Last updated: May 5th, 2018
Host Havoc services may not be used for illegal purposes, or in support of illegal activities. Host Havoc reserves the right to cooperate with legal authorities and/or injured third parties in the investigation of any suspected crime or civil wrong doing.
Using of the Host Havoc services to transmit any material (by e-mail, uploading, posting or otherwise) that threatens or encourages bodily harm or destruction of property. Harassment using of the Host Havoc services to transmit any material (by e-mail, uploading, posting or otherwise) that harasses another.
Adding, removing or modifying identifying network header information in an effort to deceive or mislead is prohibited. Attempting to impersonate any person by using forged headers or other identifying information is prohibited. The use of anonymous remailers or nicknames does not constitute impersonation.
Use of Host Havoc service to make fraudulent offers to sell or buy products, items, or services, or to advance any type of financial scam such as “pyramid schemes” and “chain letters.”
Use of the Host Havoc service to access, or to attempt to access, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Host Havoc or another entity’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in the corruption or loss of data, is expressly prohibited and the offending Host Havoc account is subject to immediate termination and further investigation.
Use of the Host Havoc service for any activity which affects the ability of other people or systems to use Host Havoc services or the Internet. This includes “Denial of Service” (DoS) attacks against another network host or individual user. Interference with or disruption of other network users, services or equipment is prohibited. It is the Member’s responsibility to ensure that their network is configured in a secure manner. A Subscriber may not, through action or inaction, allow others to use their network for illegal or inappropriate actions. A Subscriber may not permit their network, through action or inaction, to be configured in such a way that gives a third party the capability to use their network in an illegal or inappropriate manner. Unauthorized entry and/or use of another company and/or individual’s computer system will result in immediate account termination. Host Havoc will not tolerate any subscriber attempting to access the accounts of others, or penetrate security measures of other systems, whether or not the intrusion results in corruption or loss of data.
Fraud involves a knowing misrepresentation or misleading statement, writing or activity made with the intent that the person receiving it will act upon it. Fraud is strictly prohibited and offenses will be investigated. Third-party Links, Sites and Services Our Products may contain links to third-party websites, advertisers, services, special offers, or other events or activities that are not owned or controlled by Host Havoc. We do not endorse or assume any responsibility for any such third-party sites, information, materials, products, or services. If you access any third party website, service, or content from Host Havoc, you do so at your own risk and you agree that Host Havoc will have no liability arising from your use of or access to any third-party website, service, or content.
Hosting services provided by Host Havoc are not to be used for any of the following: pornography, file sharing/repositories/storage, fraudulent activity, extortion or blackmail. Clients utilizing this service may also not upload any sort of malicious scripts/software; this includes the following but not limited to items involving phishing, backdoors, CPU/memory eating scripts and more. The service may only be used for the purpose of hosting a website/web application. It may not be used as a central source for providing clients with mod content (Arma 3, for instance).
Disk space provided in associated with our web hosting services may only be used for files and content in direct operation of the website, web applications or game servers being hosted. The disk space provided cannot be used for file sharing, storing backups, or anything unrelated to the operation of the website/web application.