This Acceptable Use Policy (“Policy”) outlines the prohibited uses of the web services provided by ByteNAP Networks Private Limited and its affiliates (collectively referred to as the “Services”) and the website located at https://www.bytenap.in (the “ByteNAP Networks Private Limited Site”). The provided examples are not comprehensive. It reserves the right to modify this Policy at any time by publishing an updated version on the Website.
By utilizing the Services or accessing the Website, you signify your agreement to the most recent version of this Policy. It may suspend or terminate your access to the Services if you violate this Policy, either directly or by authorizing or assisting others to do so.
You are prohibited from utilizing, endorsing, encouraging, enabling, or instructing others to employ the Services or Its website for any unlawful, harmful, fraudulent, infringing, or offensive purposes. This includes transmitting, storing, displaying, distributing, or making available content that is illegal, harmful, fraudulent, infringing, or offensive. The following activities or content are expressly prohibited:
Unlawful, Harmful, or Fraudulent Activities: Any activities that are illegal, infringe upon the rights of others or may cause harm to others, our operations, or our reputation. This encompasses activities such as disseminating, promoting, or facilitating child pornography, offering or distributing fraudulent goods, services, schemes, or promotions, engaging in get-rich-quick schemes, Ponzi and pyramid schemes, phishing, or pharming.
Infringing Content: Content that violates or unlawfully appropriates the intellectual property or proprietary rights of others.
Offensive Content: Content that is defamatory, obscene, abusive, invasive of privacy, or otherwise objectionable. This includes content that constitutes child pornography, relates to bestiality, or depicts non-consensual sexual acts.
Harmful Content: Content or other computer technology that may harm, disrupt, clandestinely intercept, or appropriate any system, program, or data, including viruses, Trojan horses, worms, time bombs, or cancelbots.
You are strictly prohibited from using the Services to compromise the security or integrity of any network, computer or communications system, software application, or network or computing device (referred to as a “System”). This includes the following prohibited activities:
Unauthorized Access: Gaining access to or using any System without proper authorization, including attempting to probe, scan, or test a System’s vulnerability or breach any security or authentication measures employed by a System.
Interception: Monitoring data or traffic on a System without authorization.
Falsification of Origin: Forging TCP-IP packet headers, e-mail headers, or any part of a message to misrepresent its origin or route. It’s important to note that legitimate use of aliases and anonymous remailers is not restricted by this provision.
The Company reserves the right to modify prices, monthly payment amounts, or any other charges at its discretion. We will provide you with a minimum of days’ notice before implementing any changes to prices via our announcements portal. It is your sole responsibility to regularly review billing information provided by us through the user billing tool or through other means of communication, including notices sent or posted by us.
Our refund policy is designed to cater exclusively to shared hosting customers who have made payments using their selected payment method at the time of their order. This policy allows for a 30-day money-back guarantee.
Please note that this 30-day money-back guarantee applies only to hosting customers who have chosen hosting without free domain registration and transfer.
It’s important to be aware that payments made through PayPal and Cryptocurrency are non-refundable under any circumstances.
If you have a credit balance, you can request a withdrawal within 30 days using an opt-in payment method.
To ensure responsible network usage, it is essential to refrain from making network connections to users, hosts, or networks unless you have explicit permission to communicate with them. Activities that are strictly prohibited include:
Monitoring or Crawling: Any monitoring or crawling of a system that disrupts or impairs the functionality of the system being monitored or crawled.
Denial of Service (DoS): This involves inundating a target with communication requests, rendering the target unable to respond to legitimate traffic or slowing down its response to the point of ineffectiveness.
Intentional Interference: Deliberate actions aimed at interfering with the proper functioning of any system, including overloading a system through methods like mail bombing, news bombing, broadcast attacks, or flooding techniques.
Operation of Certain Network Services: Operating network services such as open proxies, open mail relays, or open recursive domain name servers.
Avoiding System Restrictions: Using manual or electronic methods to bypass any limitations imposed on a system, such as access and storage restrictions.
You are expected to adhere to responsible email and messaging practices, which means refraining from distributing, publishing, sending, or facilitating the transmission of unsolicited mass emails or other messages, including spam, commercial advertising, and informational announcements. Altering or concealing mail headers or assuming a sender’s identity without explicit permission is strictly prohibited.
Moreover, you should not collect responses to messages sent from another internet service provider if those messages violate this Policy or the acceptable use policy of that provider.
While we retain the right to investigate violations of this Policy or misuse of our Services or the ByteNAP Networks Private Limited website, we are not obligated to do so. Our actions may include:
Investigating violations of this Policy or misuse of our Services or the website.
Removing, disabling access to, or modifying any content or resource that breaches this Policy or any other agreement governing your use of the Services or the website.
We may also report any activity that we suspect may violate any applicable laws or regulations to relevant law enforcement officials, regulators, or other appropriate third parties. This reporting may entail the disclosure of relevant customer information. Additionally, we may cooperate with law enforcement agencies, regulators, or other third parties to assist in investigating and prosecuting illegal conduct, providing necessary network and systems information related to alleged Policy violations.
Should you become aware of any violations of this Policy, you are required to promptly notify us and offer assistance as requested to halt or remedy the violation.