Acceptable Use Policy

Published

This Acceptable Use Policy ("Policy") describes the prohibited uses and acceptable uses of the network, services, sites, resources, products, services, and materials referred to collectively as the "Services" and provided by VIRTUAL NETWORK LAB LLC FZ and its affiliates (referred to collectively as "Peerobyte," "We," "Our") to its customers and users who have registered an account and accessed the Services (collectively, "You," "Customers," or "Users").

1. General Provisions

1.1. This document is an integral part of the Peerobyte Customer Agreement (hereinafter referred to as the "Agreement").
1.2. Terms used herein and not defined herein are defined in the text of the Agreement.
1.3. You agree to use the Services strictly in accordance with the Agreement and not outside the scope of this Policy.
1.4. You agree to require your end users, if any, to use the Services strictly in accordance with the Agreement and within the scope of this Policy.
1.5. If you and/or your end users do not agree to use the Services in accordance with the Agreement and this Policy, then refuse to use the Services.
1.6. By using the Services, you and your end users, if any, agree to the Agreement and the latest version of this Policy.
1.7. We reserve the right to make changes to this Policy at any time and in any manner. An updated or revised version supersedes all previous versions of this Policy immediately upon posting. Your use of the Site or Services following the posting of such changes means that you accept the revised Policy.
1.8. An up-to-date version of this Policy is posted on Our Website.
1.9. You should periodically check this Policy for changes by revisiting the Site and refreshing the page, paying attention to the date this Policy was last modified, which is listed at the top of this document.
1.10. If We make any changes to this Policy that may materially affect Our policies and procedures with respect to the personal data We have previously collected from You, We may notify You of such changes by sending You a letter to Your email or a message to Your personal Account area on Our Site.
1.11. You may ask questions about this Policy and address other questions regarding acceptable use of our Services by emailing [email protected] to Our Customer Support Team.
1.12. If you violate this Policy, allow your end users to violate this Policy, or help third parties violate this Policy, We may suspend your access to the Services and/ or terminate your Account.
1.13. The cases discussed in this Policy are not exhaustive. If We believe that your actions are or may be harmful to Our interests or the interests of third parties in other ways not described in this Policy, We may suspend Your access to the Services and/ or terminate Your Account, regardless of formal compliance with this Policy.

2. Basic Principles

2.1. You may not use the Services or engage, endorse, promote, facilitate or direct others to use the Services for any act or purpose that is unlawful, illegal, harmful, deceptive, fraudulent, violates anyone's rights or is abusive ("Harmful Purposes").
2.2. It is forbidden to carry out any actions aimed at misappropriation and use of intellectual property or proprietary rights of third parties through the Services. In particular, you may not publish content without authorization or proper attribution.
2.3. You may not use the Services to unauthorized obtain or disclose private information.
2.4. You may not use the Services to create, store, transmit, publish, distribute or in any other way facilitate the disclosure of content prohibited by law or content that may be used for Malicious Purposes or harm anyone ("Malicious Content").
2.5. You may not resell Peerobyte products and/or arrange for access to the Peerobyte Services without Our written authorization.
2.6. You agree:
i. Comply with the Agreement and the requirements of this Policy.
ii. Comply with all laws and regulations applicable to you and your end users, including, criminal laws, privacy laws, intellectual property laws, export control laws, tax laws and regulatory requirements in your jurisdiction, your end users' jurisdictions.
iii. Report to [email protected] any violation of this Policy that you are aware of.
iv. Utilize the Services in a professional manner.
v. To be accurate in the case of the statement of facts.
vi. To be sincere in the case of presenting opinions.

3. Unwanted messages

3.1. You agree to comply with Our No Spam Policy, which is an integral part of the Agreement.
3.2. You may not use the Services to mass distribute, publish, send unsolicited messages via electronic communications, including email.
3.3. When sending messages via electronic means of communication, including e-mail, it is prohibited to use false message headers or change the sender's information without the express permission of the original sender of the message.
3.4. You may not collect responses to messages sent by another provider if doing so violates that provider's Acceptable Use Policy or violates this Policy.
3.5. You may not use Our Services to promote other companies, services or opportunities that are not affiliated with (or endorsed by) Peerobyte.
3.6. If you run newsletters, you need to provide recipients with an easy way to unsubscribe, and you need to develop and clearly enforce an unsubscribe policy.

4. Security breach

4.1. You may not use the Services to compromise the security or integrity of any information system or computing device, network, computer or communications system, software, collectively referred to as "Systems".
4.2. Unauthorized access to or use of any System without authorization is prohibited, including attempts to probe, scan or test the vulnerability of the System or to breach any security or authentication measures used by the System.
4.3. You may not intercept or monitor data or traffic on the System without the permission of the System owner.
4.4. Tampering and unauthorized modification of TCP-IP packets, email or any other messages and data is prohibited.

5. Abuse of resources

5.1. You may not establish network connections with any users, hosts, or networks unless you have permission to communicate with them.
5.2. It is prohibited to monitor or crawl the System if doing so would degrade or disrupt the System being monitored or crawled.
5.3. Any action to cause a denial of service (DoS) is prohibited when the System becomes overloaded with requests, resulting in an inability to respond to legitimate requests or responding so slowly that System operation becomes inefficient.
5.4. Intentional interference with the proper functioning of any System without the express consent of the System owner is prohibited.
5.5. The operation of network services such as open proxy servers, open mail relay servers, or open recursive domain name servers is prohibited.
5.6. You may not circumvent system restrictions or use tools to circumvent any restrictions on the use of the System, such as access and storage restrictions.
5.7. Excessive use of resources provided to You by Peerobyte is prohibited. If any instance uses an excessive amount of computing resources as a result of Your activities, Peerobyte reserves the right to limit the number of CPUs available to Your instances in order to maintain the performance level of Our Platform as a whole.

6. Violation monitoring and enforcement

6.1. Peerobyte reserves the right to monitor the activities, User Content and traffic of its Users, to conduct investigations of violations of this Policy, as well as any other actions aimed at suppressing illegal activities and misuse of the Services.
6.2. Peerobyte has no obligation to monitor or approve User Content, monitor the traffic of its customers as part of the Services, and therefore Peerobyte disclaims all liability with respect to the Services and any actions resulting from your participation in any Service.
6.3. Peerobyte may remove, modify or suspend access to User Content or resources that violate the Agreement or this Policy.
6.4. Peerobyte has no obligation to retain any User Content after termination of the Services, but may retain User Content for archival purposes without incurring any obligation with respect thereto.
6.5. Peerobyte may take measures to limit the possibility of incidents occurring against violators of the Agreement and/or this Policy, users who create unnecessary reputational or legal risks for Us or any other person, including suspension or termination of the Service or all Services to the violator, suspension or termination of the violator's Account.
6.6. To protect our rights or the rights of third parties, or if we discover suspicious or illegal activity, we reserve the right to contact law enforcement, supervisory and regulatory authorities and other entities. We may also take necessary legal steps to enforce our rights and interests and those of third parties.
6.7. As part of the investigation, prevention and prosecution of illegal activity, Peerobyte may disclose and provide information about its customer and the violation, including the alleged violation, to law enforcement, regulatory and supervisory authorities, and other parties, including the public.
6.8. In the context of investigating, preventing and prosecuting any unlawful activity, Peerobyte reserves the right to share information about Our customers and violations, including suspected violations, with law enforcement and regulatory authorities, as well as other interested parties, including the public at large. Under Our Privacy Policy, We may also use Your information to protect the safety and interests of Peerobyte, Our Services, and the public; prevent or respond to fraud, cybercrime, and technical problems; and prevent any activity that We believe is illegal or improper. This information may be used in litigation, audits, and to enforce Our Terms of Use and this Policy.

7. Malicious content

A non-exhaustive list of content that will definitely be perceived by Us as Malicious Content:
i. Illegal Content:
Content that is prohibited by the laws of the jurisdiction in which the content is produced, transmitted, stored, published or accessed.
ii. Unacceptable Content:
Content that may harm minors; is threatening or invasive of privacy; is patently offensive, obscene or otherwise inappropriate to any group; sexually explicit content, including pornography, bestiality, violent acts with sexual overtones; content that encourages disorder, lawbreaking; content that promotes destructive ideas, violence or bigotry; content that promotes hatred, intolerance or di
iii. Malware:
Content that contains methods of using software for Malicious Purposes; software that can be used to harm, interfere with the legitimate interests of third parties, steal or intercept data, other Malicious Purposes
iv. Misleading Content:
Content that contains false, defamatory or intentionally misleading information.
v. Copyright Infringement:
Content published without attribution or proper authorization from the author or copyright holder.

  1. Prohibited acts
    A non-exhaustive list of prohibited activities that are not permitted when using Our Services and/ or that will be clearly perceived by Us as having a Malicious Purpose:
    i. Violation of the requirements of any laws and regulations.
    ii. Creating, uploading, storing, storing, forwarding, publishing, distributing Malicious Content.
    iii. Uploading or publicizing items protected by intellectual property laws, such as copyright, trademark, privacy or publicity rights without obtaining the necessary authorizations.
    iv. Falsifying or removing attribution, legal or other proper notices or proprietary designations, or indicating the origin or source of the software or any other materials.
    v. Downloading malicious software containing, for example, viruses, Trojan horses, worms, spyware, malicious bots, corrupted files or any other software that may interfere with the operation of the Systems and/ or others' rights and/ or cause damage.
    vi. Restrict or prevent any other user from using the Services.
    vii. Use the Services to organize illegal gambling, contests, lotteries, pyramid schemes, send chain letters and unsolicited messages of any kind.
    viii. Collecting information about other people, including email addresses, except as necessary for the operation of your site and as permitted by your site's privacy policy (if any).
    ix. Collecting information about Our users, using and sharing this information with third parties
    x. Obtaining any data from other users of the Services that cannot be lawfully disseminated.
    xi. Use of the Services for DOS/DDOS attacks.
    xii. Utilize and deploy services to conduct and provide defense against DOS/DDOS attacks as a service.
    xiii. Creating false identities or organizations for the purpose of misleading others.
    xiv. Misuse of the Bring your own IP (BYOIP / BGP) feature for interception or any other use.
    xv. Place TOR exit nodes.
    xvi. Create or operate public VPN gateways without prior written consent from Us.
    xvii. Port scanning and network probing without explicit authorization from the target host and/or network.
    xviii. Utilizing VOIP-based call automation software.
    xix. The use of bots or other software to automatically purchase or book goods or services if it violates any rules, policies or user agreements of the party from whom the goods or services are purchased or booked.