379 lines
19 KiB
HTML
379 lines
19 KiB
HTML
<!DOCTYPE html>
|
||
|
||
<html lang="en">
|
||
<head>
|
||
<meta charset="utf-8" />
|
||
<meta name="viewport" content="width=device-width, initial-scale=1" />
|
||
|
||
<title>Last Hour Hosting</title>
|
||
<meta name="description" content="" />
|
||
<meta name="author" content="Shiloh" />
|
||
|
||
<meta property="og:title" content="Last Hour Hosting" />
|
||
<meta property="og:type" content="website" />
|
||
<meta property="og:url" content="https://www.lasthourhosting.org" />
|
||
<meta property="og:description" content="" />
|
||
<meta property="og:image" content="" />
|
||
|
||
<link rel="icon" href="./assets/favicon.ico" />
|
||
<link rel="icon" href="./assets/" type="image/svg+xml" />
|
||
<link rel="apple-touch-icon" href="/apple-touch-icon.png" />
|
||
|
||
<link rel="stylesheet" href="css/styles.css?v=1.0" />
|
||
<meta
|
||
http-equiv="Content-Security-Policy"
|
||
content="script-src 'self' https://code.jquery.com/jquery-3.7.1.min.js; style-src 'self'; object-src 'none'; frame-src 'self'; base-uri 'self'; font-src 'self'; img-src 'self'; "
|
||
/>
|
||
<script
|
||
src="https://code.jquery.com/jquery-3.7.1.min.js"
|
||
integrity="sha256-/JqT3SQfawRcv/BIHPThkBvs0OEvtFFmqPF/lYI/Cxo="
|
||
crossorigin="anonymous"
|
||
></script>
|
||
<script src="./js/main.js"></script>
|
||
</head>
|
||
|
||
<body>
|
||
<header id="header"></header>
|
||
|
||
<main>
|
||
<div class="flex-column">
|
||
<h1>Acceptable Use Policy (AUP)</h1>
|
||
<div id="legal"></div>
|
||
</div>
|
||
<div class="flex-row">
|
||
<div class="flex-column">
|
||
<h2>Acceptable Use Policy</h2>
|
||
<p>
|
||
This Acceptable Use Policy (the "AUP") outlines the prohibited uses
|
||
and acceptable practices concerning the utilization of Shiloh, LLC
|
||
and its affiliated entities ("Last Hour Hosting," "us," "our")
|
||
network of online properties, including platforms, websites,
|
||
applications, products, materials, and services (collectively, the
|
||
"Services"). This policy applies to Last Hour Hosting's customers
|
||
and users who access the Services through visits, purchases, and
|
||
account registrations (collectively, "You," "Customers," or
|
||
"Users"). The Services must be utilized in a manner consistent with
|
||
their intended purpose and the terms outlined in the relevant
|
||
agreement with Last Hour Hosting, including our Terms of Service
|
||
(the "Terms"), which incorporates this AUP by reference. The
|
||
examples provided in this AUP are not exhaustive. We reserve the
|
||
right to amend this AUP at any time by publishing a revised version
|
||
on the Services. By utilizing the Services, You agree to be bound by
|
||
the terms of the latest version of this AUP. Any terms not defined
|
||
herein are explained in our Terms of Service. You commit to adhering
|
||
to this AUP and ensuring that your end Users comply with it.
|
||
Violation of the AUP or authorization or facilitation of such
|
||
violations (including by your end Users) may result in the
|
||
suspension or termination of your Services usage and the deletion of
|
||
your Account.
|
||
</p>
|
||
<h2>1. Prohibited Content and Activities</h2>
|
||
<p>
|
||
You are prohibited from using, encouraging, promoting, facilitating,
|
||
or instructing others to use LastHourHosting.org and its Services
|
||
for any illegal, criminal, harmful, fraudulent, infringing, or
|
||
offensive purposes. This includes transmitting, storing, displaying,
|
||
distributing, or making available information or content (including
|
||
User Content) that is illegal, unlawful, harmful, fraudulent,
|
||
infringing, or offensive. The following activities and content are
|
||
strictly prohibited: Illegal, Harmful, or Fraudulent Activities:
|
||
Engaging in activities that are illegal, tortious, violate the
|
||
rights of others, or may cause harm to others, our operations, or
|
||
our reputation. This includes promoting or facilitating pornography,
|
||
child pornography, disseminating fraudulent goods or services,
|
||
engaging in make-money-fast schemes, ponzi and pyramid schemes,
|
||
phishing, or pharming.
|
||
</p>
|
||
<h3>Infringing Content and/or Use:</h3>
|
||
<p>
|
||
Uploading content that infringes or misappropriates the intellectual
|
||
property or proprietary rights of others. This includes unauthorized
|
||
disclosures of private information or using information from
|
||
LastHourHosting and/or our Users for personal or business purposes
|
||
without proper permission or attribution. You agree NOT to attempt
|
||
to resell LastHourHosting’s products and/or access to the Services
|
||
without our explicit written consent.
|
||
</p>
|
||
<h3>Offensive Content:</h3>
|
||
|
||
<p>
|
||
Posting content that is harmful to minors, defamatory, libelous,
|
||
obscene, abusive, threatening, discriminatory, harassing, invasive
|
||
of privacy, false, intentionally misleading, patently offensive, or
|
||
otherwise objectionable. This includes content that constitutes
|
||
pornography, child pornography, relates to bestiality, depicts
|
||
non-consensual sex acts, or promotes racism, bigotry, hatred,
|
||
misogyny, or physical harm against any group, individual, or animal.
|
||
</p>
|
||
<h3>Harmful Content:</h3>
|
||
<p>
|
||
Uploading content or computer technology that may damage, interfere
|
||
with, surreptitiously intercept, or expropriate any system, program,
|
||
or data. This includes viruses, Trojan horses, worms, time bombs, or
|
||
cancelbots.
|
||
</p>
|
||
<h3>False Content:</h3>
|
||
<p>
|
||
Submitting any content or information that falsely represents your
|
||
identity, including misrepresenting your qualifications,
|
||
affiliations with a person or entity (past or present), or assuming
|
||
another’s identity. Misrepresentation of any kind is strictly
|
||
prohibited.
|
||
</p>
|
||
<h3>Anti-Spam and Communication Policy</h3>
|
||
<ol type="1">
|
||
<li>No Unsolicited Messages</li>
|
||
<p>
|
||
You are strictly prohibited from engaging in any form of
|
||
unsolicited communication, including sending unsolicited mass
|
||
e-mails or other messages (commonly known as “SPAM”), as well as
|
||
any promotions, advertising, or solicitations without the explicit
|
||
consent of the recipients. This includes commercial advertising
|
||
and informational announcements. You must not alter or obscure
|
||
mail headers or assume the identity of a sender without their
|
||
explicit permission. Under no circumstances should you collect
|
||
responses to messages sent from another internet service provider
|
||
if those messages violate this Acceptable Use Policy (AUP) or the
|
||
acceptable use policy of the respective provider.
|
||
</p>
|
||
<li>Responsible Use of Communication Tools</li>
|
||
<p>
|
||
You are not permitted to utilize any of our communication tools,
|
||
including forums, messaging systems, or feeds, to promote or
|
||
market businesses or opportunities unrelated to or not approved by
|
||
LastHourHosting.org. All communication activities must align with
|
||
the services provided by LastHourHosting.org and must not involve
|
||
the unsolicited promotion of external businesses or ventures.
|
||
</p>
|
||
</ol>
|
||
<h3>Network and System Integrity Policy</h3>
|
||
<ol type="1">
|
||
<li>Security Compliance</li>
|
||
<p>
|
||
You are strictly prohibited from using LastHourHosting.org
|
||
services to compromise the security or integrity of any network,
|
||
computer, communication system, software application, or any other
|
||
computing device (referred to as a "System"). Prohibited
|
||
activities include: Unauthorized Access: Engaging in any attempts
|
||
to access or use a System without proper authorization, including
|
||
probing, scanning, or testing System vulnerabilities, as well as
|
||
breaching any security or authentication measures. Data
|
||
Interception: Monitoring or intercepting data or traffic on a
|
||
System without explicit permission. Origin Falsification: Forging
|
||
TCP-IP packet headers, e-mail headers, or any part of a message
|
||
that misrepresents its origin or route.
|
||
</p>
|
||
<li>Responsible Network Usage</li>
|
||
<p>
|
||
You must not establish network connections with other Users,
|
||
hosts, or networks unless you have received explicit permission to
|
||
communicate with them. Prohibited activities include:
|
||
</p>
|
||
<ul>
|
||
<li>
|
||
Monitoring and Crawling: Conducting monitoring or crawling
|
||
activities on a System that disrupts or impairs the normal
|
||
functioning of the System being monitored or crawled.
|
||
</li>
|
||
<li>
|
||
Denial of Services (DoS): Flooding a target with communication
|
||
requests, rendering it unable to respond to legitimate traffic
|
||
or significantly slowing down its responsiveness to render it
|
||
ineffective.
|
||
</li>
|
||
<li>
|
||
Intentional Interference: Deliberately disrupting the proper
|
||
functioning of any System, including attempts to overload a
|
||
system through methods such as mail bombing, news bombing,
|
||
broadcast attacks, or flooding techniques.
|
||
</li>
|
||
<li>
|
||
Operation of Restricted Network Services: Operating network
|
||
services like open proxies, open mail relays, or open recursive
|
||
domain name servers is strictly prohibited.
|
||
</li>
|
||
<li>
|
||
Avoidance of System Restrictions: Using manual or electronic
|
||
methods to circumvent any use limitations imposed on a System,
|
||
such as access and storage restrictions.
|
||
</li>
|
||
<li>
|
||
Excessive Use Policy: In cases where your activities cause
|
||
excessive CPU usage that is not otherwise prohibited,
|
||
LastHourHosting.org reserves the right to limit the CPU
|
||
available to your instances to maintain consistent performance
|
||
across all our nodes.
|
||
</li>
|
||
</ul>
|
||
|
||
<li>Responsible Use of Services</li>
|
||
<p>
|
||
By using LastHourHosting.org, you commit to the following
|
||
obligations:
|
||
</p>
|
||
<ol type="i">
|
||
<li>
|
||
Compliance: You agree to abide by this Acceptable Use Policy
|
||
(AUP).
|
||
</li>
|
||
<li>
|
||
Legal and Regulatory Compliance: You agree to adhere to all
|
||
applicable laws and regulations, encompassing criminal laws,
|
||
privacy laws, intellectual property laws, export control laws,
|
||
tax laws, and any industry-specific regulatory requirements.
|
||
</li>
|
||
<li>
|
||
Professional Conduct: You pledge to use our services in a
|
||
professional manner consistent with ethical standards and
|
||
industry best practices.
|
||
</li>
|
||
</ol>
|
||
</ol>
|
||
<h3>Monitoring and Compliance Enforcement</h3>
|
||
<p>
|
||
We retain the right, though not the obligation, to investigate any
|
||
violation of this AUP or misuse of our services. We may:
|
||
</p>
|
||
<ul>
|
||
<li>Investigation: Probe violations or misuse of our services.</li>
|
||
<li>
|
||
Content Review: Examine User Content, and modify, disable access
|
||
to, or remove any content or resource (including User Content)
|
||
that breaches this AUP or any other agreement with you pertaining
|
||
to the use of our services.
|
||
</li>
|
||
<li>
|
||
Prohibited Action Monitoring: Continuously monitor prohibited
|
||
actions, investigate, and, at our sole discretion, take
|
||
appropriate action against the infringing party.
|
||
</li>
|
||
</ul>
|
||
<p>
|
||
In the event of AUP violation or any action that creates liability
|
||
for us or any other party, including reputational harm, we reserve
|
||
the right to suspend or terminate your Account, your access to any
|
||
or all services, or any portion thereof, with or without notice. We
|
||
may also pursue legal remedies and report the violation to law
|
||
enforcement agencies, regulators, or other appropriate third
|
||
parties. PLEASE NOTE THAT WE FULLY COOPERATE WITH LAW ENFORCEMENT
|
||
AND REPORT SUSPECTED AND/OR ILLEGAL ACTIVITY.
|
||
</p>
|
||
<p>
|
||
Our cooperation may involve disclosing relevant customer
|
||
information. Additionally, we may collaborate with law enforcement
|
||
agencies, regulators, or other appropriate third parties to assist
|
||
in the investigation and prosecution of illegal conduct, providing
|
||
information related to alleged AUP violations.
|
||
</p>
|
||
<p>
|
||
In line with our Privacy Policy, we may utilize your information to
|
||
safeguard the integrity, rights, property, or security of
|
||
LastHourHosting.org, our services, third parties, or the public at
|
||
large. This includes detecting, preventing, or addressing fraud,
|
||
security issues, cybercrimes, or technical problems, as well as
|
||
preventing or halting any activity that LastHourHosting.org, at its
|
||
sole discretion, deems or perceives as illegal, unethical, or
|
||
legally actionable. Your information may also be employed as
|
||
evidence in legal proceedings, audits, or to enforce this Acceptable
|
||
Use Policy and our Terms of Service.
|
||
</p>
|
||
<p>
|
||
LastHourHosting.org does not exercise control over or endorse the
|
||
content, messages, or information present within the Services.
|
||
Consequently, LastHourHosting.org disclaims any liability concerning
|
||
the Services and any consequences arising from your participation in
|
||
any Service. Following the termination of our services, we are not
|
||
obligated to maintain any content.
|
||
</p>
|
||
<h2>Restricted Activities on LastHourHosting.org</h2>
|
||
<p>
|
||
LastHourHosting.org services facilitate online communication within
|
||
the bounds of legality and appropriateness. Users, including you and
|
||
your end users, are expected to adhere to ethical conduct and
|
||
respect legal standards. Consequently, when utilizing our services,
|
||
you and your end users agree not to engage in the following
|
||
activities:
|
||
</p>
|
||
<ul>
|
||
<li>
|
||
Unlawful Activities: Do not use the service for illegal contests,
|
||
pornography, lotteries, gambling, pyramid schemes, chain letters,
|
||
spam, or any unsolicited messages, whether commercial or
|
||
otherwise.
|
||
</li>
|
||
<li>
|
||
Harassment and Defamation: Do not defame, abuse, harass, stalk,
|
||
threaten, or violate the legal rights, such as privacy and
|
||
publicity, of others.
|
||
</li>
|
||
<li>
|
||
Obscene or Discriminatory Content: Do not publish, post, upload,
|
||
or distribute defamatory, obscene, or otherwise unlawful content,
|
||
including pornography, child pornography or content that promotes
|
||
violence based on race, religion, or nationality.
|
||
</li>
|
||
<li>
|
||
Intellectual Property Violation: Do not upload or share files
|
||
protected by intellectual property laws, including copyrights,
|
||
trademarks, patents, or trade secrets, unless you have the
|
||
necessary rights or permissions.
|
||
</li>
|
||
<li>
|
||
Malicious Software: Do not upload files containing viruses, worms,
|
||
Trojans, or any other software that could harm another user's
|
||
property.
|
||
</li>
|
||
<li>
|
||
Misrepresentation: Do not falsify author attributions, legal
|
||
notices, or proprietary labels, or delete such information from
|
||
uploaded files.
|
||
</li>
|
||
<li>
|
||
Network Abuse: Do not engage in unauthorized network probing, port
|
||
scanning, or activities that inhibit others from using the
|
||
services.
|
||
</li>
|
||
<li>
|
||
Illegal Identity Creation: Do not create false identities to
|
||
mislead others.
|
||
</li>
|
||
<li>
|
||
Abuse of Directory or User Information: Do not use, download,
|
||
copy, or distribute directories of users or other user information
|
||
without proper authorization.
|
||
</li>
|
||
<li>
|
||
Unauthorized Tools: Do not use bots, autodialers, or other
|
||
software for prohibited activities, including repetitive
|
||
acquisition of merchandise, or VOIP-based robocalling.
|
||
</li>
|
||
<li>
|
||
Denial-of-Service (DOS/DDOS) Mitigation Services: Do not utilize
|
||
our services to conduct DOS/DDOS mitigation as a service.
|
||
</li>
|
||
<li>
|
||
Cryptocurrency Mining: Do not use the service for Central
|
||
Processing Unit (CPU) or Graphics Processing Unit (GPU)
|
||
cryptocurrency mining.
|
||
</li>
|
||
<li>
|
||
Improper Use of BYOIP/BGP Feature: Do not misuse the Bring Your
|
||
Own IP (BYOIP/BGP) feature for purposes such as hijacking or
|
||
parking unrelated to legitimate services or in disproportionate
|
||
relation to deployed Last Hour Hosting services.
|
||
</li>
|
||
</ul>
|
||
<h2>Reporting Violations</h2>
|
||
<p>
|
||
If you encounter any violation of these guidelines, promptly inform
|
||
us at support@lasthourhosting.org. Your cooperation in reporting
|
||
such incidents is crucial, and we appreciate your assistance in
|
||
maintaining the integrity of our services.
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</main>
|
||
<footer id="footer"></footer>
|
||
</body>
|
||
</html>
|