The fair use policy to enable a great and affordable services for everyone.
Last Updated: May 10, 2024
We reserve the right to update this policy at any time. Please review it regularly to stay informed.
Section 1: Hardware and Physical Systems
Overclocking: Please avoid modifying hardware settings (like overclocking) without our prior approval.
Unauthorized Access: Do not attempt to access or disable out-of-band systems. This is strictly prohibited.
Crypto Mining: Using our systems for crypto mining is not allowed unless you have our explicit consent.
Section 2: Network and Data Flow
Network Control: We manage our network and infrastructure. Some systems may also be controlled by data centers we partner with.
Unlawful Content: Do not share or distribute illegal content, such as child pornography, hate speech, or copyrighted material.
Bandwidth Mining: Using our network for bandwidth mining is not permitted.
IPTV Services: Streaming media (like IPTV) requires proper licenses and prior approval from us.
Section 3: Lawful Usage
Follow Local Laws: Your use of our services must comply with the laws of the country where your service is hosted.
Illegal Content: Do not store or share illegal content, including material protected by copyright, trademark, or trade secrets.
Illegal Activities: Do not use our services for illegal activities, such as DDoS attacks or supporting such actions.
Section 4: Operational Security
Unauthorized Access: Do not attempt to access our systems, other customers’ systems, or external networks without permission.
Security Bypass: Do not hack, crack, or disrupt any system, including through DDoS attacks.
Testing Systems: Do not scan or test system vulnerabilities without our prior consent.
Section 5: Restricted Access
To maintain high service quality, we may limit or suspend your service. Examples include:
Applying traffic limits to specific ports.
Temporarily or permanently terminating services.
Refer to Sections 6 and 7 for details on fair use and resource abuse. These terms may be updated without prior notice.
Section 6: Resource Abuse
Shared Resources: Some services share resources. Abuse occurs when your usage negatively impacts others.
Remedial Action: We’ll work with you to resolve abuse issues. Failure to comply may result in suspension or termination.
Cloud Instances: Avoid using 90% or more of your allocated vCPUs for over an hour. Consistent high usage may require upgrading to a dedicated plan.
Section 7: Unmetered Solutions
Fair-Use Bandwidth: Unmetered services must follow fair-use guidelines. Excessive use (e.g., continuous speed tests) may lead to rate limits.
Dedicated Servers: Sustained usage over 1 Gbps (95th percentile) is considered excessive.
Cloud Servers: Sustained usage over 35Mbps/GB (95th percentile) is excessive.
DDoS Protection: Bare metal services include 30TB/month. Additional usage is billed at £3.15/TB/month.
Section 8: TOR and Anonymity Networks
TOR Nodes: You may run TOR nodes, but please respond promptly to any abuse reports.
Abuse Assistance: We’ll forward abuse reports to you and help resolve issues. For further assistance, contact our support team.
Â
Thank you for choosing Netexcloud.com! We’re here to help you succeed while ensuring a fair and secure environment for all.