Cloud Hosted Use Restrictions Policy
When you use any of Raytha’s Services, you acknowledge that you may not:
- Collect or extract information and/or user data from accounts which do not belong to you.
- Circumvent, disable, or otherwise interfere with security-related features of the Services.
- Trick, defraud, or mislead us or other users, including but not limited to making false reports or impersonating another user.
- Upload or transmit (or attempt to upload or to transmit) viruses or any type of malware, or information collection mechanism, including 1×1 pixels, web bugs, cookies, or other similar devices.
- Interfere with, disrupt, or create an undue burden on the Services or the networks or the Services connected.
- Harass, annoy, intimidate, or threaten others, or any of our employees engaged in providing any portion of the Services to you.
- Disparage, tarnish, or otherwise harm, in our opinion, us and/or the Services.
- Use the Services in a manner inconsistent with any applicable laws, regulations, controls, or sanction policies of the United States or your applicable jurisdiction.
- Use the Services for distribution of child pornography, child erotica, non-consensual sex acts (including support of sex trafficking), bestiality, gambling, defamation, harassment, libel, slander, fraud, false advertising, hacking, phishing, social engineering, or any transmission of malicious code or unauthorized use of an end user's computing resources.
- Use the Services to engage in infringement of intellectual property rights.
- Use the Services to, in our reasonable belief, promote, incite, or threaten violence; support or further sex trafficking; distribute harassing content or hate speech; violates any person's privacy; constitutes terrorism or trafficking in weapons or other illegal items; or is likely to result in a retaliation against Raytha's system, network, or employees, including behavior leading to any denial of service attack.
- Use the Services' email functionality to send spam. Emails violating the latest Federal Trade Commission regulations implementing the CAN-SPAM Act or, for non-domestic recipients, any equivalent foreign regulations. We may, at our discretion, impose limits on outbound messages if your account review indicates a risk to our network stability.
- Use the Services to store or process sensitive or otherwise regulated health or financial information, including Protected Health Information (as that term is defined under HIPAA), cardholder data protected under PCI DSS regulations (such as credit or debit card data), or other financial data (including any financial account details). You acknowledge and agree that we are not responsible for any liabilities arising from your violation of this restriction.
- Users are prohibited from engaging in or being suspected of involvement in activities related to:
- Illegal Gambling: Raytha Cloud Hosting services may not be employed for any form of illegal gambling.
- Terrorism: Individuals or entities involved or suspected of involvement in terrorist activities are strictly barred from using our services.
- Narcotics Trafficking: Participation in or suspected involvement in narcotics trafficking is expressly forbidden.
- Arms Trafficking: Any activities related to the trafficking of arms are not permitted.
- Weapons of Mass Destruction: Users are prohibited from engaging in the proliferation, development, design, manufacture, production, stockpiling, or use of nuclear, chemical, or biological weapons, weapons of mass destruction, or missiles.
Affiliation Disclaimer:
This policy extends to any affiliation with others who sponsor or support the aforementioned activities or causes.
Vigilance and Enforcement:
Raytha Cloud Hosting reserves the right to investigate and take appropriate action against any user found to be in violation of this Limited Use Statement, including termination of services.
Accounts found to be in violation of any of the above are subject to cancellation without prior notice.
How to report abuse
Violations can be reported by emailing
[email protected] and should include detailed information about the account, the content or behavior you are reporting, and how you found it, including URLs or screenshots. If you need a secure file transfer, let us know and we will send you a link. We will not disclose your identity to anyone associated with the reported account. For copyright cases, please see instructions on
how to notify us about infringement claims.
Adapted from the
Basecamp open-source policies /
CC BY 4.0