<html lang="en" data-theme="toggle">
  <head>
    <link rel="stylesheet" href="/styles.css" />
  </head>

  <body class="container">
    <header class="nav-links">
      <div class="left">
        <a class="inactive" href="/">FAQ</a>
        <a class="active" href="/policy">policies</a>
        <a class="inactive" href="/pricing">pricing</a>
        <a class="inactive" href="/console">console</a>
      </div>
      <div class="right">
        <i>E408-AEE4</i>
        <a class="button" href="#">Logout</a>
      </div>
    </header>
    <main>
      <section>
        <header>
          <h1>Acceptable Use Policy</h1>
        </header>
        <p>
          By using any of our services, you agree to comply with the following
          guidelines:
        </p>
        <ul>
          <li>
            Absolutely no pornography involving minors. We have zero tolerance
            for violation of this policy and will immediately terminate your
            account if we recieve a verified complaint from NCMEC or similar
            organization. This includes but is not limited to drawings, audio,
            video, photographs, and ai generated content.
          </li>
          <li>
            Engaging in malicious activities, including aggressive outgoing
            email spam, organizing botnets, DDoS attacks, port scanning, or
            anything else that may get our IP addresses flagged.
          </li>
          <li>
            Violating any laws, regulations, or third-party rights under either
            U.S. or Pennsylvania law.
          </li>
          <li>Distributing malware, viruses, or harmful software.</li>
          <li>Engaging in fraudulent, abusive, or harassing activities.</li>
        </ul>

        <h3>2. Resource Usage:</h3>
        <p>
          We do not implement hard limits on your instance by default. So, It is
          recommended that you stay within thsese suggested limits:
        </p>
        <ul>
          <li>20 megabytes per second for disk read/write operations.</li>
          <li>200 megabits per second for network send/recieve.</li>
        </ul>
        <p>
          If you are excessivly exceeding these limits for too long then a hard
          limit may be placed on your instance. Attempting to bypass resource
          limits is prohibited. Excessive usage beyond your allotted limits will
          be flagged and could result in immediate service termination.
        </p>
        <h3>3. Hidden networks:</h3>
        <ul>
          <li>
            Tor and I2P nodes, including exit nodes, are
            <strong>not</strong> allowed.
          </li>
        </ul>
        <h3>4. Public Proxies and VPNs:</h3>
        <ul>
          <li>
            Using your instance to host a publicly available proxy or VPN is
            <strong>not</strong> allowed.
          </li>
        </ul>

        <p>
          Failure to comply with this policy may result in suspension or
          termination of your account without prior notice. Our administrators
          reserve the right to use their discretion when determining policy
          violations.
          <strong>Service termination is permanent and irreversible.</strong>
          <u>abuse@myco.systems</u>
        </p>
        <header>
          <h1>Privacy Policy</h1>
        </header>
        <p>
          we do not disclose any information about any client to anyone unless
          required by law enforcement or approved by the client beforehand.
        </p>

        <h3>Stored Data</h3>
        <p>
          In the course of creating your account some information is required,
          this information could be used to identify you, this includes:
        </p>
        <ul>
          <li>A unique identifier for your account.</li>
          <li>Transaction timestamps and the amount deposited.</li>
          <li>Your password, hashed.</li>
          <li>A unique identifier for compute instance(s) and brick(s).</li>
          <li>All data uploaded or created on your compute instance.</li>
        </ul>
        <p>
          Some information is not required for operation but recommended, this
          will be stored alongside the items listed above:
        </p>
        <ul>
          <li>An email address.</li>
          <li>SSH keys uploaded via our console.</li>
        </ul>
        <p>
          While we do use full disk encryption for the host machine, we do not
          individually encrypt instance disks or bricks. Like every service
          provider, we have full access to any unencrypted data you store on
          your server. We strongly recommend encrypting sensitive data
          <i>before</i> uploading it to your instance.
        </p>
        <p>
          We do not log, IP addresses, User Agents, or any other identifing
          information.
        </p>
      </section>
    </main>
    <footer>
      (c) Attribution-ShareAlike 4.0 International <br />
      A service by
      <a href="https://myco.systems/">MycoSystems LLC</a>
    </footer>
  </body>
</html>