Acceptable Use Policy
CGS Hosting services may not be used for illegal purposes, or in support of illegal activities. CGS Hosting reserves the right to cooperate with legal authorities and/or injured third parties in the investigation of any suspected crime or civil wrong doing.
Using of the CGS Hosting services to transmit any material (by e-mail, uploading, posting or otherwise) that threatens or encourages bodily harm or destruction of property. Harassment using of the CGS Hosting services to transmit any material (by e-mail, uploading, posting or otherwise) that harasses another.
Forgery or Impersonation
Adding, removing or modifying identifying network header information in an effort to deceive or mislead is prohibited. Attempting to impersonate any person by using forged headers or other identifying information is prohibited. The use of anonymous remailers or nicknames does not constitute impersonation.
Use of CGS Hosting service to make fraudulent offers to sell or buy products, items, or services, or to advance any type of financial scam such as “pyramid schemes” and “chain letters.”
Use of the CGS Hosting service to access, or to attempt to access, the accounts of others, or to penetrate, or attempt to penetrate, security measures of CGS Hosting or another entity’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in the corruption or loss of data, is expressly prohibited and the offending CGS Hosting account is subject to immediate termination and further investigation.
Network Disruptions and Unfriendly Activity
Use of the CGS Hosting service for any activity which affects the ability of other people or systems to use CGS Hosting services or the Internet. This includes “Denial of Service” (DoS) attacks against another network host or individual user. Interference with or disruption of other network users, services or equipment is prohibited. It is the Member’s responsibility to ensure that their network is configured in a secure manner. A Subscriber may not, through action or inaction, allow others to use their network for illegal or inappropriate actions. A Subscriber may not permit their network, through action or inaction, to be configured in such a way that gives a third party the capability to use their network in an illegal or inappropriate manner. Unauthorized entry and/or use of another company and/or individual’s computer system will result in immediate account termination. CGS Hosting will not tolerate any subscriber attempting to access the accounts of others, or penetrate security measures of other systems, whether or not the intrusion results in corruption or loss of data.
Fraud involves a knowing misrepresentation or misleading statement, writing or activity made with the intent that the person receiving it will act upon it. Fraud is strictly prohibited and offenses will be investigated. Third-party Links, Sites and Services Our Products may contain links to third-party websites, advertisers, services, special offers, or other events or activities that are not owned or controlled by CGS Hosting. We do not endorse or assume any responsibility for any such third-party sites, information, materials, products, or services. If you access any third party website, service, or content from CGS Hosting, you do so at your own risk and you agree that CGS Hosting will have no liability arising from your use of or access to any third-party website, service, or content.
Hosting services provided by CGS Hosting are not to be used for any of the following: pornography, file sharing/repositories/storage, fraudulent activity, extortion or blackmail. Clients utilizing this service may also not upload any sort of malicious scripts/software; this includes the following but not limited to items involving phishing, backdoors, CPU/memory eating scripts and more. The service may only be used for the purpose of hosting a website/web application.
Disk Resource Use
Disk space provided in associated with our web hosting services may only be used for files and content in direct operation of the website, web applications or game servers being hosted. The disk space provided cannot be used for file sharing, storing backups, or anything unrelated to the operation of the website/web application.
Last Update: Sun July 07 2019.