Acceptable Usage of Services

We offer a range of services that we think you should be able to use how and when you like. As a service provider we do have the obligation to help keep our network (and our upstreams) safe. Below we detail some simple - yet cruicial usage cirteria.

Last updated 5th December, 2022
Section 1

Hardware and physical systems

  1. Additional hardware tuning (also known as "overclocking") is not acceptable on our services without prior consent.
  2. Attempts to change, gain unauthorized access or disable any out-of-band access is strictly prohibited.
  3. Using our machines in a way that results in any "Crypto" gain is prohibited without prior consent.
Section 2

Network and data flow

  1. We maintain control over our network, infrastructure and devices. Some of our devices may be controlled by data centers (upstreams) where we lease cabinet space and/or bandwidth as such we control your data and the data that flows on any systems maintained by us.
  2. You and/or customers (players) that connect through our network to access or distribute content are prohibited from obtaining and/or redistributing any unlawful materials, including but not limited to child pornography, intellectual property and/or unlawful hate-speech materials.
  3. Any use of "bandwidth mining" technologies falls under Section 1.3 and is not prohibited.
  4. IPTV (and/or any other media distribution services) is not prohibited on our network without prior consent and valid/current video streaming licenses for the content you are distributing.
Section 3

Lawful usage

  1. Our services must only be used to serve lawful (content/purpose), as a company incorporated in the United Kingdom, England lawful content will be held under the standard of laws and regulations of the United Kingdom.
  2. You are not to store, redistribute or harbour content that is unlawful, this includes but is not limited to protected material by copyright, trademark, trade secrets and/or any other intellectual property laws applicable in the United Kingdom.
  3. You are prohibited to use our service(s) for any illegal activities, this is includes but is not limited to denial of service attacks (DDoS) and/or protection of sites advertising such services.
Section 4

Operational security

  1. All systems on our network assume allow-list access methods. You must not attempt to gain unauthorized to our systems, other customer systems and/or external systems (regardless of if on our infrastructure). This also extends to attempting to gain access to expired or suspended products (regardless of reason).
  2. A user must not circumvent (also known as "hacking" or "cracking") any authentication method or security of any network, host or customer account. This extends to the temporary (or permanent) disruption to services known as DDoS attacks, see Section 3.3.
  3. You are prohibited from hosting public proxy services on our network or systems.
  4. You are prohibited from mis-using, forging or changing any IP packet headers. You are also prohibited from using our services for any type of spoofing.
  5. No unauthorized access and/or use of data, systems or network including attempts to scan, test or circumvent. You are not to test the vulnerability of any system without prior consent from us and any involved provider(s).
Section 5

Restricted access

We reserve the right to restrict access to your service in the form of artificial network limitations and temporary (or permanent) suspensions in order to maintain a high service quality.

Some ways we may restrict your service are as follows (this is not an exhaustive list):

  1. Applying software limits to specific ports to reduce traffic of individual services.
  2. Temporary termination of services.
  3. Permanent termination of services and customer relations.

Any over usage of network (bandwidth) will be billed under applicable agreements. These agreements may be revised at any time without prior notice to customers.

Section 6

Virtual private solutions

Virtual dedicated solutions are offered on a "shared model" (also known as fair-use) this introduces a varying degree of combined resources. Where possible we aim to balance our nodes fairly to ensure everyone is able to take full advantage of their service. We allocate services based on RAM (memory) and this is also the billing factor. As CPU time is shared between customers any one customer will only be able to utilise 1/3 of the nodes capacity (CLS 9 phy cores, PRO 4 phy cores).

In the event where a customer is deliberately loading tasks to cause cpu hitch-time for other customers we will recommend they move over to a bare metal service or implement one of the following restrictions:

  1. Temporarily rate limit your core speed and/or usage to reduce congestion.
  2. Pinning cores for specific services, ie allocated cores 0-8 to a specific virtual instance.
  3. Offer favourable conversion rates to a Bare Metal service.
  4. Give 30 days notice on contractual price change for additional resources used.

In the case where an overage of resources is bandwidth related, please see Section 5 of the acceptable use policy.

full-white.svg

We aim to provide simple yet elegant hosting solutions using high-performance and scalable hardware that disrupt the market offering affordability and quality.

(+44) 02080 505 241
linkedin.svg
github.svg
discord.svg

Copyright © 2022 Scaleblade, Ltd.