pve-panel/policy/index.html
2025-03-14 18:04:09 -04:00

134 lines
5 KiB
HTML

<html lang="en" data-theme="toggle">
<head>
<link rel="stylesheet" href="/styles.css" />
</head>
<body class="container">
<header class="nav-links">
<div class="left">
<a class="inactive" href="/">FAQ</a>
<a class="active" href="/policy">policies</a>
<a class="inactive" href="/pricing">pricing</a>
<a class="inactive" href="/console">console</a>
</div>
<div class="right">
<i>E408-AEE4</i>
<a class="button" href="#">Logout</a>
</div>
</header>
<main>
<section>
<header>
<h1>Acceptable Use Policy</h1>
</header>
<p>
By using any of our services, you agree to comply with the following
guidelines:
</p>
<ul>
<li>
Absolutely no pornography involving minors. We have zero tolerance
for violation of this policy and will immediately terminate your
account if we recieve a verified complaint from NCMEC or similar
organization. This includes but is not limited to drawings, audio,
video, photographs, and ai generated content.
</li>
<li>
Engaging in malicious activities, including aggressive outgoing
email spam, organizing botnets, DDoS attacks, port scanning, or
anything else that may get our IP addresses flagged.
</li>
<li>
Violating any laws, regulations, or third-party rights under either
U.S. or Pennsylvania law.
</li>
<li>Distributing malware, viruses, or harmful software.</li>
<li>Engaging in fraudulent, abusive, or harassing activities.</li>
</ul>
<h3>2. Resource Usage:</h3>
<p>
We do not implement hard limits on your instance by default. So, It is
recommended that you stay within thsese suggested limits:
</p>
<ul>
<li>20 megabytes per second for disk read/write operations.</li>
<li>200 megabits per second for network send/recieve.</li>
</ul>
<p>
If you are excessivly exceeding these limits for too long then a hard
limit may be placed on your instance. Attempting to bypass resource
limits is prohibited. Excessive usage beyond your allotted limits will
be flagged and could result in immediate service termination.
</p>
<h3>3. Hidden networks:</h3>
<ul>
<li>
Tor and I2P nodes, including exit nodes, are
<strong>not</strong> allowed.
</li>
</ul>
<h3>4. Public Proxies and VPNs:</h3>
<ul>
<li>
Using your instance to host a publicly available proxy or VPN is
<strong>not</strong> allowed.
</li>
</ul>
<p>
Failure to comply with this policy may result in suspension or
termination of your account without prior notice. Our administrators
reserve the right to use their discretion when determining policy
violations.
<strong>Service termination is permanent and irreversible.</strong>
<u>abuse@myco.systems</u>
</p>
<header>
<h1>Privacy Policy</h1>
</header>
<p>
we do not disclose any information about any client to anyone unless
required by law enforcement or approved by the client beforehand.
</p>
<h3>Stored Data</h3>
<p>
In the course of creating your account some information is required,
this information could be used to identify you, this includes:
</p>
<ul>
<li>A unique identifier for your account.</li>
<li>Transaction timestamps and the amount deposited.</li>
<li>Your password, hashed.</li>
<li>A unique identifier for compute instance(s) and brick(s).</li>
<li>All data uploaded or created on your compute instance.</li>
</ul>
<p>
Some information is not required for operation but recommended, this
will be stored alongside the items listed above:
</p>
<ul>
<li>An email address.</li>
<li>SSH keys uploaded via our console.</li>
</ul>
<p>
While we do use full disk encryption for the host machine, we do not
individually encrypt instance disks or bricks. Like every service
provider, we have full access to any unencrypted data you store on
your server. We strongly recommend encrypting sensitive data
<i>before</i> uploading it to your instance.
</p>
<p>
We do not log, IP addresses, User Agents, or any other identifing
information.
</p>
</section>
</main>
<footer>
(c) Attribution-ShareAlike 4.0 International <br />
&nbsp;&nbsp;&nbsp;&nbsp;A service by
<a href="https://myco.systems/">MycoSystems LLC</a>
</footer>
</body>
</html>