Web Host Pro | Acceptable Use Policy and Terms Of Service Agreement (Updated 01-02-2011

---Acceptable Use Policy and Terms Of Service Agreement---

Agreeing to Web Host Pro Acceptable Use Policy and Terms of Service is mandatory for Hosting signing up or using our services.

Introduction
During the term of its agreement with Web Host Pro, the customer must ensure that the use of any resource offered to the customer or owned or controlled by Web Host Pro ("Service") conforms with Web Host Pro's then current Acceptable Use Policy ("AUP"). Web Host Pro may modify, without prior notice, the AUP as Web Host Pro deems appropriate; such modified AUP is effective upon posting on Web Host Pro's website.

(If we change our policies we will email all customers and post to the announcements section)

Responsibility
You are responsible for your sites and all sites that you host to be in accordance with all rules on this page. Misuse by you may result in actions on your account, including suspension or even removal from the host.

If your site does something really bad we might have to stop it to investigate the issue, this is really really rare.

Free Private Registration
We give free privacy on all domain registration that is also hosted with Web Host Pro, this requires the domain to use our name servers. You can change in and out of free privacy at anytime and there is never a fee at any point.

Inappropriate Use
The Service must not be used to publish, post, distribute or otherwise disseminate unlawful material or information including, but not limited to: threatening, harassing, defamatory, or fraudulent information and materials, or proprietary, copyrighted, or otherwise intellectually protected information and materials for which the customer does not have authorization or authority to possess or distribute. The Service must not be used to request unlawful services or materials. The Service must not be used for activities Web Host Pro deems to impact its customers or its ability to deliver services to its customers. Such activities may include, but are not limited to:

1. Intellectual Property Infringement
Any activity infringing on the intellectual property rights of others, including copyrights, trademarks, service marks, trade secrets, and patents.

2. Spamming
Sending unsolicited commercial bulk email ("UCE"), news postings or chain letters; advertising transmitting, or otherwise making available any software, program, product, or service that is designed to facilitate sending UCE; use of web pages that allow "spam"ing (known as "ghost sites") that directly or indirectly refers to domains or IP addresses hosted by Web Host Pro. Web Host Pro reserves the right to determine in its sole discretion what constitutes UCE based on the information available. Sending any email to purchased lists or lists obtained by any other method (such as harvesting) is not acceptable. Customers may only send email to recipients who have joined mailing lists directly from their site.

3. Maintaining an Open Email Relay
Allowing email to be sent through the customer's system by a third party (i.e. neither to nor from Customer or Customer's accounts).

4. Fraud
Using a false identity; using pyramid/ponzi scheme; storage or transmission of any intentionally incorrect data or packet.

5. Virus, Worm, or Trojan horse program distribution
The deliberate transmission of computer viruses, worms or trojan software.

6. Denial of Service
Using any technique to intentionally degrade or disable the delivery of any legitimate data.

7. Glutting of servers
Oversized storage of any files that would be unreasonably large (ie. making a zip file filled with text files just to pad the size).This slows down the server, backup process, and site restore if needed.

8. Unauthorized Access
Attempting to gain unauthorized entry to any site or network, or any network or host scanning, probing, monitoring or other information gathering associated with such activity; using the Service to guess passwords.

9. Applications
Customer may not run any program or script on the server that runs constantly or 'listens' on ports unless provided in the control panel. This includes applications associated with chat services.

10. Torrent
We are sorry to say our networks do not allow us to host torrent websites.

Customer Responsibilities

1. Bulk Email
Customers sending bulk email must provide recipients with an easy and effective mechanism for removal from bulk email list. Customer must include the source of the addressee's address in each bulk email message.

2. Updating and securing script and apps
Any website using a PHP or active page is at risk of being hacked. It is very important to keep scripts updated and secure to make sure the website is safe.

3. Password Protection
Customer is responsible for protecting passwords and for any authorized or unauthorized use.

4. Music Files
Customer may not post or store any copy written music material.

5. Content Ownership
Customer is responsible for all content or information residing on, or obtained, or transmitted via, the Service, regardless of whether such use is by the customer.

6. Facilitating AUP Violation
Customer activity that facilitates the violation of this AUP by any party constitutes a violation of this AUP by Customer.

7. Run Site Reasonably Well
Fast loading websites are really important for surfers, It's a win win win for you, them, and us to keep the site loading fast and optimized. This just means basically don't set a wild cron job to run your script every minute or have a page so long it takes a minute to load, Scripts that abuse server resource can be limited to protect the rest of the server. Optimize images, ect... We'll contact you if there is a load issue, it's very rare and normally easy to fix. Scripts that abuse server resource can be limited to protect the rest of the server. Each server also uses sixteen SSD hard drives in a raid system. These are some of the best stable server hardware specs available to date. Super fast and reliable!

AUP Enforcement
Violation of the AUP may subject Customer to international, federal, and/or state civil and/or criminal liability. Web Host Pro reserves the right to suspend, filter or block, and/or terminate Customer's access if Customer's account is being used to exploit or attack the Service or the networks of others. If Customer's account has been compromised and attempts to reach Customer and/or to have Customer repair a breach of security fail, Web Host Pro reserves the right to suspend or terminate Customer's service. If Customer's access is suspended or terminated, Web Host Pro, in its sole discretion, may refuse to accept all new e-mail sent to the terminated e-mail address and delete Customer's data stored on Service. We have never had to do this by the way.

Violation of Rules
Breaking any of these aforementioned rules may result in immediate account suspension.

LIMITATION OF LIABILITY: Web Host Pro (Web Host Pro) shall not be responsible for any claimed damages, including incidental and consequential damages, which may arise from servers going off-line or being unavailable for any reason whatsoever. Further, Web Host Pro (Web Host Pro) shall not be responsible for any claimed damages, including incidental or consequential damages, resulting from the corruption or deletion of any web site from one of Web Host Pro (Web Host Pro) servers. All damages shall be limited to the immediate termination of service. Web Host Pro (Web Host Pro) shall be the sole arbiter of what is and is not a violation of these acceptable use policies. Web Host Pro (Web Host Pro) reserves the right to terminate an account at any time and for any reason that causes harm to any customer's web sites. Web Host Pro (Web Host Pro ) reserves the right to delete all content and files upon termination. Web Host Pro (Web Host Pro) reserves the right to refuse, cancel, or suspend service at our sole discretion. Web Host Pro (Web Host Pro) reserves the right to change these Policies without prior notice or warning. Non-enforcement of any part of these Policies does not constitute consent.

Digital Millennium Copyright Act (DMCA) Agreement
You may not use the Service in any manner that infringes upon any copyright. Such infringement may include, but is not limited to selling counterfeit goods, unauthorized copying of photographs, books, music, videos, or any other copyright protected work. It is our policy to promptly investigate compliant notices of alleged copyright infringement that are provided to us in writing regarding Content hosted on or otherwise displayed via our systems. Our response to such notices may include removing or disabling access to the Content or website claimed to be the subject of infringing activity. In almost all cases we will contact the website or server owner to make sure the content is removed or not what it is claimed.Our goal is to protect the customer but we have to abide by all legal procedures.

If a party wishes to file a claim of copyright infringement regarding Content hosted on or otherwise displayed via our systems may file notice via either email or postal mail. Any person or party who requires assistance filing a claim of copyright infringement should consult or hire a lawyer or other legal professional for assistance. NOTE: Any person who knowingly materially misrepresents that material is infringing, or that it was removed or blocked through mistake or misidentification, is liable for any resulting damages (including, but not limited to costs and attorney's fees) incurred by the alleged infringer, the copyright holder or its licensee, or the service provider.

To email, please use our secure contact form here
To send via postal mail, please send to:

530 W. 6th Street, Suite 805
Los Angeles, CA 90014

The law requires very specific language be present in any notice of alleged copyright infringement. As set forth in the DMCA, in order to be effective, a notice of copyright infringement must include all of the following:

The physical or electronic signature of complaining party;

Identification of the copyrighted work claimed to have been infringed, or, if multiple copyrighted works at a single online site are covered by a single notification, a representative list of such works at that site;

Identification of the content that is claimed to be infringing or to be the subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit us to locate the content (i.e. the specific URLs where the allegedly infringing activity is said to be taking place);

Information reasonably sufficient to permit us to contact the complaining party, such as an address, telephone number, and, if available, an electronic mail address at which the complaining party may be contacted;

A statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law;

A statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.

A counter notification is a legal request for Media Temple to re-enable or otherwise restore access to the material claimed to be the subject of infringing activity. The law requires very specific language be present in any counter notice. As set forth in the DMCA, in order to be effective, a counter notice must include all of the following:

The physical or electronic signature of the alleged infringer or an agent authorized to act on behalf of the alleged infringer (such as an attorney);

Identification of the material that was removed (or to which access was disabled) and the location at which the material appeared before it was removed or access to it was disabled;

A statement under penalty of perjury that the alleged infringer (or his/her authorized agent) has a good faith belief that the material was removed or disabled as a result of mistake or misidentification of the material to be removed or disabled;

The alleged infringer's (or his/her authorized agent's) name, address, and telephone number, and a statement that the alleged infringer (or his/her authorized agent) consents to the jurisdiction of Federal District Court for the judicial district in which the address is located, or if the alleged infringer's (or his/her authorized agent's) address is outside of the United States, for any judicial district in which the service provider may be found, and that the alleged infringer (or his/her authorized agent) will accept service of process from the person who provided notification under subsection or an agent of such person.

Upon receipt of an infringement counter notice that substantially complies with the counter notification requirements set forth in the DMCA, the DMCA requires us to provide the complaining party with a full copy of the counter notice provided to us by the alleged infringer or his/her authorized agent. The DMCA also requires us to permit the alleged infringer to restore access to the material claimed to be the subject of infringing activity, within no less than ten business days and no more than fourteen business days following our receipt of a compliant counter notice, unless we first receive notice that the complaining party has filed an action seeking a court order to restrain the alleged infringer from engaging in infringing activity. Be advised, regardless of whether or not the complaining party files an action seeking a court order to restrain the alleged infringer from engaging in infringing activity, the complaining party may still maintain the right to seek relief in a court of law. It is our policy to adhere to all orders of the court. Any court order issued in connection with a complaint that has been filed against the alleged infringer with which we are served will, with immediate effect, supersede any allowance we may have made permitting the alleged infringer to re-enable or otherwise restore the access to the material claimed to be the subject of infringing activity. A filing of a copyright infringement counter notice may result in litigation between and among the parties.