Acceptable Use Policy

This Acceptable Use Policy (“AUP”) governs your use of the Services and is incorporated by reference into T2F Gateway’s Terms of Service.

This Acceptable Use Policy (“AUP”) governs your use of the Services and is incorporated by reference into T2F Gateway, LLC’s Terms of Service. Unless otherwise stated, defined terms in this AUP have the meanings provided in the Terms of Service. T2F Gateway, LLC may modify this AUP at any time without notice.

The Services provided by T2F Gateway, LLC may only be used for lawful purposes. You agree to comply with all applicable laws, rules and regulations in connection with your use of the Services. T2F Gateway, LLC reserves the right to refuse service to anyone. Any material that in our judgment violates this AUP in any manner may be removed from our servers (or otherwise disabled), with or without notice. Failure to respond to an email from our abuse department within the specified time period in our email to you may result in the suspension or termination of the Services.

You are responsible for the activities of your agents, representatives, and end-users (“Users”) and will they abide by this AUP. The Services shall be used solely for legitimate business and commercial purposes, and you shall not use the Services for activities which, in T2F Gateway, LLC’s sole discretion, may be illegal, offensive, abusive, or in a manner that interferes with or adversely affects the Services or use of the Services (including deliberate attempts to overload a system and broadcast attacks) or that would expose T2F Gateway, LLC to criminal or civil liability.

Prohibited Uses

Infringement of Intellectual Property Rights.

Use of the Services to infringe upon another party’s intellectual property rights is prohibited. This includes, but is not limited to, the unauthorized copying or distribution of movies, music, books, photographs, software/warez, or any other copyrighted work. Selling or offering to sell any counterfeit merchandise will result in the immediate termination of your account. Any account found to be infringing on the intellectual property rights of others will be expeditiously removed or access to the material will be disabled. Any account found to be in repeated violation of this prohibition will be suspended or terminated.

If you believe that your intellectual property rights are being infringed upon, please email  abuse@T2F Gateway.com  For copyright infringement claims, T2F Gateway, LLC follows the Digital Millennium Copyright Act (“DMCA”) notice and takedown procedures.

Using a shared account as a backup/storage device.

You may not use a shared hosting account as a backup/storage device with the exception of one cPanel backup of the same account. Please do not take backups of your backups.

Unacceptable Material

If anyone contacts us about content, they have found on a T2F Gateway server that copyrights their own material or that they wish to be removed, we require legal documentation to take any further action.

We do not allow Web Proxy Services / Scripts or file hosting services on our web hosting Server or web hosting plans. No remote uploading/processing scripts usage like the rapid leech, Phpmusicsearch, Rapidshare premium link generator etc are not allowed on our server. Torrent seeding using torrent flux or similar script may also cause a suspension in our network immediately. You are also not allowed to host an Image Hosting site with us which takes lots of CPU resources and abuse the server memory. Although, we do allow video streaming using FFMPEG on the server till you are in the acceptable CPU range, though if malicious material is found through a complaint from abuse department, certain action will be taken at an urgent manner.
Examples of prohibited content or links include (but are not limited to):
Topsites
IRC Scripts/Bots
Proxy Scripts/Anonymizers
Pirated Software/Warez
Image Hosting Scripts (similar to Photobucket or Tinypic)
AutoSurf/PTC/PTS/PPC sites
IP Scanners
Bruteforce Programs/Scripts/Applications
Mail Bombers/Spam Scripts
Banner-Ad services (commercial banner ad rotation)
File Dump/Mirror Scripts (similar to rapidshare)
Commercial Audio Streaming (more than one or two streams)
Escrow/Bank Debentures
High-Yield Interest Programs (HYIP) or Related Sites
Investment Sites (FOREX, E-Gold Exchange, Second Life/Linden Exchange, Ponzi, MLM/Pyramid Scheme)
Sale of any controlled substance without prior proof of appropriate permit(s)
Prime Banks Programs
Lottery Sites
MUDs/RPGs/PBBGs
Hateful/Racist/Harassment oriented sites
Hacker focused sites/archives/programs
Sites promoting illegal activities
Forums and/or websites that distribute or link to warez/pirated/illegal content
Bank Debentures/Bank Debenture Trading Programs
Fraudulent Sites (Including, but not limited to sites listed at aa419.org & escrow-fraud.com)
Mailer Pro

Examples of unacceptable material on all Dedicated servers include:
IRCD (irc servers)
IRC Scripts/Bots
Pirated Software/Warez
IP Scanners
Bruteforce Programs/Scripts/Applications
Mail Bombers/spam Scripts
Escrow
High-Yield Interest Programs (HYIP) or Related Sites
Investment Sites (FOREX, E-Gold Exchange, Second Life/Linden Exchange, Ponzi, MLM/Pyramid Scheme)
Sale of any controlled substance without prior proof of appropriate permit(s)
Prime Banks Programs
Lottery Sites
Hateful/Racist/Harassment oriented sites
Hacker focused sites/archives/programs
Sites promoting illegal activities
Forums and/or websites that distribute or link to warez/pirated/illegal content
Bank Debentures/Bank Debenture Trading Programs
Fraudulent Sites (Including, but not limited to sites listed at aa419.org & escrow-fraud.com)
Mailer Pro

Using any web hosting account provided by T2F Gateway as a backup/storage device is not permitted. T2F Gateway web hosting accounts are not to be used for the purposes of distributing and/or storing an unusual number of files. We are a web hosting service not a remote file storage service. Any website whose disk space usage for storing the files exceed 70% of its total usage, either in terms of total size or number of files, will be deemed to be using an unusual number of files. At that point, if we find that those files are illegal or harmful in any way, you will be notified. If you do not have any negative intentions such as causing harm to our server or to others with the files you keep, then you have nothing to worry about.

T2F Gateway services, including all related equipment, networks, and network devices are provided only for authorized customer use. T2F Gateway systems may be monitored for all lawful purposes, including to ensure that use is authorized, for management of the system, to facilitate protection against unauthorized access, and to verify security procedures, survivability, and operational security. During monitoring, information may be examined, recorded, copied and used for authorized purposes. Use of T2F Gateway system(s) constitutes consent to monitoring for these purposes

Any account found connecting to a third-party network or system without authorization from the third party is subject to suspension. Access to networks or systems outside of your direct control must be with expressed written consent from the third party. T2F Gateway may, at its discretion, request and require documentation to prove access to a third-party network or system is authorized.

We reserve the right to refuse service to anyone. Any material that, in our judgment, is obscene, threatening, illegal, or violates our terms of service in any manner may be removed from our servers (or otherwise disabled), with or without notice.
Failure to respond to email from our abuse department within 48 hours may result in the suspension or termination of your services. All abuse issues must be dealt with via trouble ticket/email and will have a response within 48 hours.

If in doubt regarding the acceptability of your site or service, please contact us at abuse[at]T2F Gateway[dot]com and we will be happy to assist you

Potential harm to minors is strictly forbidden, including but not limited to child pornography or content perceived to be child pornography: Any site found to host child pornography or linking to child pornography will be suspended immediately without notice.

Resellers: we will suspend the site in question and will notify you so you may terminate the account. We will further monitor your activity; more than one infraction of this type may result in the immediate termination of your account.
Direct customers: Your services will be terminated with or without notice.
Opt-in Email Marketing:
If you choose to engage in marketing your site and/or services via email please heed the following. The only permitted form of email marketing is that in which the list is accepted in. By definition, opt-in is where people provide you with their email address specifically requesting to be on your email list for information about your site and/or service. If we find your account transmitting email to persons that did not authorize such activity, that is grounds to suspend and terminate your site. Note: On the flip side, the joining of an opt-in email list does not guarantee the legitimacy of such a list. Please contact us before taking any steps so that you will not be a victim of spam from second and third parties of such lists.

ZERO TOLERANCE SPAM:
T2F Gateway has a zero-tolerance policy regarding unsolicited commercial email (UCE) and unsolicited bulk email (UBE) also known as spam mail. The definition of spam:
An electronic message is spam mail IF:

(1) the recipients personal identity and context are irrelevant because the message is equally applicable to many other potential recipients; AND(2) the recipient has not verifiably granted deliberate, explicit, and still-revocable permission for it to be sent; AND (3) the transmission and reception of the message appears to the recipient to give a disproportionate benefit to the sender.
You will be cited with UCE/UBE Abuse if you send an email to persons who have not specifically asked to receive the email from you. The sending origin of such email is irrelevant. Upon confirmation of abuse, any T2F Gateway customer engaging in this practice will have their service suspended. Not only does spam place a strain on the server that can negatively affect that servers uptime record and performance record, you subject that server to the possibility of being blacklisted.

If your site will be sending mailings out to subscribers, this is a checklist of what you are required to do:

You must not try to hide, forge or misrepresent the sender of the e-mail and sending site of the e-mail.
Bulk mailings must specifically state how the persons e-mail addresses were obtained and must indicate the frequency of the mailing.
Bulk mailings should contain simple and obvious unsubscribe mechanisms. We recommend that this be in the form of a working link to a one-click unsubscribe system; however, a valid address may be used instead.
All subscription-based e-mail must have valid, non-electronic, contact information for the sending organization in the text of each e-mail including either a phone number or physical mailing address.
All bulk e-mail must be solicited, meaning that the sender has an existing and provable relationship with the e-mail recipient and the recipient has not requested not to receive future mailings from the sender. Documentation of the relationship between the sender and the recipient must be made available to AOL upon request.
Sending Unsolicited Bulk Email. The sending of any form of Unsolicited Bulk Email through T2F Gateway servers is prohibited. Likewise, the sending of UBE from another service provider advertising a web site, email address or utilizing any resource hosted on T2F Gateway servers, is prohibited. T2F Gateway accounts or services may not be used to solicit customers from, or collect replies to, messages sent from another Internet Service Provider where those messages violate this Policy or that of the other provider.
Running Unconfirmed Mailing Lists. Subscribing email addresses to any mailing list without the express and verifiable permission of the email address owner is prohibited. All mailing lists run by T2F Gateway customers must be Closed-loop. The subscription confirmation message received from each address owner must be kept on file for the duration of the existence of the mailing list. Purchasing lists of email addresses from 3rd parties for mailing to from any T2F Gateway-hosted domain, or referencing any T2F Gateway account, is prohibited.
Operating an account on behalf of, or in connection with, or reselling any service to, persons or firms listed in the Spamhaus Register of Known Spam Operations (ROKSO) database at www.spamhaus.org.

SCRIPT USAGE POLICY:
T2F Gateway provides our clients with Web Hosting accounts that permit the use of CGI files, PHP scripts, and other executable programs. Because these scripts use much more system resources than standard HTML pages, certain restrictions must be made governing the use of such “active content” systems. We regret that in many cases we are unable to determine what specific script or application is causing the system resource over-run. Under most circumstances, we are able to pin-point it to the offending account on the system. The following rules apply to all “active content” files as listed above:
The script must use low system resources. Scripts that consume a large amount of our RAM or processor will be subject to immediate suspension until the owner can be notified and an alternative solution is reached.
Each user account may not use more than 20% of system resources at any given time. If an account is consistently using 20% or greater system resources, the account holder will be warned and if no action is taken on behalf of the account holder the account may be suspended.
The scripts may not interact with any server configuration or hardware. Accounts running these scripts are subject to immediate account termination without refund.
The script cannot be used or referenced from any other site not hosted by T2F Gateway.
The script must execute in a timely fashion. Any script that uses the processor for more than a few milliseconds is subject to removal.
Any script that appears to be designed specifically to attack or otherwise maliciously affect the server is completely unacceptable, and if such scripts are found in your account the account will be terminated immediately and your actions will be reported to the proper local, state, and federal authorities and legal action will be taken to prosecute the account holder to the fullest extent of the law by T2F Gateway.
Perl-based chat room scripts are strictly prohibited.
Scripts that require high-bandwidth usage, such as non-Perl chat room scripts or banner rotation scripts, will be allowed to run only on our high-end accounts.
Scripts must be kept secure. Unnecessary chmoding scripts to 777 is a violation of this policy. Keeping scripts in a publicly viewable directory (one without a index.html file) is also in violation of this policy.
Ensuring security of your website script is totally your responsibility. T2F Gateway won’t take any liability to any kind of loss happens to your account because of the leak or backdoor of your script.

NOTE: If a script will NOT execute with a permission other than 777 (rarely the case) you may contact customer care to get approval for the script which will be given under most circumstances.
Any accounts with scripts found in violation of these policies are subject to the future scrutiny of all CGI, Perl, CFM, ASP, and PHP scripts by our System Administrators. If a script is found to be harmful to the system, it will be killed immediately and the account locked down until the account owners have been contacted. Malicious scripts are subject to immediate account termination without refund of any pre-paid monies
Violations of the Terms of Service will waive the refund policy.

 RESOURCE USAGE:
a) Server Resource Abuse Policy (SRAP):
Any website on our shared servers that uses a high amount of server resources (CPU, memory usage, and network resources) will be given an option to pay for a dedicated server. The abuse and misuse of system resources is a serious problem, and T2F Gateway does not tolerate it. Accounts on a shared server must be shared with other users, so we must limit how much of the CPU and memory that can be used by anyone account.

In all fairness, we cannot allow one or two clients to use all of the system resources on a shared machine and have all other clients suffer because of it. Excessive CPU & memory usage by one or more clients causes extreme slowness in all areas: MySQL, Email, HTTP and more. If the CPU & memory usage by a few clients gets out of hand, all sites hosted on the machine will return errors and not be accessible in any way.

AVERAGE SERVER RESOURCE LIMITS
Memory usage may not exceed 10% per account/file/application
CPU usage differ in different shared hosting plan, which found on their plan details page.
Apache connections may not exceed 30 connections
15 MySQL maximum user connections allowed
250 emails per hour, per domain
Run stand-alone, unattended server-side processes at any point in time on the server. This includes any and all daemons, such as IRCD.
Run any type of web spider or indexer (including Google Cash / AdSpy) on shared servers.
Run any software that interfaces with an IRC (Internet Relay Chat) network.
Run any bit torrent application, tracker, or client. You may link to legal torrents off-site, but may not host or store them on our shared servers.
Participate in any file-sharing/peer-to-peer activities
Run any gaming servers such as counter-strike, half-life, battlefield1942, etc.
Run cron entries with intervals of less than 15 minutes.
When using PHP include functions for including a local file, include the local file rather than the URL. Instead of include(“http://yourdomain.com/include.php”) use include(“include.php”)

  1. b) Illegal Usage:
    T2F Gateway servers may be used for lawful purposes only. Transmission, storage, or distribution of any information, data or material in violation of any applicable law or regulation is prohibited. This includes, but is not limited to copyrighted material, trademark, trade secret or other intellectual property right used without proper authorization, and material that is obscene, defamatory, constitutes an illegal threat or violates export control laws. Examples of non-acceptable content or links: Pirated software, Hackers programs or archives, Warez sites, MP3, and IRC bots. Any type of forum/discussion board discussing where to obtain such files or one that distributes the files is also prohibited. The subscriber to T2F Gateway service agrees to indemnify and hold harmless T2F Gateway from any claims resulting from the use of the service that damages the subscriber or any other party. T2F Gateway will be the sole arbiter as to what constitutes a violation of this provision.
  2. c) Illegal Content:
    T2F Gateway does not allow background Daemons such as IRC bots; eggdrop; BitchX; XiRCON; and any other program that interferes with normal server operation. No warez is allowed. Web proxies are not tolerated. This includes NPH-Proxy and web proxy. If your site is found to hold any proxy files, your account will be suspended and the account holder will be issued a fee of $50 USD. When using an account with shell, you are not allowed to run ANY servers or services on the T2F Gateway network. Servers are defined as perlbots, proxies, BitchX, psyBnc, root exploits, DDoS scripts, Shoutcast servers, etc. Running any of these will face an immediate suspension, and users will be subject to a fine no less than $50.00 USD, and no more than $100.00 USD. T2F Gateway reserves the right to terminate an account for these activities also.
  3. d) Software Distribution:
    T2F Gateway web hosting accounts are not to be used for the purposes of distributing software and multimedia products. If you wish to distribute software and/or multimedia files, please contact our sales for special arrangement.
  4. e) Chat Rooms:
    T2F Gateway does not provide nor allow chat rooms on shared hosting environment. You may elect for a dedicated server to run a chat room efficiently.
  5. f) IRC:
    T2F Gateway does not allow IRC or IRC bots to be operated on our shared or reseller servers. They are allowed on dedicated servers provided that no negative effects occur to our network.
  6. g) Liabilities:
    T2F Gateway, makes no endorsement, claims, or promises regarding the services offered by our customers and will not be held liable for any disputes or claims against said customers. In no event shall T2F Gateway be liable for any direct, indirect, incidental, consequential, special and exemplary damages, or any damages whatsoever, arising from the use or performance of this website or from any information, services or products provided through your website. We are not responsible for any content on any server in our network and will not take any action against any questionable material or action until the website in question is brought to our attention by emailing us.

INODES:

The use of more than two hundred and fifty thousand (250,000) inodes on any shared or reseller account may result in a warning, and if no action is taken to reduce the excessive use of inodes, your account may be suspended. If an account exceeds one hundred thousand (100,000) inodes it will be automatically removed from our backup system to avoid over-usage, however, databases will still be backed up as a courtesy in our sole discretion. Every file (i.e. a webpage, image file, email, etc.) on your account uses up one (1) inode.

User accounts that constantly create and delete large numbers of files on a regular basis, have hundreds of thousands of files, or cause file system damage may be flagged for review and/or suspension. The primary cause of excessive inodes is typically due to Users leaving their catchall address enabled, but never checking their primary account mailbox. Over time, tens of thousands of messages (or more) build up, eventually pushing the account past an acceptable amount of inodes. To disable your default mailbox, login to cPanel and choose “Mail”, then “Default Address”, “Set Default Address”, and then type in: “:fail: No such user here”.

 IP ADDRESS OWNERSHIP:
T2F Gateway shall maintain and control ownership of all IP numbers and addresses that may be assigned to you by T2F Gateway. T2F Gateway reserves the right to change or remove any and all such IP numbers and addresses.

SECURITY:
Users are prohibited from violating or attempting to violate the security of the T2F Gateway Network. Violations of system or network security may result in civil or criminal liability. T2F Gateway will investigate occurrences, which may involve cooperation with law enforcement authorities in prosecuting Users who are involved in such violations. These violations include, without limitation:

1) Accessing data not intended for such user or logging into a server or account, which such user is not authorized to access,
2) Attempting to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without proper authorization,
3) Attempting to interfere with service to any user, host or network, including, without limitation, via means of overloading, ping flooding, mail bombing,
4) Forging any TCP/IP packet header or any part of the header information in any e-mail or forum posting,
5) Taking any action in order to obtain services to which such User is not entitled,
6) Attempting to couple many hosting packages together to take advantage of massive space or bandwidth allocations

Each hosting package purchased is unique to a domain name and use – you are not allowed to purchase multiple plans to obtain combined bandwidth & space. T2F Gateway will stop such transactions and label them as deceptive. We have an upgrade path for all services and we can often times work out special deals for users if they ask us for the assistance.
Violations of system or network security are prohibited, and may result in criminal and civil liability. Examples include, but are not limited to the following: Unauthorized access, use, probe, or scan of a systems security or authentication measures, data or traffic. Interference with service to any user, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks. Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting.

SERVER ABUSE:
Any attempts to undermine or cause harm to a T2F Gateway Web server or subscriber of T2F Gateway Web is strictly prohibited including, but not limited to:
Logging into a server or account that you are not authorized to access
Accessing data or taking any action to obtain services not intended for you or your use
Attempting to probe, scan or test the vulnerability of any system, subsystem or network
Tampering, hacking, modifying, or otherwise corrupting or breaching security or authentication measures without proper authorization
Transmitting material that contains viruses, Trojan horses, worms, time bombs, cancelbots or other computer programming routines or engines with the intent or effect of damaging, destroying, disrupting or otherwise impairing a computer’s functionality or the operation of the System
Interfering with, intercepting or expropriating any system, data or information
Interfering with service to any user, host or network including, without limitation, by means of overloading, “flooding,” “mailbombing,” or “crashing” any computer system

You will be held responsible for all actions performed by your account whether it be done by you or by others.
All sub-networks of T2F Gateway. and all dedicated servers must adhere to the above policies.

AUP Violations

Your Services may be terminated with or without notice upon any violation of this AUP. If applicable, violations will be reported to the appropriate law enforcement agency.

A failure to respond to an email from our abuse department within forty-eight (48) hours, or as otherwise specified in the email, may result in the suspension or termination of your Services. All abuse issues must be dealt with via trouble ticket/email and will receive a response within forty-eight (48) hours