Cloud Hosting Acceptable Use Policy

Last Updated on July 2, 2024

1. Introduction

This Acceptable Use Policy ("Policy") outlines acceptable use of the services ("Services") provided by Nexgenbusiness to our customers ("Users"). By using our Services, Users agree to comply with this Policy. This Policy is designed to ensure the integrity, security, reliability, and privacy of our Services.

2. Prohibited Activities

Users may not use the Services to:

  1. Illegal Activities: Engage in any activity that is illegal under applicable law, including but not limited to:
    • Violating any applicable local, state, national, or international law or regulation.
    • Engaging in or promoting illegal activities such as drug trafficking, or financial fraud.
  2. Abusive Behaviour: Engage in any abusive, harassing, or threatening behaviour towards others, including:
    • Sending unsolicited emails ("spam").
    • Distributing malicious software such as viruses, worms, Trojan horses, ransomware, or any other harmful code.
    • Conducting or promoting any kind of distributed denial-of-service (DDoS) attack.
    • Engaging in any form of harassment, whether through language, frequency, or size of messages.
  3. Security Violations: Compromise the security or integrity of the Services or any other network, including:
    • Attempting to gain unauthorized access to any account, computer system, or network.
    • Engaging in activities that disrupt or impair the performance of the Services or the servers and networks used to provide the Services.
    • Interfering with or disrupting the normal operation of the Services
  4. Intellectual Property Infringement: Violate or infringe upon the intellectual property rights of others, including:
    • Copying or distributing copyrighted material without appropriate authorization.
    • Using trademarks, trade names, or logos without authorization.
  5. Resource Abuse: Use the Services in a manner that unfairly monopolizes resources to the detriment of other Users, including:
    • Running public proxies or open relay services
    • Operating cryptocurrency mining operations.
    • Public VPN tunnels or traffic concentrators.

3. Network and System Security

Users are prohibited from violating or attempting to violate the security of the Company's network and systems, including but not limited to:

  1. Unauthorized Access: Accessing data, systems, or networks without proper authorization.
  2. Scanning and Monitoring: Scanning or monitoring data on any network or system without prior authorization.
  3. Interference: Interfering with service to any user, host, or network including, without limitation, by means of overloading, flooding, mail bombing, or crashing.
  4. Forgery and Impersonation: Forging any TCP/IP packet header or any part of the header information in any email or newsgroup posting.

4. Content Restrictions

Users are prohibited from using the Services to store, post, display, transmit, or otherwise make available any content that:

  1. Adult Content: Contains pornographic or sexually explicit material
  2. Violence: Promotes violence, hatred, or discrimination against any group or individual.
  3. Hate Speech: Constitutes hate speech, defamation, or libel
  4. Infringement: Infringes on any intellectual property rights or privacy rights of any individual or entity

5. Enforcement and Monitoring

The Company reserves the right to monitor the use of the Services to ensure compliance with this Policy. Violations of this Policy may result in:

  1. Investigations: The Company may investigate suspected violations of this Policy
  2. Actions: The Company may take any action it deems appropriate, including but not limited to:
    • Issuing warnings.
    • Suspending or terminating access to the Services
    • Reporting activities to law enforcement authorities.
  3. Cooperation: The Company will cooperate with law enforcement authorities in the investigation of suspected criminal violations.

6. Reporting Violations

Users are encouraged to report any violations of this Policy to the Company at info@nexgenbusiness.net. All reports will be reviewed and appropriate action will be taken.

7. Amendments

The Company reserves the right to amend or modify this Policy at any time. Users are encouraged to review this Policy periodically to ensure compliance. Continued use of the Services after any such changes shall constitute consent to such changes.

8. Contact Information

For any questions or concerns regarding this Policy, please contact us at info@nexgenbusiness.net.