This acceptable use policy governs your use of the SSD Cloud Hosting services we provide (“Hosting Services”). Your use of the Hosting Services means that you accept, and agree to abide by, all the policies in this acceptable use policy, which supplement our terms and conditions. Birch Hosting Limited may modify this Acceptable Use Policy at any time without notice.
You must not allow a third party to access or use the Hosting Services unless you have a developer working on your behalf. As such, you will monitor the use of the Hosting Services by a Third Party and you will procure that they abide by this acceptable use policy. A breach of this acceptable use policy by a Third Party will be deemed to be a breach of this acceptable use policy by you.
The Hosting Services are provided by Birch Hosting Limited (“we”, “us” and “our”). We are registered in England and Wales under company number 6745165 and we have our registered office at 2 Lime Grove, Lichfield, Staffordshire, WS13 6ER.
1. RESOURCE USAGE
1.1. The Shared Hosting Services comprise the provision of web space on our servers to enable you to upload pages and files for the purpose of publishing websites.
1.2. The Shared Hosting Services some plans allow you “unlimited” server space for normal routine “non-file-distribution” web usage. For websites that allow downloading of video, audio or other files we reserve the right to impose a bandwidth limit of fifty (50) gigabytes per calendar month.
1.3. Non-file-distribution usage will remain unaffected by any limit imposed on downloading of video, audio or other files.
1.4. In your use of the Shared Hosting Services (other than where you are using your own virtual private server), you may not:
a. use more than 10% of our platform’s processing capacity. There are numerous activities that could cause such problems, including (but not limited to) CGI scripts and intensive FTP, PHP or HTTP operations
b. run stand-alone, unattended server-side processes or any daemons; including (but not limited to) IRCd
c. run any type of web spider or indexer
d. run any software that interfaces with an Internet Relay Chat network
e. run any bit torrent application, tracker, or client. You may link to legal torrent files off-site, but may not host or store them on our servers
f. participate in any file-sharing/peer-to-peer activities
g. run any gaming servers
h. run entries or other scheduled tasks other than by configuring them through our control panel
i. give away web space under a domain.
j. operate a proxy website or service
k. as a remote file host for other websites
l. operate self-hosted file sync or similar “cloud storage” based services including (but not limited to) OwnCloud, Pydio and Sparkleshare.
1.5. You must not use the Hosting Services as an offsite backup facility. Therefore, all files uploaded to our servers as part of your usage of the Hosting Services must be visible and accessible to the outside world (web-visible) unless they are needed to operate the website of which they form part; We reserve the right to delete files or directories that are not web-visible without giving notice to you.
1.6. All pages of website stored on our servers as part of the Hosting Services will be available to search engines unless you take action to prevent this. If you wish to optimise your web pages for search engines you agree to use coding and techniques which comply fully with the guidelines issued by Google, Bing, Yahoo and other large search engines.
1.7. MySQL Databases are limited to 1024 megabytes in size, when they reach this size we will notify you.
1.8. If you are a Reseller and deactivate a resold web hosting account we will delete it after 50 days.
2. PROHIBITED USES
2.1. You may use the Hosting Services only for lawful purposes. You may not use the Hosting Services:
a. in any way that breaches any applicable local, national or international law or regulation
b. in any way that is unlawful or fraudulent, or has any unlawful or fraudulent purpose or effect
c. for the purpose of harming or attempting to harm minors in any way
d. to send, knowingly receive, upload, download, use or re-use any material which does not comply with our content standards (see below)
e. to transmit, or procure the sending of, any unsolicited or unauthorised advertising or promotional material or any other form of similar solicitation (also known as SPAM – see below)
to knowingly transmit any data, send or upload any material that contains viruses, Trojan horses, worms, time-bombs, keystroke loggers, spyware, adware or any other harmful programs or similar computer code designed to adversely affect the operation of any computer software or hardware
f. reselling or supplying free of charge hosting space to 3rd parties.
3. CONTENT STANDARDS
3.1. These content standards apply to any and all material that you allow to be hosted through the Hosting Services and to any interactive services associated with it.
3.2. You must comply with the spirit of the following standards. The standards apply to each part of any Material as well as to its whole.
3.3. Material must:
a. be accurate (where they state facts)
b. be genuinely held (where they state opinions)
c. comply with applicable law in the UK and in any country from which they are posted
3.4. Material must not:
a. contain any material which is defamatory of any person
b. contain any material which is obscene, offensive, hateful or inflammatory
c. contain any material that is pornographic
d. promote violence
e. promote discrimination based on race, sex, religion, nationality, disability, sexual orientation or age
f. infringe any copyright, database right or trade mark of any other person
g. be likely to deceive any person
h. be made in breach of any legal duty owed to a third party, such as a contractual duty or a duty of confidence
i. promote any illegal activity
j. be threatening, abuse or invade another’s privacy, or cause annoyance, inconvenience or needless anxiety
k. be likely to harass, upset, embarrass, alarm or annoy any other person
l. be used to impersonate any person, or to misrepresent your identity or affiliation with any person
m. give the impression that they emanate from us, if this is not the case
n. advocate, promote or assist any unlawful act such as (by way of example only) copyright infringement or computer misuse
4. ZERO TOLERANCE SPAM POLICY
4.1. We take a zero tolerance stance against the sending of unsolicited email, bulk emailing and spam. We may terminate the account of any user who send out spam with or without notice
4.2. Websites advertised as spam may not be hosted on our servers. This provision includes, but is not limited to, spam sent via fax, phone, postal mail, email, instant messaging or newsgroups. Any user account which results in our IP space being blacklisted will be immediately suspended and/or terminated.
4.3. Birch Hosting Limited reserves the right to require changes or disable as necessary any website, account, database or component that does not comply with our policy
4.4. Birch Hosting Limited reserves the right to charge the holder of the account used to send any unsolicited email, a clean-up fee or any charges incurred for blacklist removal at our sole discretion.
5. SUSPENSION AND TERMINATION
5.1. We will determine, in our discretion, whether there has been a breach of this acceptable use policy through your use of the Hosting Services. When a breach of this policy has occurred, we may take such action as we deem appropriate.
5.2. Failure to comply with this acceptable use policy constitutes a material breach of the our terms and conditions of sale upon which you are permitted to use the Hosting Services, and may result in our taking all or any of the following actions:
a. immediate, temporary or permanent withdrawal of your right to use the Hosting Services
b. immediate, temporary or permanent removal of any Material (as defined in paragraph 5.1) uploaded to our servers
c. issue of a warning to you
d. issue of legal proceedings against you for reimbursement of all costs on an indemnity basis (including, but not limited to, reasonable administrative and legal costs) resulting from the breach
e. further legal action against you
f. disclosure of such information to law enforcement authorities as we reasonably feel is necessary
6. CHANGES TO OUR ACCEPTABLE USE POLICY
6.1. We may revise this acceptable use policy at any time by amending this page. You are expected to check this page from time to time to take notice of any changes we make, as they are legally binding on you.
Birch Hosting Customer?
If you currently have an account with us then please login and create a ticket from your client area for a faster response.