Acceptable Use Policy

Last updated: Sept 11, 2023

Acceptable Use Policy

Last Revised: Sept 11, 2023

This Acceptable Use Policy (AUP) outlines prohibited activities and content in association with the Services provided by Bage Cloud. Please note that while this AUP provides guidelines, it may not cover all potential infractions, and Bage Cloud retains the right to take corrective measures regarding content or usage not explicitly detailed herein.

You are accountable for any breaches of this AUP committed by individuals using your account, whether permitted by you or through unauthorized means. Additionally, you are accountable for any violations of this AUP by individuals using Your Users. Utilizing the Services to aid another person in actions that would contravene this AUP if performed by you constitutes a violation of the AUP. Please note that we reserve the right to amend this AUP at any time by publishing an updated version on the Bage Cloud Websites and/or Services.

All terms specifically defined and denoted in capital letters within this AUP hold identical meanings as outlined in the Terms of Service.

1. Illegal or Abusive Activity or Content

You may not use the Services for any unlawful or abusive purpose. Prohibited activities include:

  • Illegal Activities. Any use of the Services to engage in, further, promote, or encourage illegal conduct or activities, including the dissemination of content that has been determined by a court of competent jurisdiction to be unlawful.
  • Fraudulent or Harmful Activities. Engaging in activities that is deceptive or harmful to others, or that would harm Bage Cloud operations or reputation, including offering or disseminating fraudulent goods, services, schemes, or promotions (e.g., make-money-fast schemes, Ponzi and pyramid schemes, phishing, or pharming), deceptively impersonating another person or entity, or engaging in other fraudulent or misleading practices.
  • Violation of Intellectual Property Rights. Using the Services in a manner that violates, infringes on or misappropriates the intellectual property or proprietary rights of any third party, including without limitation any rights in or to copyright, patent, trademark, trade secret, privacy or publicity, and publishing content intended to assist others in unlawfully circumventing technical measures intended to protect any such rights. For more information, please see Bage Cloud Copyright Policy and Trademark Policy.
  • Unlawful Pornography. Disseminating child pornography or depictions of nudity or sexual activity obtained or disseminated without the consent of those depicted (e.g., “revenge pornography”).
  • Violent, Harassing, or Abusive Content. Content that incites or threatens violence against any person, promotes terrorism, is intended to harass, abuse or invade the privacy of any individual, creates a risk to the physical safety or health of any individual or to public safety or health, or that threatens or encourages harm on the basis of race, ethnicity, national origin, religion, caste, sexual orientation, sex, gender, gender identity, serious disease or disability, or immigration status.
  • Controlled Substances. Unlawfully selling or distributing controlled substances, including but not limited to any illegal or prescription drugs.

2. Security Violations

You may not use the Services to violate the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a “System”). Prohibited activities include:

  • Harmful Software. Content, software, or any other technology that may damage, interfere with, surreptitiously intercept, or expropriate any computer system, program, or data, including any viruses, malware, spyware, adware, Trojan horses, worms, or time bombs.
  • Unauthorized Access. Accessing or using any System without permission, including attempting to probe, scan, or test the vulnerability of a System or to breach any security or authentication measures used by a System.
  • Interception. Monitoring of data or traffic on a System without permission.
  • Falsification of Origin. Using fake or misleading TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route. This prohibition does not include the use of aliases or anonymous remailers.

3. Network Abuse

You may not make network connections to any users, hosts, or networks unless you have permission to communicate with them. Prohibited activities include:

  • Monitoring or Crawling. Monitoring or crawling of a System that impairs or disrupts the System being monitored or crawled, or other harvesting or scraping of any content of the Services.
  • Deceitful Actions. Introducing intentionally, knowingly or recklessly, any virus or other contaminating code into the Service, or collecting, transmitting, or using information, including email addresses, screen names or other identifiers, by deceit or covert means (such as phishing, Internet scamming, password robbery, spidering, and harvesting).
  • Intentional Interference. Interfering with the proper functioning of any System, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, flooding techniques, or conducting a denial of service (“DoS”) attack.
  • Operation of Certain Network Services. Operating open proxies, open mail relays, open recursive domain name servers, Tor exit nodes, or other similar network services.
  • Avoiding System Restrictions. Using manual or electronic means to avoid any use limitations placed on a System, such as access limits and storage restrictions.
  • Retaliation Against Bage Cloud. Any conduct that is likely to result in retaliation against Bage Cloud, including the Services, or Bage Cloud employees, officers or other agents, including engaging in behavior that results in any Bage Cloud server being the target of a DoS attack.
  • Withholding Identity. Any activity intended to withhold or cloak identity or contact information, including the omission, deletion, forgery or misreporting of any transmission or identification information, such as return mailing and IP addresses.
  • Mining of Cryptocurrencies. Mining any cryptocurrency, including but not limited to BitCoin or any similar currency, without explicit written permission.

4. E-Mail and Other Message Abuse; Spamming

You will not distribute, publish, send, or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations (like “spam”), including commercial advertising and informational announcements. You will not alter or obscure mail headers or assume a sender’s identity without the sender’s explicit permission. You will not collect replies to messages sent from another internet service provider if those messages violate this AUP or the acceptable use policy of that provider. You must use reasonable efforts to secure any device or network within your control against being used in breach of the applicable laws against spam and unsolicited email, including where appropriate by the installation of antivirus software, firewall software and operating system and application software patches and updates. You will not take any action which directly or indirectly results in any of our IP addresses being listed on any abuse database (e.g., Spamhaus). You must comply with the laws and regulations applicable to bulk or commercial email in your jurisdiction. In addition, your bulk or commercial email must meet the following requirements:

  • You must have a privacy policy or similar disclosure posted for each domain associated with the mailing;
  • You must have the means to track anonymous complaints;
  • You must not obscure the source of your e-mail in any manner;
  • You must post an email address for complaints (such as [email protected]) in a conspicuous place on any website associated with the email, and you must promptly respond to messages sent to that address;
  • Your intended recipients have given their consent to receive e-mail via some affirmative means, such as an opt-in procedure, and you can produce the evidence of such consent within 72 hours of receipt of a request by the recipient or Bage Cloud;
  • You must use reasonable means to ensure that the person giving consent is the owner of the e-mail address for which the consent is given;
  • You must include the recipient’s e-mail address in the body of the message or in the “TO” line of the e-mail; and
  • You must honor revocations of consent and notify recipients of the same.

These mail policies apply to messages sent using the Services, or to messages sent from any System by you or any person on your behalf that directly or indirectly refer the recipient to a site hosted via the Services. In addition, you may not use a third-party e-mail service that does not practice similar procedures for all of its customers. These requirements apply to distribution lists created by third parties to the same extent as if you created the list.

5. Vulnerability Testing

Without prior written consent from Bage Cloud, you are prohibited from attempting to probe, scan, penetrate, or test the vulnerability of any Bage Cloud system or network. Additionally, any actions aimed at breaching Bage Cloud's security measures or authentication protocols, whether through passive or intrusive methods, or conducting security or malware research on or using the Services, are strictly forbidden.

6. Excessive Use of Shared System Resources

Usage of any shared System provided by Bage Cloud must not disrupt the regular functioning of said System without just cause, nor should it excessively consume the System's resources. For instance, in the event that your cloud-hosted code conflicts unnecessarily with other customers’ use of the Services due to coding abnormalities, we may request you to rectify these issues. Moreover, you acknowledge and agree that in cases where data stored on a shared System is infected with a virus or corrupted in a manner that could potentially compromise the System or affect other customers’ data stored on the same system, we reserve the right to quarantine or delete such data.

7. Other

It is imperative to maintain accurate and up-to-date information with your domain name registrar for any domain hosted on the Bage Cloud network. Additionally, the use of IP addresses allocated by Bage Cloud is permitted exclusively in conjunction with your Bage Cloud Service. You consent that if you create a DNS record or zone on Bage Cloud-managed or operated DNS servers or services for a domain where you are not listed as the registrant or administrative contact according to the registrar's WHOIS system, upon the request of the registrant or administrative contact as per the registrar's WHOIS system, Bage Cloud reserves the right to modify, transfer, or delete such records or zones.

8. Our Monitoring and Enforcement

While we retain the right, we are not obligated, to investigate any suspected breach of this AUP or misuse of the Services that comes to our attention. During such investigations, we may disclose any activity that we believe violates laws or regulations to the relevant law enforcement officials, regulators, or other appropriate third parties. This disclosure may involve the examination, disclosure, and retention of relevant customer information, consistent with applicable laws. Additionally, we may collaborate with pertinent law enforcement agencies, regulators, or other relevant third parties to aid in the investigation and prosecution of unlawful activities by providing network and systems information pertaining to alleged breaches of this AUP.

9. Consequences of Violation of AUP

If, at our discretion, we ascertain that you have breached this AUP, we reserve the right to remove, disable access to, or modify any content or resource. Additionally, we retain the authority to suspend or terminate your access to the Services. We may also intercept or block any content or traffic associated with your usage of the Services if it is deemed unlawful or not in compliance with this AUP. Our prerogative to suspend or terminate your access to the Services remains applicable, even in cases where a violation occurs unintentionally or without your authorization. This right is not obligatory for us to exercise at any specific time or in relation to any particular Subscriber. We reserve the discretion to execute such actions at any time within our sole discretion.

10. Reporting of Violations of this AUP

If you encounter or suspect any violation of this AUP, we kindly request that you notify us promptly, providing a comprehensive explanation detailing the grounds for the suspected violation. Your cooperation may be sought to aid in stopping or rectifying the violation. To report any infringement of this AUP or for related inquiries, please reach out to us via the provided contact information.