7.1 Internet 365 offers unlimited bandwidth (web traffic) usage on Shared Hosting platforms. However, this is subject to reasonable and responsible usage, as determined at Internet 365’s discretion. Shared Hosting is designed for serving personal hosting requirements or that of small, medium and large enterprises. Internet 365 reserves the right to move Clients deemed to have excessive bandwidth usage to a Cloud product, which will better suit their requirements. Clients will be given notice as such, and will be informed of any cost implications.
7.2 Disk Space on Shared Hosting may only be used for Website Content, Emails and related System Files. General data storage, archiving or file sharing of documents, files or media not directly related to the website content is strictly prohibited. Unauthorised storage or distribution of copyrighted materials is prohibited, via FTP hosts or any other means.
7.3 For Shared Hosting and Managed Dedicated Solutions, Internet 365 will implement security updates, software patches and other updates or upgrades from time to time, to maintain the best performance, at their sole discretion. These upgrades include, but are not limited to, PHP, MySQL and Plesk release versions. Internet 365 is under no obligation to effect such upgrades, or to rectify any impact such changes could potentially have to Hosting Clients.
7.4 Internet 365 will not be liable or responsible for the backing up, restoration or loss of data under any circumstances. Clients are solely responsible for ensuring their data is regularly backed up and for restoring such backups in the event of data loss or corruption.
7.5 Internet 365 prohibits Clients from doing the following on hosting platforms administered by Internet 365:
7.5.1 Running applications that are not production-ready. Any applications on the hosting platform must be optimised with respect to memory usage and must have appropriate data indexing.
7.5.2 Running applications with inadequate security controls.
7.5.3 Generating significant side-channel traffic from an application, whether by design or otherwise. Databases should be stored locally, and remote content should be cached.
7.5.4 Failure to maintain proper “housekeeping” on a shared server including storing or generating useless content, including comment spam, unused cache files, log file and database entries.
7.5.5 Storing malicious content, such as malware or links to malware.
7.5.6 Monopolising server resources, including CPU time, memory, network and disk bandwidth.
7.5.7 Maintaining long-running processes and long-running database queries.
7.5.8 Storing or running back-door shells, mass mailing scripts, proxy servers, web spiders, phishing content, or peer-to-peer software.
7.5.9 Sending bulk mail of any form, particularly mail that cannot be efficiently delivered due to volume or incorrect addresses.
7.5.10 Using poor passwords.
7.5.11 Sharing security credentials with untrusted parties.
7.5.12 Running Torrents for download or Seed Servers.
7.5.13 Running TOR (or other Online Anonymity Services).
7.5.14 Otherwise circumventing the Acceptable Use Policy or intended use of the product.
7.6 Internet 365 strictly prohibits any crypto currency associated activities or mechanisms to be run on any part of our hosting network or servers within our hosting environment.