Content on this page requires a newer version of Adobe Flash Player.

Get Adobe Flash player

Content on this page requires a newer version of Adobe Flash Player.

Get Adobe Flash player

Legal Policies / Acceptable Use Policy (AUP)

Preliminaries: Core Informatics., is a Web Presence Provider. The purpose of this Service Agreement / Service Contract "the Agreement", "AUP" "Service Contract" is to specify the terms, conditions, and obligations which a customer agrees to accept by the his, her or its conduct of using the Services of Core Informatics for the registration and renewal of the registration of a domain name, or by opening an account for any of its services with Core Informatics for such purpose.

1. Definitions: As used in this Agreement, the following terms have the following meanings:

(a) "you" ,"your", customer and "Subscriber" refer to each customer, that is, each person who avails or subscribes for any of Services from Core Informatics or its websites.

(b) "we," "us,".Core Informatics and "our" refer to M/s. Core Informatics

(c) "Services" refers to the domain services, shared hosting services, dedicated servers, or provided by us as offered through Core Informatics or its websites under the domain names such as It2Ecom.Net or It2Ecom.Com or Brainus.Net or ResellerMarket.Com or HostGuru.Biz or RightMail.Net or Core Informatics.IN

(d) "Account" means an account opened with Core Informatics for the registration of domain names or for hosting the websites and related services and the payment for such registrations and other services.

By Ordering at Core Informatics and any of its associated sites you have to follow & abide by following terms.
This Acceptable Use Policy ("Policy") describes the proper and prohibited use of Core Informatics's Shared Web Hosting services ("Services") as subscribed to per the Master Service Agreement. This Policy is designed as a guideline and is not exhaustive as such. The policy can be modified from time to time effective upon posting on Core Informatics's web site. The Services allow you to develop, publish, and display a web site, store data in a database, send and receive e-mail messages, maintain a bulletin board through which you can interact with the Internet users, and send and retrieve various information. Core Informatics does not monitor or censor the information you make available or collect through the use of the Services with the exception of systems and network resources monitoring. However,

Core Informatics will act upon Policy violations when such are discovered during regular monitoring processes or reported to Core Informatics. Core Informatics expects you, and all other users of the Services, to take responsibility in using the Internet with courtesy and responsibility, and be familiar with and to practice good Internet etiquette.

As consideration for Core Informatics's provision of Services, you agree to abide by the following provisions relating to the acceptable use of your Core Informatics account.

Core Informatics reserves the right in its sole discretion to: Revise this Acceptable Use Policy which shall be posted at Core Informatics's web site; and Remove any content for any reason, including but not limited to, your violation of any conditions of this Acceptable Use Policy. Core Informatics's right to remove inappropriate content under this Policy shall not place an obligation on Core Informatics to monitor or exert editorial control over the content of your account. You agree not to use or allow access to Core Informatics services to:

1. Create or maintain software download or distribution sites or sites created for the purpose of mass distribution of software products. A software distribution site is defined as a site on which 50% or more of total bandwidth (data transfer) is used for programs or binary code downloads.

2. Create or maintain sites that generate system errors or exceptions that disrupt servers' performance or cause server-wide outages. This includes overriding or avoiding system settings and restrictions imposed by the terms of Services.

3. Create or maintain sites that consume 5% or more of CPU capacity or use 128 MB of Ram (memory), both physical and virtual combined, on the hosting server.

4. Exceed allowed bandwidth by transferring amounts of data greater than allowed by the terms of purchased Service.

5. Violate any applicable laws, regulations, or other provisions having the force of law, either intentionally or unintentionally.

6. Impersonate any person or entity or falsely state or otherwise misrepresent your affiliation with a person or entity.

7. Employ misleading e-mail addresses or falsify information in any part of any communication.

8. Upload, transmit, disseminate, post, store or post links to any content that: Prohibited from transmitting or posting by law, or by contractual or fiduciary relationship; Facilitates hacking or unauthorized access or use of data, systems, servers or networks including any attempt to probe, scan or test for vulnerabilities, or to breach security or authentication measures; Falsifies origin by forging TCP/IP packet headers, e-mail headers, or any part of a message header, unauthorized monitoring of data or traffic; Interferes with service to any user, system or network by using flooding techniques, overloading a system or a network, staging or broadcasting an attack, or any other means resulting in a crash of a host either deliberately or by negligence; Infringes or contributes to any infringement of any intellectual property, material protected by copyright, trademark, patent, trade secret or proprietary right of any party; Is or may be considered unsolicited or unauthorized advertising, promotional materials, or any junk mail, spam, spamvertisements, make money fast schemes, chain letters, pyramid schemes, or any other form of solicitation; Contains viruses, worms, Trojan horses, time bombs, trap doors, or any other computer code, files, or programs or repetitive requests for information designed to interrupt, destroy or limit the functionality of any computer software or hardware or telecommunications equipment; Is unlawful, harmful, threatening, abusive, harassing, tortious, unlawful, libelous, defamatory, vulgar, obscene, or invasive of privacy; Is of adult nature, pornographic, or harmful to minors; Promotes illegal activity, including providing instructions for illegal activity, or transmitting, disseminating or offering fraudulent goods, services, schemes or promotions, or furnishing false data on any signup form, contract or online application or registration, or the fraudulent use of any information obtained through the use of the Services including use of credit card numbers. Exploits the images of children or discloses personally identifiable information belonging to children.

Policies on Unlimited Disk Space Plans and Defining Unlimited
Core Informatics is committed in offering you the resources to grow and not charge you for resources such as disk space & bandwidth unless they are exploiting server resources or violating our FUP. Unlimited Plans does not mean you are able to use your hsoting in such a way that it negatively affects the server operation for illegal priposes, or or uses the resources in a way that affects our server stability/ performance or other users sharing the resources on the server.

To avoid too much consumption of resources by any single user Core Informatics has placed limits on the amount of a server's resources that any given user may consume and the same shall be applicable to you as well. While these are limits, server abuse is not limited to these policies and is up to Core Informatics ‘s discretion what constitutes server abuse.

On certain web hosting plans, Core Informatics does not place limits on the amount of particular resources a single client may use. Core Informatics makes every reasonable effort to provide clients with the disk space and bandwidth resources needed for their websites within the limitations of these Terms of Service. Core Informatics monitors all servers via automated and non-automated methods to help ensure no single client adversely impacts other clients located on the same server.

Please note that shared hosting plans are for website hosting, and the storage of backups, file repositories, MP3s, mp4, zip, videos, photo archives, and similar is strictly prohibited. Violators of this policy may have their accounts terminated without refund.

Fair Usage Policy (FUP)
A Fair Usage Policy (FUP) is necessary to ensure our hsoting servcies are used fairly and our services operate reliably for all our customers. Resources provided on our hosting services are governed by this Fair Usage Policy. We reserve the right to impose reasonable limits to reduce your usage or pair you with other users utilizing the same or nearly the same amount of usage if we believe your excessive usage is afffecting Core Informatics's services/systems or other users.

The client whom, in our reasonable opinion that have breached this FUP will be contacted by EMAIL and ask to upgrade his/her plan to a new dedicated server plan to reduce their excessive usage utilization. Core Informatics may also suspend that client account prior to notify that client if that action is needed to bring stability to our systems/servers. Client suspensions prior to notification by Core Informatics is rare and is only implemented in extreme circumstances and is intended to prevent the misue of our servers. What is deemed unappropriate or exsessive amount of resources will be determined by a number of factors including but not limited to our policies which includes the following:

Processes

  • Processes invoked by the web server, cron, shell or any other method should not exceed the following limitations:
  • Consume more than 128 MB of Ram
  • Utilize in excess of 15 seconds of CPU time.
  • Number of open files should not exceed 64.
  • Create core dumps.
  • Number of simultaneous processes should not exceed 10.
  • Execute a script/binary that forks in a way to create a fork bomb.
  • Programs may not run in the background or listen on a network port. If you require a bot, service or daemon, you should consider a dedicated server, as very few shared web hosts allow this type of program.
  • Simultaneous IIS/Apache connections may not exceed 50 from one individual source at any given time.
  • Web processes should not fork or spawn subprocesses.

Files and Directories
Inode Limits on our Shared & Reseller Reseller Hosting
An inode is a data structure used to keep information about a file on your hosting account. The number of inodes indicates the number of files and folders you have. This includes everything on your account, emails, files, folders, anything you store on the server.

There is currently an limit of 100,000 inodes on our shared accounts.

What is the 100,000 inode limit?
Shared and Reseller servers only allow 100,000 files per cPanel/websitepanel account This is a "hard limit" meaning that while the limit is reached, i.e. the 100,000 file threshold it will no longer be included in our weekly backups. Additionally, if the account happens to exceed 110,000 files then it will be in violation of our Terms of Service and can result in possible suspension.

The total number of inodes in an account may not exceed 100,000. Every file (a webpage, image, email, php file, directory, etc.) on your account uses up one (1) inode. This is not something we actively enforce and it will only become an issue if a client is causing problems for other people on the server. We will of course notify you if this is the case with a full explanation.

A directory cannot contain more than 3,000 immediate child files. This includes subdirectories themselves, but does not include files contained within those directories.

Database Restrictions at Core Informatics
  • All users are restricted to 15 concurrent MySQL connections.
  • Database queries should not exceed 3,500 per hour.
  • Database changes (insert/update/delete) should not exceed 1,200 queries per hour.
  • Database servers should not be used as a hosted solution. Database access should only be used for the web site hosted by Core Informatics.
  • Remote database access is for administrative purposes only.

Email and Mailing Lists
Our attachment limit is 10 MB per email, you are now allowed to send files in excess of 10 MB.
  • The limit of of outbound mail is set to 25 recipients to maintain the server performance. You are allowed to send maximum 100/genuine-solicited mails/hour from your domain.
  • POP connections are limited to 60 per hour.
  • SMTP connections (outbound email connections) are limited to 100 per hour per server account.
  • Should not receive more than 100 bounced/undelivered emails in 60 minutes (from same domain/email hosted on our server) from 3rd party SMTP Relay server.
  • Mailing lists larger than 100 will require a semi dedicated, VPS, or dedicated server from us. Dividing one list into smaller parts to get around this limit is not allowed.
  • Any mailing list must be throttled so that it sends an email every 6 seconds at the very minimum. If the mailing list software you are using doesn't support throttling you must use something else. We do this as this keeps the server load from going very high and causing problems for other users. If you don't do this you will be suspended.
  • We do not allow you to send to a mailing list you were given or that you bought. This is spamming and we have zero tolerance for this.
  • No Direct SMTP mailing system scripts are permitted. Mail should be relayed through the local MTA.

Zero Tolerance Spam / Bulk Email Policy
We take a zero tolerance stance against sending of unsolicited e-mail, any type of bulk emailing, mass emailing and spam. "Safe lists" and "double opt-in" will be treated as spam. Any user who sends out spam or any type of bulk emails or attempted to be sent to or through any of our servers or bounced back emails more than throttling limits to any of our servers, will have their account terminated immediately without prior notice and INR 5000 as penalty will be imposed to reseller or account owner. Sites advertised via SPAM (Spamvertised) may not be hosted on our servers. This provision includes, but is not limited to SPAM sent via fax, email, instant messaging, or usenet/newsgroups. No organization or entity listed in the ROKSO may be hosted on our servers. Any account which results in our IP space being blacklisted will be immediately suspended and/or terminated and INR 5000 as penalty will be imposed to reseller or account owner. Core Informatics reserves the right to require changes or disable as necessary any web site, account, database, or other component that does not comply with its established policies, or to make any such modifications in an emergency at its sole discretion. Core Informatics reserves the right to charge the holder of the account used to send any unsolicited e-mail a clean up fee. This cost of the clean up fee is entirely at the discretion of Core Informatics.

If you send Spam or Bulk Email, your account will be closed. If a client you host in your account sends Spam or Bulk Email from Core Informatics or any 3rd party SMTP server, your client's site will be immediately and permanently closed. If extreme cases such as you disagree to comply our policy and proceed to legal implications then your account will also be closed. We do not and will not tolerate Spam or Bulk Email. It is your responsibility to make sure your clients realize that Spam or Bulk Email is not and will not be tolerated. Spam or Bulk Email is a waste of our network and system resources, and we are completely intolerant of anybody who sends or attempts to send Spam or Bulk Email.

If a spammer or bulk email sender is putting uptime or performance at risk by flogging the email services with outgoing/incoming/bounced spam or bulk emails, we have every legal right to terminate account immediately without prior notice receive payment from the spam or bulk email sender or the company represented within the spam or bulk email to cover the cost of the services rendered. This policy applies equally to Core Informatics customers and non-Core Informatics customers. Core Informatics reserves the right to block incoming email from any remote SMTP relay at any time for any reason. If a remote SMTP relay is misconfigured, spammers or bulk email sender will often exploit the remote relay to send thousands (sometimes millions. of spams. If a spammer or bulk email sender is abusing a remote SMTP relay to mail bomb domains at Core Informatics , Core Informatics will immediately block the IP of the SMTP relay that the spammer or bulk email sender is abusing. Core Informatics also subscribes to multiple RBLs (real-time blocking lists. to automatically block known open SMTP relays and known spamming relays. While this policy dramatically reduces the amount of spam or bulk email sent to Core Informatics, this may inadvertently block some legitimate email.

Policies on Cron Jobs
All cron jobs must be 'niced' to 15 or greater
A cron job should not execute more frequently than once every 15 minutes

Service Restrictions
Server Log
No server logs can be provided for the shared hosting account.

Backups
Core Informatics's servers are not allowed be used as a backup/storage system and only one cPanel/SiteAdmin backup for that same account is allowed.

Reselling
Reselling is not allowed on Shared hosting plans. If reselling is desired, a reseller plan must be purchased.

Chat Applications
All interactive chat web applications are strictly prohibited on Core Informatics's servers. This includes but is not limited to chat applications written in PHP, Perl, CGI, Python, Ruby, etc. in addition to IRC or IRC bots. Any web application that provides ‘real-time' chat is not permitted. Shoutboxes, Chatboxes and other web based chat programs other than those specifically provided by Core Informatics are prohibited.

Adult Content
Under no circumstance is pornography permitted, we do not allow any form of pornography, nudity, sex related content. Any adult-oriented e-commerce stores, and similar are allowed only if the content is legal in the India. Core Informatics will be the sole arbiter as to what constitutes a violation of this provision. Should you require hosting for adult oriented content, please contact a host who specializes in this hosting realm.

General Policies
  • Search Engine Optimization (SEO) farms or similar are strictly forbidden on Core Informatics's servers and networks. SEO farms create undue strain and resource abuse on any given server and affect all clients.
  • Banner rotation services and link exchange networks are not permitted.
  • Offering Image, File, Document and Data storage, and free hosting and email services are strictly prohibited.
  • Off-site media storage is not permitted.
  • Operating a public mirror site is not permitted.
  • Running a proxy or anonymizer, whether publicly accessible or protected, is not permitted.
  • Prime bank or bank debenture-related sites, lottery sites, muds or online RPGs, hate sites, hacker-related sites, sites promoting illegal activity, IP scanner or other hacking tools, mail bombing or spam scripts, or forums and websites that distribute or promote warez content are expressly forbidden.
  • Bit torrent applications, trackers, and clients as well as any file-sharing/peer-to-peer activities are forbidden.
  • The operation of gaming servers (such as but not limited to Minecraft, Counter-Strike, Half-Life, battlefield1492) are forbidden.
  • Web spiders and indexers are not permitted.
  • The abovementioned services / web content create undue system load on our servers and should only be run in a dedicated server environment. All violations will be shut down immediately and may result in account suspension and/or termination.

Dedicated Server Management
If the client had opted for server management services from Core Informatics then Core Informatics have an authority to curtail the root access of the server for the client. In case, client demands for root access in order to upload any applications or tamper with the server then Core Informatics will not be responsible for any mishappenings/server failure. The client will be solely responsible for the mishappenings and Core Informatics will not be liable for any support in order to restore the server to its previous state. Core Informatics Support team may ask for the appropriate amount, to be paid by client, in order to restore the server (only if the backup is available).

Dedicated Servers
Third party script installation is at client own risk. Core Informatics will not be responsible for any data loss/ security issues that occur due to the third-party software that client install at their end or get them installed by Core Informatics team.

Reseller hosting
Core Informatics will not entertain reseller's clients' queries, if resellers want their end users to be entertained by Core Informatics then there's a separate fee to be paid by reseller which can be obtained with the Sales team of Core Informatics upon request.

Security
You are responsible for any misuse of your account, even if the inappropriate activity was committed by a family member, guest, friend, or your employee. Therefore, you must take proper steps to ensure that others do not gain unauthorized access to your account. In addition, you may not use your account to breach security of another account or try to gain unauthorized access to another network or server.

Your password grants access to your account. It is your responsibility to keep your password secure.

Sharing your account access and passwords with unauthorized users is prohibited. You should take care to prevent others from using your account since you will be held responsible for such use.

You must adopt adequate security measures to prevent or minimize unauthorized use of your account.

Attempting to obtain another user's account password is strictly prohibited, and may result in termination of service.

You may not attempt to circumvent user authentication or security of any host, account or network. This includes, but is not limited to, accessing data not intended for you, logging into or making use of a server or account you are not expressly authorized to access, or probing the security of other networks. Use or distribution of tools designed for compromising security is prohibited. Examples of these tools include, however are not limited to cracking tools, password guessing programs or network probing tools.

You may not attempt to interfere with service to any host, user or network ("denial of service attacks"). This includes, but is not limited to, "flooding" of networks, attempts to "crash" a host and deliberate attempts to overload a service.

Users who violate network or systems security may incur civil or criminal civil liability. Core Informatics will cooperate fully with investigations of violations of network or system security at other sites, including cooperating with law enforcement authorities in the investigation of suspected criminal violations.

Network Performance
Core Informatics accounts operate on shared resources. Excessive use/abuse of these shared network resources by one customer may have a negative impact on all other subscribers or customers. Misuse of network resources in a manner which impairs network performance is prohibited by this policy and may result in termination of your account.

All Unlimited Disk Space Plan & Reseller Hosting Customer agrees that he/she shall not use more than 7% of CPU processing and /or More than 128 Mb of RAM on any of Core Informatics Shared hosting servers. Any violation of this policy may result in corrective action by Core Informatics, in its sole reasonable discretion, including assessment of additional standard charges, disconnection or discontinuance of any and all services, or termination of this service.

You are prohibited from excessive consumption of resources, including CPU time, disk space, memory, and session time. You may not use resource-intensive programs which negatively impact other customers or the performances of Core Informatics systems or networks. Core Informatics reserves the right to terminate or limit such activities.

If Core Informatics determines that you have violated the terms of this Acceptable Use Policy, that determination, made at Core Informatics sole discretion, is grounds for immediate termination of your Core Informatics account without notice or penalty to Core Informatics Jurisdiction and governing law.

Support Boundaries
Core Informatics, provides technical support to our subscribers at all times. We limit our technical support to our area of expertise. The following is our guidelines when providing support: Core Informatics provides support related to your server or virtual site physical functioning. Core Informatics does not offer tech support for application specific issues such as asp/asp.net/cgi/python/or any other programming, html or any other such issue. We only provide support on the softwares we installed during the server setup and provided by us, the support for the same is subject to the support policy of the principle software developers. Core Informatics does not provide technical support for YOUR customers. If you can email, we encourage you to email for assistance.

Renewal Notification Policy
With respect to domain name registration services, shared and reseller web hosting services, virtual private servers, dedicated servers, Core Informatics will send renewal notifications via emails and SMS anytime prior to each such account's expiration. In addition, if a service is not renewed, Core Informatics will email and SMS an additional renewal and relavent (such as suspension/termination) notification till 30 days after the expiration of such account. All renewal notifications will be sent to the primary contact for the account associated with the services purchased from Core Informatics.

The laws of India only and no other nation shall govern these terms.
The Parties agree to submit to the exclusive jurisdiction of the Courts located in Ahmedabad, Gujarat, India as regards any claims or matters arising under or in relation to these terms and conditions.

Download Detailed Acceptable Policy in PDF Format

Success Stories

Shailesh Kapoor
(CEO, Ormax Media Pvt. Ltd.)
We have enjoyed a great working with Raj and his team at Core Informatics over the past four years. One of the biggest advantages of working with Core Informatics is that you get all the solutions under one roof, be it website, software for our research products or any other kind of online-related support. We look forward to working with Core Informatics on many new initiatives we are planning for the future.

Follow us on:
Core Informatics on Facebook Core Informatics on Twitter
Share This
Copyright © 2018, Core Informatics. All Rights Reserved.  |  Contact Us  |  Sitemap  |  Legal Policies
Website Design India | Web Design Services India | Website Redesigning | Wordpress Customization | PSD to XHTML Conversion | Flash Animation Services | Website Design Portfolio | Hire Dedicated Web Designers | Website Hosting Services | Web Development India | Web Development Services | PHP Development | Ecommerce Web Development | Joomla Customization | Hire Dedicated Web Developers | Hire Dedicated PHP Developers | Website Development Portfolio | SEO Company India | SEO Services India | PPC Advertising India | SMO Services India | Hire Dedicated SEO Experts
® 2016 Core Informatics and the Core Informatics Logo are registered trademarks of Core Informatics.