Acceptable Use Policy (AUP)

This AUP governs the use of Digital Solutions’ web hosting services. Violation of this AUP may result in suspension or termination of your service. In the event of a dispute between you and Digital Solutions regarding the interpretation of this AUP, Digital Solutions’ interpretation, in its reasonable commercial judgment, shall govern.

NOTE: These policies do not apply to Virtual Private Servers (VPS) or Dedicated Servers.

The following is the entire Acceptable Use Policy (‘AUP’) agreement between Digital Solutions, a product of Oracle ERP Solutions, and the personal or corporate account holder. Digital Solutions provides web hosting, web design, and script installation services. Digital Solutions has certain legal and ethical responsibilities related to the use of its servers and equipment. Our general policy is to act as a provider of Internet presence. We reserve the right to suspend or cancel a customer’s access to any or all services provided by Digital Solutions if we determine that the account has been inappropriately used.

What is Appropriate Usage? Digital Solutions is designed to serve the web hosting needs of small, independently owned, and operated businesses. It is not appropriate to use our shared hosting services to support large enterprises or internationally based businesses with a sustained demand that places an undue burden on our systems or negatively impacts use by small businesses. For these cases, we recommend using our VPS or Dedicated Servers.

Digital Solutions is a shared web hosting service, which means that a number of customer websites and services (email, storage, etc.) are hosted from the same server. We use abuse controls to help ensure that use of our services does not adversely affect system performance or other customers’ sites. It is not appropriate to use an account primarily as online storage or for archiving electronic files.

General Terms If you use our services in line with our Terms of Service and this AUP, your site can grow to meet your small business needs. However, to ensure system stability, we apply constraints on how quickly your account can grow. Abuse controls may cause temporary delays while we evaluate your usage expansion.

Digital Solutions customers may not:

  1. Host unacceptable or inappropriate material including (but not limited to): topsites, IRC scripts/bots, proxy scripts, pirated software, warez, image hosting, autosurf/PTC/PTS/PPC sites, IP scanners, bruteforce apps, spam scripts, banner-ad services, file dump/mirror sites, commercial audio streaming, escrow services, high-yield interest programs (HYIP), investment sites, sale of controlled substances, pyramid schemes, illegal content, hacker sites, and more.
  2. Use over 25% of system resources for longer than 90 seconds in any 6-hour period.
  3. Execute unattended server-side processes or daemons.
  4. Run web spiders or indexers.
  5. Use software that interfaces with IRC.
  6. Use any P2P application, tracker, or client.
  7. Participate in file-sharing networks.
  8. Use excessive resources causing degradation of services.
  9. Send unsolicited emails.
  10. Send automated emails through scripts.
  11. Send emails to invalid recipients.
  12. Send emails from invalid addresses.
  13. Send emails with malicious content.
  14. Run cron jobs with intervals less than 15 minutes.
  15. Engage in cryptocurrency mining or trading activities.

Web & Email Hosting Terms

  • Cannot be used for backups or file storage.
  • Cannot run gaming servers.
  • Cannot store over 100,000 files.
  • Cannot excessively create/delete files.
  • Cannot run long MySQL queries.
  • Cannot resell parts of multi-domain packages.
  • Cannot store excessive media files.
  • Email limitations: 100 messages/hour per user or 300/hour per domain.
  • Must install SSL with Dedicated IP.
  • Cannot use WHMCS license beyond issued service.
  • Cannot store more than 2 backups.
  • Cannot use more than 2GB per database.

Bandwidth Accounts come with monthly bandwidth allocations (e.g., 300GB on Standard Plan). If usage exceeds allocation, we may suspend or charge extra. Bandwidth resets monthly.

Email Storage If usage complies with policies, we increase storage as needed. Abuse controls apply to limit excessive use. Organizing mail folders may be necessary.

Unlimited Resources Unlimited emails, FTP accounts, etc., are subject to disk space limits. You may create as many as needed within your account’s disk quota.

Offensive Content The following content is prohibited: a) Child pornography b) Pornographic material c) Excessive violence or hate speech d) Fraud or deceptive practices e) Defamation or privacy violations f) National security threats g) Exposure of trade secrets h) Copyright circumvention i) IP violations j) Illegal drug promotion, gambling, arms trafficking k) Solicitation of illegal conduct l) Malicious/fraudulent content

We do not allow: a) Proxy, warez, HYIP, gambling, lottery content b) Content transmitted via our services (web, email, forums, etc.)

We reserve the right to terminate services for violations without refund.

Security Customers must take reasonable security precautions and protect passwords.

Bulk Commercial Email Allowed with limitations: a) Recipients must opt-in. b) Sender must verify recipient ownership. c) Must not obscure sender identity. d) Must comply with CAN-SPAM Act.

Unsolicited Email Sending bulk or individual emails to recipients who opt out is strictly prohibited.

Copyrighted Material Customers may not distribute copyrighted material unless: a) Authorized by the copyright holder; b) Permitted by law.

Repeat infringement will result in termination.

Other Terms You must keep valid and current domain registrar information.

Disclaimer Digital Solutions is not obligated to monitor or police customer activity and disclaims responsibility for misuse.

Internet Abuse The following activities are prohibited: a) Unauthorized system/network access b) Unauthorized monitoring of data c) Service interference (DDoS, flooding, etc.) d) Use of stolen or unauthorized accounts e) Packet header forgery f) Conduct likely to provoke retaliation g) Activities interfering with network stability

Newsgroups, Forums, and Other Networks You must follow community and network rules where you post or interact.