- asd;lasd;lk
+ Acceptable Use Policy
-
+
+ By using any of our services, you agree to comply with the following
+ guidelines:
+
+
+ -
+ Absolutely no pornography involving minors. We have zero tolerance
+ for violation of this policy and will immediately terminate your
+ account if we recieve a verified complaint from NCMEC or similar
+ organization. This includes but is not limited to drawings, audio,
+ video, photographs, and ai generated content.
+
+ -
+ Engaging in malicious activities, including aggressive outgoing
+ email spam, organizing botnets, DDoS attacks, port scanning, or
+ anything else that may get our IP addresses flagged.
+
+ -
+ Violating any laws, regulations, or third-party rights under either
+ U.S. or Pennsylvania law.
+
+ - Distributing malware, viruses, or harmful software.
+ - Engaging in fraudulent, abusive, or harassing activities.
+
+
+ 2. Resource Usage:
+
+ We do not implement hard limits on your instance by default. So, It is
+ recommended that you stay within thsese suggested limits:
+
+
+ - 20 megabytes per second for disk read/write operations.
+ - 200 megabits per second for network send/recieve.
+
+
+ If you are excessivly exceeding these limits for too long then a hard
+ limit may be placed on your instance. Attempting to bypass resource
+ limits is prohibited. Excessive usage beyond your allotted limits will
+ be flagged and could result in immediate service termination.
+
+ 3. Hidden networks:
+
+ -
+ Tor and I2P nodes, including exit nodes, are
+ not allowed.
+
+
+ 4. Public Proxies and VPNs:
+
+ -
+ Using your instance to host a publicly available proxy or VPN is
+ not allowed.
+
+
+
+
+ Failure to comply with this policy may result in suspension or
+ termination of your account without prior notice. Our administrators
+ reserve the right to use their discretion when determining policy
+ violations.
+ Service termination is permanent and irreversible.
+ abuse@myco.systems
+
+
+
+ we do not disclose any information about any client to anyone unless
+ required by law enforcement or approved by the client beforehand.
+
+
+ Stored Data
+
+ In the course of creating your account some information is required,
+ this information could be used to identify you, this includes:
+
+
+ - A unique identifier for your account.
+ - Transaction timestamps and the amount deposited.
+ - Your password, hashed.
+ - A unique identifier for compute instance(s) and brick(s).
+ - All data uploaded or created on your compute instance.
+
+
+ Some information is not required for operation but recommended, this
+ will be stored alongside the items listed above:
+
+
+ - An email address.
+ - SSH keys uploaded via our console.
+
+
+ While we do use full disk encryption for the host machine, we do not
+ individually encrypt instance disks or bricks. Like every service
+ provider, we have full access to any unencrypted data you store on
+ your server. We strongly recommend encrypting sensitive data
+ before uploading it to your instance.
+
+
+ We do not log, IP addresses, User Agents, or any other identifing
+ information.
+