Acceptable Use Policy
Yolk Host provides hosting services to clients worldwide, and we have a responsibility to protect each client and to provide the best services available. All registered clients of Yolk Host agree to and are subject to our Terms of Service, Privacy Policy and the following Acceptable Use Policy:
All services provided by Yolk Host may be used for lawful purposes only. Transmission, storage, or presentation of any information, data or material in violation of any Sri Lanka law is prohibited. Services provided by Yolk Host that reside outside of the Sri Lanka must still abide to these terms and must not be in violation of any relevant laws of the hosting City, State and Country. This includes, but is not limited to, copyrighted material, material we judge to be threatening or obscene, or material protected by trade secret and other statutes. The subscriber agrees to indemnify and hold harmless Yolk Host and its employees from any claims resulting from the use of the service which damages the subscriber or any other party.
The provisions of this AUP are intended as guidelines and are not meant to be exhaustive. Generally, conduct that violates law, regulation, or the accepted norms of the Internet community, whether or not expressly mentioned in this AUP, is prohibited. We reserve the right at all times to prohibit activities that damage our or our affiliates’ commercial reputation and goodwill. We will be the sole and final arbiter as to what constitutes a violation of our policies.
Spam
All users must comply with all relevant legislation and regulations on bulk and commercial e-mail, including but not limited to the CAN-SPAM Act of 2003.
Users may not send mass unsolicited e-mail, which is email that is sent to recipients who have not “opted-in” to mailings from the user. Users who send mass mailings must maintain complete and accurate records of all consents and opt-ins, and provide such records to Yolk Host upon its request. If a user cannot provide positive and verifiable proof of such consents and opt-ins, we will consider the mass mailing to be unsolicited. Users are prohibited from operating mailing lists, listservs, or mailing services that do not target an audience that has voluntarily signed up for e-mail information using an “opt-in” process or that has made their e-mail addresses available to a user for distribution of information. Users who operate mailing lists must maintain complete and accurate records of all consents and “opt-in” elections, and provide such records to Yolk Host upon its request. If a user cannot provide positive and verifiable proof of such consents and “opt-in” elections, we will consider the list mailing to be unsolicited. Any user-maintained mailing list must also allow any party on the list to remove itself automatically and permanently. Other prohibited activities include, without limitation, the following:
- Use of our network for the receipt of replies to unsolicited mass e-mail.
- Forgery of e-mail headers (spoofing);
- Spamming via third-party proxy, aggregation of proxy lists, or installation of proxy mailing software.
- Configuration of a mail server to accept and process third-party messages for sending without user identification and authentication.
- Hosting web pages advertised within “spam e-mail” sent from another network (spamvertising).
- Hosting web pages or providing services that support spam.
- Any other unsolicited bulk messages, postings, or transmissions through media such as weblog posts, IRC/chat room messages, guestbook entries, HTTP referrer log entries, usenet posts, pop-up messages, instant messages, or SMS messages.
- Instructing others in any activity prohibited by this AUP.
If, as a result of your actions, our domains and/or IP address ranges are placed on black hole lists or other mail filtering software systems, your server may be suspended and possibly terminated upon further investigation.
Prohibited Uses
The following uses are prohibited on our network. Engaging in these activities on our services will result in an account and/or service suspension without notice.
- Copyrighted content hosting and/or linking to pirated content
- Open proxies
- Stressers/booter websites
- Mail/SMS bombers
- Mass mail
- Resource intensive activities (CPU, I/O, Network etc)
- IP spoofing
- Network/port Scanning
- Distribution of credentials and/or private personal information
- Denial of Service (D)DoS attacks
- TOR exit nodes
- Open DNS resolvers
- Hola
- Kloxo
- Virtual currency (*coin) mining
- World Community Grid, Folding at Home, or similar software
- CrystalMines
- HitLeap or any artificial traffic creation
- HYIP websites
- iBusinessPromoter or similar software
- Vulnerability scanning
- Bruteforcing
- Social media crawlers
- Cracking
- Botnets
- Child pornography or any kind of pornography contents
- Hivemail
- Telnet or SSH access scripts
- Usenet
- Destructive activities including but not limited to phishing, malware and/or distributing malicious content
- Illegal activities including but not limited to ponzi schemes, pyramid schemes, phishing, scam websites and pirating software
- Video streaming
- Content delivery networks (CDN)
- LIULIANGKUANG
- Multics, CCcam, or any other card sharing software
- Any form of file hosting, file storage, cyberlocker, leeching or similar activity is prohibited
Certain network ports are blocked across our network, this is to ensure that our services are not used for malicious purposes and to protect our machines from potential vulnerabilities. Additional ports may be blocked and/or unblocked without notice to customers.
DDoS Attacks
Customers that are targeted with frequent and disruptive attacks may have action taken against their service and/or account. If attacks directed towards your service(s) are found to be persistently impacting the performance for other customers and/or our network, you will be notified via ticket and requested to try and prevent further attacks or to relocate to another provider.
Fair Usage
Our hosting services offer limited resource in each plan. These resources are intended for hosting website-related content only. Personal media storage, backup services, and file lockers are not permitted. If your resource usage significantly exceeds reasonable levels for your plan, we may contact you to optimize resource usage or consider a plan upgrade. In cases where resource usage significantly impacts the overall performance of our hosting platform, we may suspend service to maintain a stable hosting environment for all users.
Account resources
All accounts hosted on our platform are individually allocated resources and are subject to maximum resource limits to ensure a fair and secure hosting environment. These resource limits are defined by the hosting plan you choose. The resource allocations are in place to safeguard against any disruptive activities or abusive behavior that could impact the performance of the server shared by other customers.
If you consistently reach or exceed your allocated resource limits, we will contact you to discuss possible solutions. This may include upgrading to a more suitable hosting plan or setting up custom host for you. Please note that we reserve the right to adjust resource limits without prior notice to maintain the server’s performance and stability.
Outgoing mail on all of our servers is limited to 200 emails per hour, this includes mailman lists and PHP mail.
Backup policy
All accounts include a backup slot for creating and downloading backups. Responsibility for safeguarding backups rests with the account holder, as we do not assume responsibility for their backup. We reserve the right to remove any backup without prior notice, and the continuous availability of backups cannot be guaranteed. Additionally, there may be instances where certain data, including larger error logs, locally stored backup files, and temporary files, is deleted from our servers without advance notice. To ensure data security, it is essential to regularly create and download backups and store them in a secure location.
Security Policy
We’ve put strong security measures in place to safeguard our web server. But it’s equally important for website owners to take an active role in looking after their own website’s security. This means keeping your content management system (CMS) and other software up to date and following recommended security practices. Please understand that we can’t be responsible for individual website security, and we don’t have control over what you’re doing on the web. It’s your responsibility, as the website owner, to make sure your site is secure and current to minimize any potential risks.