134 lines
5 KiB
HTML
134 lines
5 KiB
HTML
<html lang="en" data-theme="toggle">
|
|
<head>
|
|
<link rel="stylesheet" href="/styles.css" />
|
|
</head>
|
|
|
|
<body class="container">
|
|
<header class="nav-links">
|
|
<div class="left">
|
|
<a class="inactive" href="/">FAQ</a>
|
|
<a class="active" href="/policy">policies</a>
|
|
<a class="inactive" href="/pricing">pricing</a>
|
|
<a class="inactive" href="/console">console</a>
|
|
</div>
|
|
<div class="right">
|
|
<i>E408-AEE4</i>
|
|
<a class="button" href="#">Logout</a>
|
|
</div>
|
|
</header>
|
|
<main>
|
|
<section>
|
|
<header>
|
|
<h1>Acceptable Use Policy</h1>
|
|
</header>
|
|
<p>
|
|
By using any of our services, you agree to comply with the following
|
|
guidelines:
|
|
</p>
|
|
<ul>
|
|
<li>
|
|
Absolutely no pornography involving minors. We have zero tolerance
|
|
for violation of this policy and will immediately terminate your
|
|
account if we recieve a verified complaint from NCMEC or similar
|
|
organization. This includes but is not limited to drawings, audio,
|
|
video, photographs, and ai generated content.
|
|
</li>
|
|
<li>
|
|
Engaging in malicious activities, including aggressive outgoing
|
|
email spam, organizing botnets, DDoS attacks, port scanning, or
|
|
anything else that may get our IP addresses flagged.
|
|
</li>
|
|
<li>
|
|
Violating any laws, regulations, or third-party rights under either
|
|
U.S. or Pennsylvania law.
|
|
</li>
|
|
<li>Distributing malware, viruses, or harmful software.</li>
|
|
<li>Engaging in fraudulent, abusive, or harassing activities.</li>
|
|
</ul>
|
|
|
|
<h3>2. Resource Usage:</h3>
|
|
<p>
|
|
We do not implement hard limits on your instance by default. So, It is
|
|
recommended that you stay within thsese suggested limits:
|
|
</p>
|
|
<ul>
|
|
<li>20 megabytes per second for disk read/write operations.</li>
|
|
<li>200 megabits per second for network send/recieve.</li>
|
|
</ul>
|
|
<p>
|
|
If you are excessivly exceeding these limits for too long then a hard
|
|
limit may be placed on your instance. Attempting to bypass resource
|
|
limits is prohibited. Excessive usage beyond your allotted limits will
|
|
be flagged and could result in immediate service termination.
|
|
</p>
|
|
<h3>3. Hidden networks:</h3>
|
|
<ul>
|
|
<li>
|
|
Tor and I2P nodes, including exit nodes, are
|
|
<strong>not</strong> allowed.
|
|
</li>
|
|
</ul>
|
|
<h3>4. Public Proxies and VPNs:</h3>
|
|
<ul>
|
|
<li>
|
|
Using your instance to host a publicly available proxy or VPN is
|
|
<strong>not</strong> allowed.
|
|
</li>
|
|
</ul>
|
|
|
|
<p>
|
|
Failure to comply with this policy may result in suspension or
|
|
termination of your account without prior notice. Our administrators
|
|
reserve the right to use their discretion when determining policy
|
|
violations.
|
|
<strong>Service termination is permanent and irreversible.</strong>
|
|
<u>abuse@myco.systems</u>
|
|
</p>
|
|
<header>
|
|
<h1>Privacy Policy</h1>
|
|
</header>
|
|
<p>
|
|
we do not disclose any information about any client to anyone unless
|
|
required by law enforcement or approved by the client beforehand.
|
|
</p>
|
|
|
|
<h3>Stored Data</h3>
|
|
<p>
|
|
In the course of creating your account some information is required,
|
|
this information could be used to identify you, this includes:
|
|
</p>
|
|
<ul>
|
|
<li>A unique identifier for your account.</li>
|
|
<li>Transaction timestamps and the amount deposited.</li>
|
|
<li>Your password, hashed.</li>
|
|
<li>A unique identifier for compute instance(s) and brick(s).</li>
|
|
<li>All data uploaded or created on your compute instance.</li>
|
|
</ul>
|
|
<p>
|
|
Some information is not required for operation but recommended, this
|
|
will be stored alongside the items listed above:
|
|
</p>
|
|
<ul>
|
|
<li>An email address.</li>
|
|
<li>SSH keys uploaded via our console.</li>
|
|
</ul>
|
|
<p>
|
|
While we do use full disk encryption for the host machine, we do not
|
|
individually encrypt instance disks or bricks. Like every service
|
|
provider, we have full access to any unencrypted data you store on
|
|
your server. We strongly recommend encrypting sensitive data
|
|
<i>before</i> uploading it to your instance.
|
|
</p>
|
|
<p>
|
|
We do not log, IP addresses, User Agents, or any other identifing
|
|
information.
|
|
</p>
|
|
</section>
|
|
</main>
|
|
<footer>
|
|
(c) Attribution-ShareAlike 4.0 International <br />
|
|
A service by
|
|
<a href="https://myco.systems/">MycoSystems LLC</a>
|
|
</footer>
|
|
</body>
|
|
</html>
|