responsible persons for treating the network misuse complaints.
b. The activities of its customer base or end-users and, by accepting service from Critical Hosting, is agreeing to ensure that its clients abide by this Policy. If irresponsible or illegal activity continues, even after Critical Hosting tries to communicate with the Client, then the Client may be subject to an appropriate action in order to stop those activities.
3. All complaints related to network misuse - including email abuse - are to be sent to abuse@Critical Hosting.com
4. IRC services or IRC-related services are not permitted. This includes, but is not limited to: "IRCd servers," "eggdrops," "bots," and "bouncers." The purpose of this restriction is to prevent attacks on the Critical Hosting service due to malicious activity that has been known to occur on the IRC networks EFnet and Undernet.
5. The Client warrants that it will respond to any Abuse Complaints within 24 hours.