Acceptable Use Policy - Web Hosting

1. Introduction

This Acceptable Use Policy ("AUP") has been created by Relyimah Technologies and all of the entities controlling, controlled by, or under common control with Relyimah Technologies to promote the integrity, security, reliability and protection of Relyimah Technologies' network, facilities, offerings, and Clients. Relyimah Technologies may modify, without prior notice, this AUP as Relyimah Technologies deems appropriate and such modified AUP will be effective upon posting on Relyimah Technologies' website. Throughout the term of its Agreement with Relyimah Technologies, the Client must ensure that the use of any Service offered, owned, or controlled by Relyimah Technologies to the Client conforms to Relyimah Technologies' then-current AUP. The Client will be held responsible for its use, its systems, the users of its systems and offerings.

2. Terms

This section outlines the terms mentioned in this agreement.


The Reseller is Relyimah Technologies, the company selling hosting to the Client.


The Client is the individual or company (you) purchasing hosting from the Reseller.


The Users are people accessing various parts of the Service that are not the Client. This can, in most cases, include everyday viewers of the data stored in the Service.


The Service is the hosting package chosen by the Client.


Laws, regulations, and orders.
Terms like "unlawful" or "illegal" apply to Laws globally and within the framework of applicable governing bodies.


An individual, group or entity.

3. Prohibited Uses

The Internet is a global interconnection of multiple networks that physically exist in multiple counties with diverse laws, regulations, and orders ("Laws"). It is the Client's responsibility to be aware of the Laws that apply to the use of the Service and to ensure compliance with such Laws. Relyimah Technologies will cooperate with all court orders, subpoenas, and other similar government requests ordering Relyimah Technologies to disclose information about use of the Service.

The Service shall not be used to post, transmit, re-transmit or store material which, in the judgment of Relyimah Technologies:

  • Violates local, state, federal, foreign, or international Law;
  • Could be considered threatening, obscene, indecent, defamatory, threatening or that otherwise could adversely affect any individual, group or entity ("Person").

In addition to the other requirements of this AUP, the Service may be used only in a manner that in Relyimah Technologies' sole discretion is consistent the purposes of such Service. The Client should contact Relyimah Technologies if it is unsure of whether any contemplated use or action is permitted.

By way of example, and not limitation, uses described below are expressly prohibited:


  • Deceptive or fraudulent practices.
  • Any activity infringing on the intellectual property rights of others, including, but not limited to, copyrights, trademarks, service marks, trade secrets, patents. Actions that restrict or inhibit any Person, whether a Client, Relyimah Technologies, or otherwise, in its use or enjoyment of any Service Relyimah Technologies offers.

System and Network:

  • The deliberate transmission of computer viruses worms, trojan software, or other malicious programs.
  • Interfering with, disrupting, or denying service including, but is not limited to, using any technique to intentionally degrade or disable the delivery of any legitimate data (e.g., denial of service attacks).
  • Attempting to gain unauthorized entry to any site or network including but not limited to executing any form of network probing, monitoring or other information-gathering on someone else's site or network.
  • Attempting to circumvent host or user authentication or other security measures of any host, network or account.
  • Maintaining an Open E-mail Relay/Open Data Relay or allowing any data to be sent through one's system by an unrelated third party, including, but is not limited to, via open e-mail gateways and open proxy servers.


  • Sending unsolicited mail messages, including the sending of "junk mail" or other advertising material to individuals who did not specifically request such material, who were not previous Clients or with whom the sender did not have an existing business relationship ("E-mail spam"). Relyimah Technologies reserves the right to determine in its sole discretion and based on the information available (1) what constitutes spam as well as (2) what measures are necessary in response to spamming complaints.
  • Harassment including, but not limited to, through language, frequency or size of messages.
  • Unauthorized use, or forging, of mail header information.
  • Solicitations of mail for any other E-mail address other than of the poster's account or service with the intent to harass or to collect replies.
  • Creating or forwarding "chain letters" or other "schemes" of any type.
  • Use of unsolicited E-mail originating from within Relyimah Technologies' network or networks of other Internet Service Providers on behalf of, or to advertise any service hosted by Relyimah Technologies, or connected via Relyimah Technologies' network.

4. Additional Obligation

Bulk E-mail:

Bulk e-mail must provide recipients with an easy and effective mechanism for removal from bulk e-mail lists. The source of the addressee's address must be included in each bulk e-mail message. Senders of bulk e-mail must take effective steps to confirm that the actual owner of each e-mail address on a list has agreed to receive bulk mailings from the sender before sending e-mail to that list.

Service Resale:

Service or any portion of Service will not be resold unless authorized by Relyimah Technologies in an executed wholesale contract.

Password Protection:

The Client is responsible for protecting passwords and for any authorized or unauthorized use of its systems and/or networks.

Content Protection:

The Client must provide appropriate protection to prevent minors (persons under 18 years of age) from accessing any unsuitable material published via any Service.

Content Ownership:

The Client is responsible for all content or information residing on, obtained or transmitted via the Service.

Vulnerable Systems:

Relyimah Technologies reserves the right, without prior notice, to perform vulnerability tests on systems residing on IP address space belonging to Relyimah Technologies which may be allocated for Client use. The purpose of such testing includes, but is not limited to, testing of mail servers or proxy servers for unrestricted third party relaying. Relyimah Technologies will use commercial reasonable efforts to ensure that such testing (1) will be non-intrusive in nature, and (2) will not adversely affect Service provided to Client or compromise the security of Client's network.

The Client is responsible for correcting any system vulnerability upon notification. The Client must terminate operations of a known compromised system.

Service Provided Equipment:

The Client is responsible for any modification of, alteration to, or other tampering with any hardware provided with the Service.

5. AUP Enforcement

Violation of this AUP may subject the Client to international, federal, and/or state civil and/or criminal liability. Client activity that facilitates a violation of this AUP by any party constitutes a violation of this AUP by the Client. Relyimah Technologies reserves the right immediately and without prior notice to filter, block, suspend, and /or terminate access to the Service at any time for any conduct that Relyimah Technologies, in its sole discretion, determines violates or which may violate this AUP or is otherwise harmful to Relyimah Technologies' interests or the interests of others. If access is terminated, Relyimah Technologies, in its sole discretion, may refuse to accept all new e-mail sent to the terminated e-mail address and delete the Client's data stored on Service.