- Responsibilty for Content
You, as a Client of WEF Consulting, are solely responsible for the content
stored on and served by your WEF Consulting account.WEF Consulting does not
exercise editorial control over the content of any Client web site, e-mail
transmission, newsgroups, or other material created or accessible over or
through the Services. However, in accordance with our TOS (Terms of Service),
we may remove any materials that, in our sole discretion, may be illegal, may
subject us to liability, or which may violate this AUP.
- No Illegal Content
All services provided by WEF Consulting may be used for lawful purposes only.
Transmission, storage, or presentation of any information, data or material in
violation of any United States Federal, State or City law is prohibited. This
includes, but is not limited to: copyrighted material, material we judge to be
threatening or obscene, or material protected by trade secrets and other
statutes. WEF Consulting is not responsible for any claims resulting from the
use of our Services. This is also true for sites that promote any illegal
activity or content that may be damaging to WEF Consulting servers or any other
server on the Internet. Links to such materials are prohibited. This includes,
but is not limited to illegal adult sites, warez/pirated software, serialz,
hacker programs/archives, and MP3 files.
- No Adult, Sexually Explicit, or Sex-Related Content
WEF Consulting services may not be used to store, post, display,
transmit, advertise, sell, link to, or otherwise make available adult, sexually
explicit, or sex-related content. We reserve the right to decide what is
considered "adult, sexually explicit, or sex-related content."
- No Child Pornography
The use of the Services to store, post, display, transmit, advertise or
otherwise make available child pornography is prohibited. WEF Consulting is
required by law, and will, notify law enforcement agencies when it becomes
aware of the presence of child pornography on, or being transmitted through,
- Multimedia Files
Multimedia files are defined as any audio and/or video files. Multimedia files
are allowed, however Client accounts are not to be used for the purposes of
distributing and storing unusual amounts of multimedia files. Any web site
whose disk space usage for storing multimedia files exceeds 75% of its total
usage, in terms of total size or number of files, will be considered to be
using an unusual amount of multimedia files. Multimedia files that the site
owner has clear and uncontested copyright will not be included in the total
- Zero Tolerance Spam Policy
Sending unsolicited bulk and/or commercial messages over the Internet (known as
"spamming") is strictly prohibited, regardless of whether or
not it overloads a server or disrupts service to WEF Consulting customers.
Using a domain name, an email address, or a web site that is hosted,
maintained, affiliated with WEF Consulting for spamming purposes is strictly
prohibited and will qualify your site for immediate deactivation with no
refund. The term "spamming" also includes, but is not limited to,
maintaining an open SMTP policy, engaging in spamming using the service of
another ISP and referencing in the spam a web site hosted on a WEF Consulting
server, and selling or distributing software (on a web site residing on a WEF
Consulting server) that facilitates spamming.
Additionally, claims investigated by WEF Consulting about spam from you or any
of your customers, will be fined and billed for such work. The fee for such an
instance if you are found to be at fault is $.50 per email sent and up to a
$500 fine per incident. WEF Consulting reserves the right to determine, in its
sole and absolute discretion, what constitutes a violation of this Zero
Tolerance Spam Policy provision.
- Bulk Email Policy
We also monitor "Bulk E-mail". Any email account sending over 1000
messages per day will be considered sending "Bulk E-mail". There are
some arrangements that can be made to accommodate a user with a large list
which includes extra fees and special mail scheduling software. There is a
limit of 250 email per hour that each domain can send out through SMTP.
- No Harm or Endangement to other people
You are prohibited from using the Services to harm, or attempt to harm, minors
in any way, including, but not limited to child pornography, or use our service
to transmit any material (by e-mail, uploading, posting or otherwise) that
threatens or encourages bodily harm or destruction of property.
- No Obscene, Defamatory, Abusive or Threatening Language
Use of the Services to store, post, transmit, d4isplay or otherwise make
available obscene, defamatory, harassing, abusive or threatening language is
prohibited.You may not use the Services to make any inappropriate communication
to any Newsgroup, Mailing List, Chat Facility, or other Internet Forum. In
addition, WEF Consulting will not tolerate any verbal abuse to it's staff
and/or customers. If such situations occur, WEF Consulting can and will
deactivate your account immediately without refund to the offender.
- Legal rights of others
Unacceptable activities in this regard include posting private information
about a person without their consent, infringing intellectual property rights,
defaming a person or business, and knowingly making available code which will
have a deleterious effect on third party computers. WEF Consulting supports
free speech on the Internet, and will not suspend or cancel a Client's account
simply because it disagrees with the views expressed by the Client. Where there
are allegations that a Client's on-line activity has violated the legal rights
of a third party, WEF Consulting will not substitute itself for a court of law
in deciding tort claims raised by the third party. You may not collect or
attempt to collect personally identifiable information of any person or entity
without their express written consent. You shall maintain records of any such
written consent throughout the terms of this agreement and for three years
- Misrepresentation of Transmission Information
Forging, misrepresenting, omitting, or deleting message headers, return mailing
information and/or Internet Protocol addresses to conceal or misidentify the
origin of an message is prohibited.
- No Viruses or Other Destructive Activities
Use of WEF Consulting's Services for creating or sending Internet viruses,
worms or Trojan horses, or for pinging, flooding or mailbombing, or engaging in
denial of service attacks is prohibited. It is also prohibited for any Client
to engage in other activity that is intended to disrupt or interfere with, or
that results in the disruption of or interference with, the ability of others
to effectively use the Services (or any connected network, system, service or
equipment) or conduct their business over the Internet.
- No Cracking, No Hacking
"Cracking/Hacking" and related activities is prohibited.
"Cracking/Hacking" includes, but is not limited to, the following
activities: illegally or without authorization, accessing computers, accounts
or networks belonging to another party, penetrating or attempting to penetrate
security measures of a system, port scans, stealth scans, and other information
gathering activities designed to assist in hacking.
- Export Control Violations
The exportation of encryption software outside of the United States and/or
violations of United States law relating to the exportation of software is
- Other Illegal Activity
The use of the Services to engage in any activities that are determined by WEF
Consulting, in its sole and absolute discretion, to be illegal is prohibited.
Such illegal activities include, but are not limited to, storing, posting,
displaying, transmitting or otherwise making available ponzi or pyramid
schemes, chain letter schemes, fraudulently charging credit cards or displaying
credit card information of third parties without their consent, and failure to
comply with applicable on-line privacy laws.
- Reporting Illegal Activity
WEF Consulting reserves the right to report illegal activities to any and all
regulatory, administrative, and/or governmental authorities for prosecution. We
will cooperate fully with appropriate law enforcement agencies in connection
with any and all illegal activities occurring on or through the Services.
Server and Network Resources
- System Resources
WEF Consulting accounts operate on shared network resources. Excessive use or
abuse of these resources by one client may have a negative impact on all other
clients and customers. Misuse of network resources in a manner which impairs
network performance is prohibited by this policy and may result in termination
of your account.
Any usage of fifteen percent (15%) or more of our system resources is an undue
burden on our system and is unacceptable. If your usage ever exceeds fifteen
percent (15%) of system resources, your account may be suspended and or
terminated immediately and without prior notice.
- Background Running Programs
WEF Consulting may allow programs to run in the background. However, these
programs will be considered on a case by case basis and an extra charge may be
incurred based on system resources used and operational maintenance needed.
Port forwarders are not allowed under any circumstances. If you wish to
run background programs please contact
WEF Consulting at
so that we can arrange set-up and fees.
- NO Internet Relay Chat (IRC)
WEF Consulting does not allow IRC or IRC bots to be operated on our servers by
any Client. If an IRC program is discovered, immediate termination will result
without warning. The following processes are illegal on our servers and will be
killed automatically: BitchX, bnc, eggdrop, guardservices, ircd, psyBNC,
ptlink, or like services.
- Chat Rooms
WEF Consulting does not allow Clients to install their own chat rooms. Chat
rooms tend to require significant system resources and therefore cannot be
permitted as an account option. WEF Consulting provides chat rooms that meet
most users' needs and run without hindering system performance.
- CGI Scripts
Any scripts that pose a potential security risk or are deemed to be adversely
affecting server performance or network integrity will be shut down or will be
automatically removed without prior notice. WEF Consulting does not permit CGI
script sharing with domains not hosted by WEF Consulting or any scripts that
may be abused for spamming purposes.
- SSH/Telnet Access
SSH access to our server is granted on a limited basis. To obtain SSH access
you need to send
a copy of the account holders photo ID. Also include justification to why you
need SSH access, we will then determine if we will grant SSH access to you.
There are very few vaild reasons for granting SSH access. Scripts such as
"phpshell" or "cgitelnet" are not allowed at all on our
servers. Any website found with this type of script installed will be
System Security and Network Abuse
- Account Security
The Client agrees that upon the assignment of your user ID and password that
you will maintain the confidentiality of your account information and assume
all responsibility of and from any loss, theft or other destruction of any data
as the result of any access to your account via the use of your user ID. You
are responsible for any misuse of your account, even if the inappropriate
activity was committed by a friend, family member, guest or employee.
Therefore, you must take necessary steps to ensure that others do not gain
unauthorized access to your account.
- System and Network Security
The Client is prohibited from violating or attempting to violate the security
of the WEF Consulting Network or cause harm to a server or customer of WEF
Consulting. Violations of system or network security are prohibited and may
result in criminal and civil liability. Examples of system or network security
violations include, without limitation the following: unauthorized access to or
use of data, systems or networks, including any attempt to probe, scan or test
the vulnerability of a system or network or to breach security or
authentication measures without express authorization of the owner of the
system or network; interference with service to any user, host or network
including, without limitation, mail bombing, flooding, deliberate attempts to
overload a system and broadcast attacks; forging of any TCP-IP packet header or
any part of the header information in an email or a newsgroup posting WEF
Consulting will investigate occurrences, which may involve such violations and
may involve, and cooperate with, law enforcement authorities in prosecuting
Clients who are involved in such violations.
- Network Disruptions
Use of our service for any activity which affects the ability of other people
or systems to access our Services or the Internet. This includes "denial
of service" (DOS) attacks against another network host or individual user.
Interference with or disruption of other network users, services or equipment
is prohibited. We will not tolerate any Client attempting to access the
accounts of others, or penetrate security measures of other systems, whether or
not the intrusion results in corruption or loss of data.
Copyright and Trademarks
- Single Account
You agree not to sublease your account, www.yourcompany.com/client,
or offer free space to other clients. WEF Consulting web hosting plans are for
single entity (user or company) only.
- Other Activities
Engaging in any activity that, in WEF Consulting's sole and absolute
discretion, disrupts, interferes with or is harmful to, or threatens to
disrupt, interfere with, or be harmful to the Services, WEF Consulting's
business, operations, reputation, goodwill, clients, customers and/or customer
relations, or the ability of other WEF Consulting's customers to effectively
use the Services is prohibited. Such prohibited activities include making
available any program, product or service that is designed to or could be used
to violate this Acceptable Use Policy. In addition, the failure by a Client to
cooperate with WEF Consulting in correcting or preventing violations of this
Acceptable Use Policy by, or that result from the activity of, a customer of
the Client is a violation of this Acceptable Use Policy.
- Activity Monitoring
In general, WEF Consulting does not monitor its Clients' websites or activities
to determine whether they are in compliance with this Acceptable Use Policy.
However, when WEF Consulting becomes aware of any violation of this AUP or the
Terms of Service Agreement, WEF Consulting may take any action to stop or
correct such violation, including, but not limited to, shutting down a website,
denying access to the Services or to the Internet, and/or removing information.
In addition, WEF Consulting may take action against a Client or a customer of
such Client because of the activities of such customer. WEF Consulting reserves
the right to take any such action even though such action may affect other
customers of the Client.
- Policy Revisions
WEF Consulting reserves the right to revise its policies at any time without
prior notice. A Client's use of the Services after revisions to the Acceptable
Use Policy are posted on WEF Consulting's website at
this location will constitute
acceptance of any changes or additions to the AUP. All Clients are subject to
the latest version of the AUP,
recommended that you view these pages periodically to see if any changes have
been made. By filling out an order form, purchasing an account, or paying for
an account, you automatically agree to these policies.
- Reporting Violatons
WEF Consulting requests that if you believe that there is a violation of this
AUP, direct the information to
. If possible, please provide the IP address used to commit the violation, date
and time of the violation, evidence of the violation and as much details as
If you have any question regarding these policies please feel free to contact
WEF Consulting at .
Last updated on January 17, 2016