Last Updated: November 3rd, 2024
1. Introduction
By using our Services, you agree to use them solely for lawful purposes and in compliance with all applicable local, state, national, and international laws and regulations, as outlined in Section 15 (Dispute Resolution and Governing Law) of our Terms of Service.
2. Bandwidth Usage
2.1 Fair and Responsible Use
- Network Integrity: You must use the bandwidth provided as part of the Services in a way that does not disrupt, degrade, or otherwise impair network performance or other users’ access to our Services.2.2 Remedies for Excessive Usage
- Bandwidth Limitation: If your bandwidth usage is deemed excessive and disrupts our network or other users, we reserve the right to limit or cap your bandwidth with or without notice to mitigate potential impacts on the Services.3. Notification and Enforcement
3.1 Attempted Notification
Where practical, we will attempt to notify you if your bandwidth usage is excessive and provide options for rectifying the situation.
3.2 Immediate Action
If your usage poses an immediate risk to network stability or significantly impacts other users, we may take corrective action without prior notice, including bandwidth throttling or temporary suspension of Services.
3.3 Termination for Repeated Violations
Repeated or severe violations may result in suspension or termination of your account, as outlined in Section 14 (Termination) of our Terms of Service.
4. No Unfair Restrictions
4.1 Unlimited Plans
If your Service plan includes "unlimited" bandwidth, there are no predetermined usage limits. However, you are still required to comply with this Acceptable Use Policy and to use the Services in a manner that does not disrupt the network or other users.
5. Prohibited Activities
5.1 Illegal Activities
Engaging in any unlawful activities, fraudulent conduct, or activities that facilitate or encourage criminal behavior.
5.2 Unauthorized Access and Security Violations
Attempting to gain unauthorized access to accounts, computer systems, or networks connected to the Services through hacking, password mining, unauthorized penetration testing, or any other means.
5.3 Malicious Activities
Distributing or transmitting viruses, malware, ransomware, or any similar code designed to disrupt, damage, or limit the functionality of any software, hardware, or telecommunications equipment. This includes operating botnets, command and control (C&C/C2) servers, or similar software without the owner’s consent.
5.4 Network and Service Disruptions
Conducting or facilitating Distributed Denial of Service (DDoS) attacks, Denial of Service (DoS) attacks, or activities that disrupt, interfere with, or overburden the Services or networks connected to the Services. Operating DDoS-for-hire services, stress testing services, or “booter” services is also prohibited.
5.5 Spamming and Phishing
Sending unsolicited bulk emails ("spam") or unsolicited messages in any form, engaging in phishing activities, impersonating individuals or entities, or misrepresenting your affiliation with any person or entity.
5.6 Intellectual Property Infringement
Uploading, posting, transmitting, or making available content that infringes upon any patent, trademark, trade secret, copyright, or other proprietary rights. Engaging in activities related to torrenting, piracy, or copyright infringement is prohibited.
5.7 Cryptocurrency Mining
Using our Services for cryptocurrency mining or related activities without prior written consent from Silver Creek Technologies, Inc.
5.8 Scanning and Probing
Scanning or probing any system or network for vulnerabilities without proper authorization.
5.9 Distribution of Unauthorized Content
Distributing or making available counterfeit software, hacking tools, or other materials intended to facilitate unlawful activities.
5.10 Bypassing Security Measures
Using tunneling, including Generic Routing Encapsulation (GRE), to circumvent security measures or to shield external servers from attacks by routing them through Silver Creek Technologies’ Services.
5.11 Violations of Third-Party Policies
Engaging in activities that violate the acceptable use policies or terms of service of other service providers, websites, or applications.
5.12 Other Prohibited Activities
Any activities prohibited by applicable local, state, national, or international laws or regulations.
6. Enforcement and Remedies
We do not actively monitor your use of the Services but reserve the right to do so to ensure compliance with this Acceptable Use Policy. Violations may result in corrective actions as described in Section 14 (Termination) of our Terms of Service, which may include immediate suspension or termination of your account, legal action, and/or notification to the appropriate law enforcement authorities.
7. Compliance with Other Policies
This Acceptable Use Policy is subject to all applicable provisions of our Terms of Service, including limitations of liability, disclaimers of warranties, and indemnification obligations.
8. Contact Information
If you have any questions or concerns regarding our Acceptable Use Policy or our Services, please contact us at:
Silver Creek Technologies, Inc.
1209 Orange St
Wilmington, DE 19801
United States
Email (general inquiries): [email protected]
Email (legal inquiries): [email protected]
Email (privacy inquiries): [email protected]
Email (abuse inquiries): [email protected]