Acceptable Use Policy

Last updated Feb 10, 2021

Acceptable Use Policy

Over here at ByteAnia, we get it.

The internet is a place of freedom, a means to express yourself and create some amazing content, and we want to supply you with every tool that can help you achieve it.

But we also have our limits, our acceptable use policy, although very lenient is still a means to enforce and protect our respective rights while allowing you to achieve your goals.

As such, by making use of our services you automatically agree to adhere to these terms.

1. Lawful content.

  1. You will only use ByteAnia’s services for lawful means, as such which shall be regarded as lawful under the laws and regulations of Norway.
  2. You shall not transfer, host, create and or distribute or store any material on or through our services that shall be a violation of any applicable law or regulation and or any of our internal policies and or our terms of service and privacy policy. This includes, without limitation, to protected material by copyright, trademark, trade secrets and or any other intellectual property, illegal and or defamatory material and or content which may be regarded as unlawful.

2. Our network

  1. We exercise total control over our network, our network infrastructure may be also controlled by data centers where we lease storage and or bandwidth therefore, we control your data and the data that flows on our systems.
  2. Our network may be used to connect others to your content and or vise versa.
  3. You and or your users, players and or people that connect to our network to access your content are prohibited from obtaining and/or disseminating any unlawful materials, including but not limited to stolen intellectual property, child pornography, and/or any unlawful hate-speech materials.

3. System and security

  1. All references to systems and networks under this section includes the Internet (and all those systems and/or networks to which user is granted access through and such includes but is not limited to our infrastructure.
  2. The user may not circumvent user authentication or security of any host, network, or account (referred to as “cracking” or “hacking”), nor interfere with service to any user, host, or network (referred to as “denial of service attacks”).
  3. Unauthorised access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of any system or network or to breach security or authentication measures without the express authorisation from us.
  4. You are not allowed to forge any TCP-IP packet headers and or use our services for spoofing.
  5. You are not allowed to host public VPN’s or Proxy services via our systems.
  6. The use of our systems to provide DDoS protection for services with other providers is strictly prohibited.
  7. The use of our services for Ecommerce bots is strictly prohibited.

4. Fair access

To help ensure that all users have fair and equal use of the service and to protect the integrity of the network, we reserves the right, and will take necessary steps, to prevent improper or excessive usage thereof, the action that we may take includes, but is not limited to:

Limiting throughput:

  1. Preventing or limiting service through specific ports and/or communication protocols.
  2. Complete termination of service to users who grossly abuse the network through improper or excessive usage. a. Excessive usage is defined via an internal policy and varies wildly.
  3. The policy applies to and will be enforced for intended and unintended (e.g., viruses, worms, malicious code, or otherwise unknown causes) prohibited usage.
  4. Online activity will be subject to the available bandwidth, data storage and other limitations of the service provided,
  5. which we may, from time to time, revise at its own discretion and without prior notice to the customer.

That’s it. Happy hosting.