This Acceptable User Policy (“AUP”) governs the usage of services of Key Stones Cloud Tech (“Services”) pursuant to the Master Services Agreement between Key Stones Cloud Tech and the Customer. The terms not specifically defined herein shall have the meanings ascribed to them in the Master Services Agreement.
This AUP shall be incorporated by reference into each contract entered by Key Stones Cloud Tech with the Para hit Technology for availing the Services. In addition, this Policy shall also be incorporated by reference into the Master Service Agreement.
D. All hosting services provided by Key Stones Cloud Tech shall be used by the Customer for lawful purposes only, and as per the applicable laws (including but not limited to privacy laws). Transmission, usage, storage, or presentation of any information, data or material in violation of applicable laws including the ‘banned contents’ is strictly prohibited. The ‘banned contents’ include, but are not limited to:-
Illegal Material - Includes illegally exploited copyrighted works, commercial audio, video, or music files, and any material that violates any applicable law or regulation of any country, and any material that is perceived to be misleading in any manner.
Warez - Includes, but is not limited to, pirated software, ROMS, emulators, phreaking, hacking, password cracking, IP spoofing and the like, and encrypting of any of the above. It also includes any sites which provide "links to" or "how to" information about such material
HYIP - HYIP sites, or sites that link to or have content related to HYIP sites.
Proxy - Any proxy set-ups or connections or any sort of activity through remote proxy connections on our hosting and/or in relation to our Colocation services.
IRC Hosts – (Hosting an IRC server that is part of or connected to another IRC network or server) Servers, found to be (a) connecting to or (b) part of these networks;
Defamatory content - any website content that makes a false claim, expressively stated or implied to be factual, or that may give an individual, business, product, services, group, government or nation a negative image.
Bit Torrents - Use of software and scripts for "bit torrents" including sending or receiving files using these mechanisms.
Adult Content Key Stones Cloud Tech does not allow pornographic or sexually-explicit images or any pictures/ video which are obtained illegally to be hosted on its servers.
Undertaking of the Customer The Customer agrees and undertakes that;
Any attempt to undermine or cause harm to any of the servers of Key Stones Cloud Tech is strictly prohibited. Key Stones Cloud Tech shall take no responsibility for the use of its clients' accounts by the Customer.
In case of abuse of the resources provided by Key Stones Cloud Tech, in any way, Key Stones Cloud Tech reserves the unqualified right to immediately deactivate the Customer’s account, without refund.
Denial of Service (DOS) attacks directed at Key Stones Cloud Tech, or any attempt to launch a DOS attack from Key Stones Cloud Tech servers are strictly prohibited. All infractions and or suspected infractions will be vigorously investigated and may result in immediate termination of Customer’s account.
In case the Customer is, in any way, disrespectful towards any member of Key Stones Cloud Tech or its staff, Key Stones Cloud Tech shall have full right to terminate Customer’s account with it, without any refund.
Key Stones Cloud Tech will use reasonable efforts to protect server for its clients / Customer, The Customer is solely responsible for making back-up files in connection with its use of the Services.
Client shall be responsible for any misuse of its Server/account and it must take steps to ensure that others do not gain unauthorized access to its Server/account. It shall not use its account to breach the security of another account or server or attempt to gain un-authorised access to another network or server.
Key Stones Cloud Tech will use commercially reasonable efforts to resolve all Incidents as soon as reasonably possible, but does not make any representations or warranties as to the timeliness of the resolution of any Incident.
Its password provides access to its account and it is responsible to keep its password secure.
Sharing its password and account access with unauthorized users is strictly prohibited. It will take care and prevent others from using its account. It will be responsible for all consequences of others using its account.
Attempting to obtain another user's account password is strictly prohibited, and will result in termination of Services.
It shall adopt adequate security measures to prevent un-authorised use of its account.
It shall not attempt to circumvent user authentication or security of any host, network or account which includes but is not limited to accessing data not intended for it, logging into or making use of a server or account. It is not expressly authorized to access, or probe the security of other networks. Use or distribution of tools designed for compromising security is prohibited. Such tools shall include but are not limited to password guessing programs, cracking tools or network probing tools.
It shall not attempt to interfere with services provided to any user, host or network or carry out DOS attacks which includes but is not limited to "flooding" of networks, deliberate attempts to overload a service, and attempts to "crash" a host.
Users who violate systems or network security may incur criminal or civil liability. Key Stones Cloud Tech will cooperate fully with investigations of violations of systems or network security at other sites, including cooperating with law enforcement authorities in the investigation of suspected criminal violations.
It shall complete its own tests for computer viruses in accordance with best computing practice prior to each and every operational use of the Services.
Materials and Products
Key Stones Cloud Tech shall exercise no control whatsoever over the content of the information passing through the network or on the Customer's websites.
Use of any information obtained by way of Key Stones Cloud Tech is at the Customer's own risk, and Key Stones Cloud Tech specifically denies any responsibility for the accuracy or quality of information obtained through its services.
Connection speed represents the speed of connection to Key Stones Cloud Tech and does not represent guarantees of available end to end bandwidth. Key Stones Cloud Tech can only guarantee within its controlled network, availability of bandwidth to Customer's subscribed Committed Information Rate".
Key Stones Cloud Tech is under no obligation to edit, review or modify the contents of the Customer's website. However, Key Stones Cloud Tech reserves the right to remove any content on the Customer’s website without notice. For the avoidance of doubt, Key Stones Cloud Tech shall not pro-actively monitor messages that are posted on the sites managed by Key Stones Cloud Tech, but it reserves the right to remove such messages at its sole discretion, without notice to the Customer.
The Account of the Customer found to be using the Services for any of the purposes contained in Clause (4) (1), above shall be terminated without any notice.
The first offense committed by the Customer in respect of Proxy as set out in Clause 4 (4), above will result in immediate suspension of their account. A second violation by the Customer in this regard will result in immediate termination of its account.
Servers found to be (1) connecting to, or (2) part of another IRC network or server will be immediately removed from Key Stones Cloud Tech network, without notice. Such servers will not be reconnected to the network until such time that all traces of the IRC server are completely removed, and the Customer allows access to its server to confirm that the content has been completely removed.
The Customer agrees that it shall fully and effectively defend, indemnify, save and hold Key Stones Cloud Tech harmless from any and all demands, liabilities, losses, costs, actions, proceedings, expenses (including legal expenses), liabilities and/or claims, howsoever suffered or incurred directly or indirectly by Key Stones Cloud Tech, its agents, officers and employees, that may arise or result from any acts or omissions of the Customer, its agents, employees or assigns (1) in connection with their use of the Services, and/or (2) as a consequence of the Customers breach or non-observance of its obligations set out in this AUP.
The Customer shall defend and pay all costs, damages, awards, fees (including legal expenses) and judgments awarded against Key Stones Cloud Tech arising from breach or breaches of its obligations set out in this AUP. Key Stones Cloud Tech may in its absolute discretion defend such claims and may compromise such claims without the consent of the Customer. The Customer shall provide Key Stones Cloud Tech with the assistance necessary, or as required by Key Stones Cloud Tech, to defend such claims, at the Customer’s sole expense.
1. All clients are allowed access to the public network and IP; however, misuse of the network and IP in any way, including interference, will result in a violation of this AUP. All violations of this AUP shall be subject to review by Key Stones Cloud Tech and an appropriate course of action shall be taken as determined by Key Stones Cloud Tech in its sole discretion. Proper use of public network and IP must comply with all local, state, and Indian IT laws. Clients assume full liability for all content which they place on the server. Content displaying or transferring acts of copulation or exposed genitalia is prohibited, regardless of context. Forging any TCP/IP packet header or any part of the header information in any e-mail or newsgroup posting is deemed a violation of this AUP.
Key Stones Cloud Tech assigns Customer an Internet Protocol address for Customer's use, and to make server/service/Device accessible from public network, which hosted in Key Stones Cloud Tech, IPs provided by Key Stones Cloud Tech to the Client, for the same duration of service given by Key Stones Cloud Tech to Client, Any activity performed by client or client’s client or people/company of client, The Client will solely responsible.
Key Stones Cloud Tech is providing IP for serving services to customers/clients/individuals/companies, and we are not responsible for any activity performed via allocated IPs.
To ensure lawful and valid use of Key Stones Cloud Tech IP Addresses, Key Stones Cloud Tech will continuously make efforts to monitor and keep tracks of network connection logs of all their TCP/IP Connections and IP addresses allotted to customers as per new regulations.
Business Risk And Losses
You agree and acknowledge that the Services provided by us have Inherent Business Risk and such Inherent Business Risk may be beyond our control, and you may incur losses including but not limited to direct and indirect losses. We will not be liable, in whatever manner, for any losses incurred by you due to the foregoing. You hereby assume all risks arising out of the provision of the Services to you, your agents (including contractors and sub-contractors) or employees and shall indemnify, defend and hold harmless the Indemnified Parties from any and all Claims and/or Losses, caused by or arising in connection with any use or abuse of the same.
1. We shall not be held responsible for any security breach resulting due to your failure to implement and/or comply with security measures or due to any other cause, which in our opinion is beyond our control. All and any liability(ies) arising out of or in connection with such security breach shall be solely and totally borne by you, and neither you, nor your representatives having gained access to your Customer Account or any Third Party gaining unauthorized access to your Customer Account shall have any Claims against us for such liabilities
2. You shall defend, indemnify and hold harmless, us, our Affiliates, or any of our respective employees, agents or suppliers (“Indemnified Parties”), from and against any and all Claims and/or Losses arising out of or attributable, whether directly or not, to such security breach.
3. Backup of Customer data: Client should take appropriate action to secure, protect and backup the Data including programs, data, software and any other Customer Data. We shall not be under any obligation,while providing the Services to the Customer, under these Terms, to maintain any copy, Client remain responsible to ensure that adequate backup is taken by Client and to test the accuracy of such back up of Customer Data. We shall not be responsible for the same.
1. Spamming via third-party proxy, aggregation of proxy lists, or installation of proxy mailing software. Configuration of a mail server to accept and process third-party messages for sending without user identification and authentication. Hosting web pages advertised within “spam e-mail” sent from another network (“spamvertising”). Hosting web pages or providing services that support spam. Any other unsolicited bulk messages, postings, or transmissions through media such as weblog posts, IRC/chat room messages, guestbook entries, HTTP referrer log entries, Usenet posts, pop-up messages, instant messages, or SMS messages. Instructing others in any activity prohibited by this AUP.
2. If any Customer or any Third Party User that is a customer of our Customer uses Key Stones Cloud Tech Services, Key Stones Cloud Tech Network or its physical infrastructure in a manner that causes Key Stones Cloud Tech to be “blacklisted” or blocked, Key Stones Cloud Tech reserves the right to (i) suspend permanently or terminate Key Stones Cloud Tech Services of such Customer and/or (ii) suspend permanently or terminate the access to Key Stones Cloud Tech Services, Key Stones Cloud Tech Network or its physical infrastructure by such Third Party User. Operating Key Stones Cloud Tech Service on behalf of, or in connection with, or reselling any service to persons or firms listed in the Spamhaus Register of Known Spam Operations database at www.spamhaus.org shall constitute a violation of this AUP.
3. Block Removal – If, as a result of a Customer’s actions, Key Stones Cloud Tech ’s mail servers or IP address ranges are placed on black hole lists or other mail filtering software systems, Key Stones Cloud Tech shall charge the Customer $100 upfront and $100 per hour thereafter for any necessary remedial actions.
4. IP Allocation: Key Stones Cloud Tech owns each IP address that it assigns to a Customer. A Customer shall not use IP addresses that were not assigned to it by Key Stones Cloud Tech . Key Stones Cloud Tech reserves the right to suspend the network access of any server utilizing IP addresses outside the assigned range.
5. IRC Policy: Customers may not operate and maintain IRC servers which connect to global IRC networks such as Undernet, EFnet and DALnet. Use of IRC plug-ins, scripts, add-ons, clones or other software designed to disrupt or deny service to other users is prohibited. Harassing or abusive IRC activity is expressly prohibited under the AUP, including (i) disruption or denial of service or (ii) the use or joining of “botnets” or the use of IRC BNC’s or other proxy and re-direction software. If a Customer’s IRC servers are frequently compromised or attract denial of service or distributed denial of service attacks that disrupt or denies service to other Customers or users, Key Stones Cloud Tech may null-route, filter, suspend, or terminate that Customer’s service.
6. Usenet Policy: Usenet posts and content must conform to standards established by the Internet community and the applicable newsgroup charter. Key Stones Cloud Tech reserves the right to determine whether such posts violate the AUP.
7. No VPN Policy: We don't allow VPN service providers to host their services on our infrastructure.
8. Send unsolicited commercial messages or communications in any form ("SPAM")Receive complaints from cybercrime, About violations and/or fraud, Any activity which is prohibited as per the Indian IT act, Engage in any activities or actions that infringe or misappropriate the intellectual property rights of others, including, but not limited to, using or distributing third party information protected as a trade secret information in violation of a duty of confidentiality, using third party copyrighted materials without appropriate permission, using third party trademarks without appropriate permission or attribution.
9. Engage in any activities or actions that would violate the personal privacy rights of others, including, but not limited to, collecting and distributing information about Internet users without their permission, except as permitted by applicable law.
10. Send, post or host harassing, abusive, pornographic, libelous or obscene materials, or assist in any similar activities related thereto; Intentionally omit, delete, forge or misrepresent transmission information, including headers, return mailing and Internet protocol addresses;
11. Engage in any activities or actions intended to withhold or cloak Customer's or its Users; identity or contact information.
12. Use the Key Stones Cloud Tech connectivity services for any illegal purposes, in violation of any applicable laws or regulations or in violation of the rules of any other service providers, websites, chat rooms or the like assist or permit any persons in engaging in any of the activities described above.
Violations of AUP
Key Stones Cloud Tech may enforce this AUP, with or without notice to a User, by any action it deems reasonable, in its sole discretion. In addition to the remedial provisions provided elsewhere in this AUP, Key Stones Cloud Tech may:
• Disable access to a User’s content that violates this AUP.
• Suspend or Terminate a User’s access to Key Stones Cloud Tech Services.
• Network or its physical infrastructure.
• Remove DNS records from Servers.
• Block mail or any other network service.
• Effect IP address null routing.
• Take legal action against a User to enforce compliance with this AUP.
If there is a violation of this AUP, direct the information to the Abuse Department at email@example.com or via postal mail to: If available, please provide the following information:
1. The IP address used to commit the alleged violation.
2. The date and time of the alleged violation, including the time zone or offset from GMT.
3. Evidence of the alleged violation: E-mail with full header information provides all of the above, as do system log files. Other situations will require different methods of providing the above information..
4. Key Stones Cloud Tech may take anyone or more of the following actions in response to complaints: Issue written or verbal warnings..
o Suspend the User's newsgroup posting privileges.
o Suspend the User's account.
o Terminate the User's account.
o Terminate the User's account.
o Bill the User for administrative costs and/or reactivation charges.
o Bring legal action to enjoin violations and/or to collect damages, if any, caused by violations.
If any infrastructure in a manner that exposes Key Stones Cloud Tech to potential liability, as reasonably determined by Key Stones Cloud Tech may suspend permanently or terminate the access to Key Stones Cloud Tech Services, Key Stones Cloud Tech Network or its physical infrastructure by such User.
This agreement may be modified at any time by Key Stones Cloud Tech for any reason or in order to comply with any local, national or international laws, rules or regulations, with notice of such modification to client, which notice may be sent to client by e-mail, fax, or regular mail.