last modified: 18th of August 2021
We provide you with keys to a powerful computing platform. Use our services in a considerate and professional way. Make fair use of this. This document outlines what is not allowed here.
fortrabbit is intended to be used to host websites, web applications, and web APIs. This policy describes forbidden uses. The examples described here are not exhaustive. We may modify this policy at any time.
It is not allowed to use, encourage, facilitate, promote or instruct others to use the services for any illegal, harmful, fraudulent, infringing or offensive use, or to transmit, store, display, distribute or otherwise make available "evil" content. This includes:
- Illegal or harmful: Illegal contents, that violate the rights of others, or that may be harmful to others' reputation, including disseminating, promoting or facilitating child pornography, offering or disseminating fraudulent goods, promotions, make-money-fast schemes, ponzi and pyramid schemes, phishing, pharming, crypto-currency mining or brokering, gambling or anything even loosely supporting the before mentioned topics.
- Infringing: Content that infringes or misappropriates the intellectual property or proprietary rights of others.
- Harmful: Content or other computer technology that may damage, interfere with, surreptitiously intercept, or expropriate any system, program, or data, including trojan horses, cancelbots, viruses, worms, time bombs, Facebook friend bots.
- Offensive: Content that is defamatory, obscene, abusive, invasive of privacy, or otherwise objectionable, including content that constitutes child pornography, relates to bestiality, or depicts non-consensual sex acts.
- Grey area: We are aware that there are many business types that are not illegal but questionable. Examples are medical marijuana, dating, fake download websites, SEO farms. If your business is in such a grey area, contact us upfront.
It is not allowed to use the services to violate the security or integrity of any network, computer or communications system, software application, or network or computing device. This includes:
- Interception: Monitoring of data or traffic on a computer system without permission.
- Unauthorized access: Accessing or using any system without permission, including attempting to probe, scan, or test the vulnerability of a computer system or to breach any security or authentication measures.
- Origin falsification: Forging TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route. The legitimate use of aliases and anonymous remailers is not prohibited by this provision.
It is also not allowed to make network connections to any users, hosts, or networks without permission to communicate. This includes:
- Monitoring or crawling: Monitoring or crawling of a computer system that impairs or disrupts the computer system being monitored or crawled.
- Denial of service (DoS): Inundating a target with communications requests so the target either cannot respond to legitimate traffic or responds so slowly that it becomes ineffective.
- Intentional interference: Interfering with the proper functioning of any System, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, or flooding techniques.
- Operation of certain network services: Operating network services like open proxies, open mail relays, or open recursive domain name servers.
- Avoiding system restrictions: Using manual or electronic means to avoid any use limitations placed on a system, such as access and storage restrictions.
It is not allowed to distribute, publish, send, or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations (SPAM), including advertising and informational announcements. It is not allowed to alter or obscure mail headers or assume a sender's identity without the sender's explicit permission. It is not allowed to collect replies to messages sent from another internet service provider if those messages violate this policy or the acceptable use policy of that provider.
The fortrabbit platform has certain soft and hard limits. Hard limits are automatically enforced by the service. Soft limits are consumable resources that you agree not to exceed. More on those limits can be found here: help.fortrabbit.com/limits and here: www.fortrabbit.com/specs
We reserve the right, but do not assume the obligation, to investigate any violation of this policy. In consequence we may: remove, disable access, or even modify content; report any activity that we suspect violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. This reporting may include disclosing appropriate client information.
Please notify us if you become aware of any violation of this policy. Provide us with assistance to stop or remedy the violation. Please follow our abuse reporting process.