Acceptable Use Policy
It seems that acceptable use documents tend to fall into at least one of two categories: perceived death threats and tomes of superfluous legal babble. We dislike that trend, so we are trying something a bit different. This document describes our AUP in plain English.
In short, we ask only that our services be used in a well-meaning, lawful, responsible and respectful manner.
Any of the activities on the following list will lead most immediately to a suspension of services so we can investigate the abusive behavior. Many suspensions will then be followed by complete termination of service. Credit will not be provided for those who have had service interrupted due to a violation of this policy.
Activities not on this list will be handled on a case-by-case basis, and we may expand the list of known abuses if need be.
If ever you have a question regarding this AUP, please feel free to ask via email to email@example.com
These are activities that we currently explicitly prohibit. There may be other unfavorable activities that are not explicitly listed here, and partaking in such activities may also lead to a suspension of services. We will consider those on a case-by-case basis, and we may expand this list if they are especially heinous.
As mentioned, using Canvas Hosting resources for any of the following activities will result in a suspension of service, pending investigation, and probable termination of services. We would greatly appreciate your not doing this stuff.
- Unauthorized use of any computing resource, be it network resources, data, or system/account access.
- Unauthorized network/security/vulnerability scanning of systems not under your control. This includes both internal, external, and integral resources.
- Unauthorized network data sniffing.
- Any sort of Denial of Service behavior including (but not limited to) denial of service to either a network resource or a targeted service.
- Collecting or using identification information without the lawful consent of the individual in question. This includes such activities as phishing, internet scamming, password collection, or acquisition from an external service.
- TCP-IP packet spoofing
- Unauthorized client-side software installation.
- Installation of client-side software that cannot be removed via standard procedures on the target operating environment.
- Transmission of unsolicited marketing material (SPAM) via any means, both from Canvas Hosting resources as well as promoting sites/products offered via Canvas Hosting resources.
- Hosting of content that violates the law in either your own jurisdiction or that of Canvas Hosting.
- Using Canvas Hosting resources to make available copyrighted material for which you do not have the written permission of the copyright holder.
- Any online conduct that is likely to result in Canvas Hosting resources, employees, officers, offices, et cetera becoming the target of malicious behavior.
- Distributing software specifically used for any of the above activities.