Acceptable Use Policy
By using any of our services, you agree to comply with the following guidelines:
- Absolutely no pornography involving minors. We have zero tolerance for violation of this policy and will immediately terminate your account if we recieve a verified complaint from NCMEC or similar organization. This includes but is not limited to drawings, audio, video, photographs, and ai generated content.
- Engaging in malicious activities, including aggressive outgoing email spam, organizing botnets, DDoS attacks, port scanning, or anything else that may get our IP addresses flagged.
- Violating any laws, regulations, or third-party rights under either U.S. or Pennsylvania law.
- Distributing malware, viruses, or harmful software.
- Engaging in fraudulent, abusive, or harassing activities.
2. Resource Usage:
We do not implement hard limits on your instance by default. So, It is recommended that you stay within thsese suggested limits:
- 20 megabytes per second for disk read/write operations.
- 200 megabits per second for network send/recieve.
If you are excessivly exceeding these limits for too long then a hard limit may be placed on your instance. Attempting to bypass resource limits is prohibited. Excessive usage beyond your allotted limits will be flagged and could result in immediate service termination.
3. Hidden networks:
- Tor and I2P nodes, including exit nodes, are not allowed.
4. Public Proxies and VPNs:
- Using your instance to host a publicly available proxy or VPN is not allowed.
Failure to comply with this policy may result in suspension or termination of your account without prior notice. Our administrators reserve the right to use their discretion when determining policy violations. Service termination is permanent and irreversible. abuse@myco.systems
Privacy Policy
we do not disclose any information about any client to anyone unless required by law enforcement or approved by the client beforehand.
Stored Data
In the course of creating your account some information is required, this information could be used to identify you, this includes:
- A unique identifier for your account.
- Transaction timestamps and the amount deposited.
- Your password, hashed.
- A unique identifier for compute instance(s) and brick(s).
- All data uploaded or created on your compute instance.
Some information is not required for operation but recommended, this will be stored alongside the items listed above:
- An email address.
- SSH keys uploaded via our console.
While we do use full disk encryption for the host machine, we do not individually encrypt instance disks or bricks. Like every service provider, we have full access to any unencrypted data you store on your server. We strongly recommend encrypting sensitive data before uploading it to your instance.
We do not log, IP addresses, User Agents, or any other identifing information.