AUP – Acceptance User Policy

AUP – Acceptance User Policy

This Acceptable User Policy (“AUP”) governs the usage of Services. This Policy is incorporated by reference into each contract enters into with customers for the provision of Services. In addition, this AUP is incorporated by reference into the Master.

Services Agreement

This AUP is to help and protect the customers of and customers’ use of Services constitute acceptance of this AUP. The purpose of this AUP is to inform the Customer ofthe acceptable uses of the Services. The use of Services must be consistent with applicable laws and must not conflict with the right of’s other customers. The Customer agrees to comply with this AUP. has the right to change or modify the terms of the AUP at any time, with intimation to the Customer. Customer’s use of the Services after changes to the AUP shall constitute acceptance of any changed or additional terms.

Prohibited Uses

All Services provided by shall be used by the Customer for lawful purposes only and as per applicable laws (including but not limited to privacy laws). Transmission,usage, storage, or presentation of any information, data or material in violation of theapplicable laws including the ‘prohibited contents’ are strictly prohibited. This includes, but is not limited to copyrighted material, trade secret, material in’s opinion isobscene, not in public interest, opposed to public policy or is an invasion of privacy of any person or entity.

The following list provides a number of general prohibited uses of the Services that are violations of this AUP. Please note that the following list does not represent a comprehensive or complete list of all prohibited uses. The prohibited uses include but are not limited to:

Illegal Material: Includes illegally exploited copyrighted works, commercial audio,video or music files, and any material that violates any applicable law or regulation of any country, and any material that is perceived to be misleading in any manner.

Unlawful Activities: The Services shall not be used in violation of applicable laws. This includes, but is not limited to:

  • Pornography (by publishing, submitting, receiving, uploading, downloading,posting, using, copying or otherwise producing, transmitting, distributing or storing pornography)
  • Unlawful activities (including gambling)
  • Threats, harassment and abuse of any individual, organization or business
  • Fraudulent activities
  • Terrorist websites or other sites advocating human violence and hate crimes based upon religion, ethnicity or country of origin
  • Unlawful plans or schemes or linking to and or advertising such plans or
    schemes. will be the sole arbiter in determining violations of this provision.Also prohibited are sites that promote any illegal activity or present content that may bedamaging to servers or any other server on the internet. Links to such materialsare also prohibited. Examples of unacceptable content or links: Pirated software Hacker programs or archives Warez sites.

Threatening Material or Content: The Services shall not be used to host, post,transmit or retransmit any content or material that harasses others or threatens the health or safety of others. In addition, reserves the right to decline to provide Services if the content of then Customer is determined by to be obscene, indecent,hateful, malicious, racist, defamatory, fraudulent, libelous, treasonous, excessively violent or promoting the use of violence or otherwise harmful to others.

Violation of Intellectual Property Rights: The Services shall not be used to publish,submit/receive,upload/download, post, use, copy or otherwise reproduce, transmit,retransmit, distribute or store any content/material or to engage in any activity that infringes or otherwise violates the intellectual property rights or privacy or publicity rights of, any Member or third party, including but not limited to any rights protected by any copyright, patent, trademark laws, trade secret or other intellectual property right now known or later recognized under applicable law.

Distribution of Malware and Phishing: The distribution, fabrication, or use of malware, including virus software, root kits, password crackers, adware, key strokecapture programs and other programs normally used in malicious activity is prohibited.

Any activity designed to collect personal information (name, account numbers,usernames, passwords, etc.) under false pretense is prohibited.

Commercial Advertising – Email

Spamming, or the sending of unsolicited email, from a hosting server or using an email address or domain that is maintained on a machine as reference is STRICTLY prohibited. Misuse of System Resources: Any attempt to undermine or cause harm to a server, or Customer, of is strictly prohibited. This includes, but is not limited to: using programs that consume excessive CPU time; allowing the use of mail services.

The Customer agrees and undertakes that

  • Any attempt to undermine or cause harm to any of the equipments, materials etc. of is strictly prohibited.
  • In case of abuse of the resources including equipments, materials, network etc.of, in any way, reserves the unqualified right to immediately deactivate the Services, without refund.
  • Denial of Service (DOS) attacks directed at, or any attempt to launch a DOS attack from servers are strictly prohibited. All infractions and or suspected infractions will be vigorously investigated and may result in immediate termination of Services.
  • Customer shall not violate systems or network security measures instituted by and any such violation may incur criminal or civil liability

Materials and Products

  • will exercise no control whatsoever over the content of the information passing through the network or on the Customer’s websites.
  • Use of any information obtained by way of is at the Customer’s own risk, and we specifically deny any responsibility for the accuracy or quality of information obtained through our services.
  • Connection speed represents the speed of connection to and does not represent guarantees of available end to end bandwidth. can only guarantee within its controlled network, availability of bandwidth to Customer’s subscribed Committed Information Rate”


Dedicated Hardware

Hardware is not shared with other customers, so you get predictable performance and security, while simplifying software licensing. Support demanding applications with up to 64 Intel® processor cores and 4TB of RAM per server.

Control Without Headaches

Manage your virtual infrastructure using right approach and with team of expert. Moreover you will benefit from providing services and solutions under an already established name which is referred to as "funeloo Support".

Security and Compliance

Layer on value-added services like Pugmarks Managed Security to provide deep expertise and advanced threat intelligence for help protecting your business.

Expert Support for cloud infrastructure

Pugmarks support team is a professional queue of technical experts, who is adding value to comtomers on their day-to-day operations, moreover backend senior technical expertise, so you are always enjoying also a partnership that care about your operation.

Hardware On Demand

Grow your physical compute, network, and storage capacity in timeframes measured in hours and days, rather than the weeks, months.

Cloud Management Platform

Integrated platform that provide for the management of public, private & hybrid cloud environment, that incorporate self-service interface, provision system images, snapshots and provide for some degree of workload optimisation through established policies.

Please complete this form to have a specialist contact you.


Information collected in this form is subject to the