Keep your business running through any disruption. Continuous replication and automated failover ensure industry-leading RPO/RTO across our Dubai, Fujairah, and Vienna data centers.
Legal Documents
Acceptable Use Policy
This Acceptable Use Policy (this "AUP") describes material and activities that are not allowed in connection with the Services offered by Bamboozle Web Services. This AUP is not exhaustive, and Bamboozle Web Services reserves the right to take remedial action in connection with content or uses that are not specifically described below.
You are responsible for violations of this AUP by anyone using your account with your permission or on an unauthorized basis. Your use of the Services to assist another person in an activity that would violate this AUP is itself a violation of the AUP. We may modify this AUP at any time by posting a revised version on our Websites and Services.
Illegal or Abusive Activity or Content
You may not use the Services for any unlawful or abusive purpose. Prohibited activities include:
- Illegal Activities. Any use of the Services to engage in, further, promote, or encourage illegal conduct or activities, including the dissemination of content that has been determined by a court of competent jurisdiction to be unlawful.
- Fraudulent or Harmful Activities. Engaging in activities that are deceptive or harmful to others, or that would harm Bamboozle Web Services' operations or reputation, including offering or disseminating fraudulent goods, services, schemes, or promotions such as make-money-fast schemes, Ponzi and pyramid schemes, phishing, or pharming.
- Violation of Intellectual Property Rights. Using the Services in a manner that violates, infringes on, or misappropriates the intellectual property or proprietary rights of any third party, including rights in or to copyright, patent, trademark, trade secret, privacy, or publicity.
- Unlawful Pornography. Disseminating child pornography or depictions of nudity or sexual activity obtained or disseminated without the consent of those depicted.
- Violent, Harassing, or Abusive Content. Content that incites or threatens violence against any person, promotes terrorism, is intended to harass, abuse, or invade the privacy of any individual, creates a risk to public safety or health, or that threatens or encourages harm on the basis of race, ethnicity, national origin, religion, sexual orientation, sex, gender, gender identity, serious disease or disability, or immigration status.
- Controlled Substances. Unlawfully selling or distributing controlled substances, including any illegal or prescription drugs.
Security Violations
You may not use the Services to violate the security or integrity of any network, computer or communications system, software application, or computing device. Prohibited activities include:
- Harmful Software. Content, software, or any other technology that may damage, interfere with, surreptitiously intercept, or expropriate any computer system, program, or data, including viruses, malware, spyware, adware, Trojan horses, worms, or time bombs.
- Unauthorized Access. Accessing or using any system without permission, including attempting to probe, scan, or test the vulnerability of a system or to breach any security or authentication measures.
- Interception. Monitoring of data or traffic on a system without permission.
- Falsification of Origin. Using fake or misleading TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route.
Network Abuse
You may not make network connections to any users, hosts, or networks unless you have permission to communicate with them. Prohibited activities include:
- Monitoring or Crawling. Monitoring or crawling of a system that impairs or disrupts the system being monitored or crawled, or other harvesting or scraping of any content of the Services.
- Deceitful Actions. Introducing intentionally, knowingly, or recklessly any virus or other contaminating code into the Services, or collecting, transmitting, or using information by deceit or covert means such as phishing, Internet scamming, password robbery, spidering, and harvesting.
- Intentional Interference. Interfering with the proper functioning of any system, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, flooding techniques, or conducting a denial of service (DoS) attack.
- Operation of Certain Network Services. Operating open proxies, open mail relays, open recursive domain name servers, Tor exit nodes, or other similar network services.
- Avoiding System Restrictions. Using manual or electronic means to avoid any use limitations placed on a system, such as access limits and storage restrictions.
- Retaliation Against Bamboozle Web Services. Any conduct that is likely to result in retaliation against Bamboozle Web Services or its employees, officers, or other agents.
- Withholding Identity. Any activity intended to withhold or cloak identity or contact information, including the omission, deletion, forgery, or misreporting of any transmission or identification information.
- Mining of Cryptocurrencies. Mining any cryptocurrency, including Bitcoin or any similar currency, without explicit written permission.
E-Mail and Other Message Abuse; Spamming
You will not distribute, publish, send, or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations (like "spam"). You will not alter or obscure mail headers or assume a sender's identity without the sender's explicit permission.
You must comply with the laws and regulations applicable to bulk or commercial email in your jurisdiction. Your bulk or commercial email must meet the following requirements:
- You must have a privacy policy or similar disclosure posted for each domain associated with the mailing.
- You must have the means to track anonymous complaints.
- You must not obscure the source of your e-mail in any manner.
- You must post an email address for complaints in a conspicuous place on any website associated with the email, and must promptly respond to messages sent to that address.
- Your intended recipients have given their consent to receive e-mail via some affirmative means, such as an opt-in procedure, and you can produce evidence of such consent within 72 hours of a request.
- You must use reasonable means to ensure that the person giving consent is the owner of the e-mail address for which the consent is given.
- You must include the recipient's e-mail address in the body of the message or in the "TO" line of the e-mail.
- You must honor revocations of consent and notify recipients of the same.
Vulnerability Testing
You may not attempt to probe, scan, penetrate, or test the vulnerability of a Bamboozle Web Services system or network, or to breach Bamboozle Web Services' security or authentication measures, whether by passive or intrusive techniques, without Bamboozle Web Services' prior written consent.
Excessive Use of Shared System Resources
You may not use any shared system provided by Bamboozle Web Services in a way that unnecessarily interferes with the normal operation of the shared system, or that consumes a disproportionate share of the resources of the system. We may require you to repair coding abnormalities in your cloud-hosted code if it unnecessarily conflicts with other customers' use of the Services. You agree that we may quarantine or delete any data stored on a shared system if the data is infected with a virus, or is otherwise corrupted, and has the potential to infect or corrupt the system or other customers' data.
Other
You must have valid and current information on file with your domain name registrar for any domain hosted on the Bamboozle Web Services network. You may only use IP addresses assigned to you by Bamboozle Web Services in connection with your Bamboozle Web Services Service.
Our Monitoring and Enforcement
We reserve the right, but have no obligation, to investigate any suspected violation of this AUP or misuse of the Services about which we have actual knowledge. In connection with such investigations, we may report any activity that we suspect violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. We also may cooperate with appropriate law enforcement agencies to help with the investigation and prosecution of illegal conduct.
Consequences of Violation of AUP
If we determine, in our discretion, that you have violated this AUP, we may remove, disable access to, or modify any content or resource and/or suspend or terminate your use of the Services. We also may intercept or block any content or traffic belonging to you or to users where the Services are being used unlawfully or not in accordance with this AUP. Our right to suspend or terminate your use of the Services applies even if a violation is committed unintentionally or without your authorization.
Reporting of Violations
If you become aware of any suspected violation of this AUP, please notify us by providing a full explanation of the bases for the violation. To report any violation of this AUP or make related inquiries, please contact us at [email protected].