This Acceptable Use Policy applies to all persons and entities (collectively, "customers") using the products and services of Hypernia Communications, Inc., ("Hypernia") including Internet service. The policy is designed to protect the security, integrity, reliability, and privacy of both the Hypernia network and the products and services Hypernia offers to its customers. Hypernia reserves the right to modify this policy at any time, effective immediately upon posting of the modification. Your use of Hypernia's products and services constitutes your acceptance of the Acceptable Use Policy in effect at the time of your use. You are solely responsible for any and all acts and omissions that occur during or relating to your use of the service, and you agree not to engage in any unacceptable use of the service.

What Uses are Prohibited? 
Unacceptable use includes, but is not limited to, any of the following:

  1. Posting, transmission, re-transmission, or storing material on or through any of Hypernia's products or services, if in the sole judgment of Hypernia such posting, transmission, re-transmission or storage is: (a) in violation of any local, state, federal, or non-United States law or regulation (including rights protected by copyright, trade secret, patent or other intellectual property or similar laws or regulations); (b) threatening or abusive; (c) obscene; (d) indecent; or (e) defamatory. Each customer shall be responsible for determining what laws or regulations are applicable to his or her use of the products and services.
  2. Installation or distribution of "pirated" or other software products that are not appropriately licensed for use by customer.
  3. Resale of Hypernia’s products and services without the express prior written consent of Hypernia (unless you are an authorized wholesaler).
  4. Deceptive marketing practices.
  5. Actions that restrict or inhibit anyone - whether a customer of Hypernia or otherwise - in his or her use or enjoyment of Hypernia's products and services, or that generate excessive network traffic through the use of automated or manual routines that are not related to ordinary personal or business use of Internet services.
  6. Introduction of malicious programs into the Hypernia network or servers or other products and services of Hypernia (e.g., viruses, trojan horses and worms).
  7. Causing or attempting to cause security breaches or disruptions of Internet communications. Examples of security breaches include but are not limited to accessing data of which the customer is not an intended recipient, or logging into a server or account that the customer is not expressly authorized to access. Examples of disruptions include but are not limited to port scans, flood pings, packet spoofing and forged routing information.
  8. Executing any form of network monitoring that will intercept data not intended for the customer.
  9. Circumventing user authentication or security of any host, network or account.
  10. Interfering with or denying service to any user other than the customer's host (e.g., denial of service attack).
  11. Using any program/script/command, or sending messages of any kind, designed to interfere with, or to disable a user's terminal session.
  12. Failing to comply with Hypernia's procedures relating to the activities of customers on Hypernia-owned facilities.
  13. Furnishing false or incorrect data on the order form contract (electronic or paper) including fraudulent use of credit card numbers or attempting to circumvent or alter the processes or procedures to measure time, bandwidth utilization or other methods to document "use" of Hypernia's products or services.
  14. Sending unsolicited mail messages, including the sending of "junk mail" or other advertising material to individuals who did not specifically request such material, who were not previous customers of the customer or with whom the customer does not have an existing business relationship (e.g., E-mail "spam"); or distributing, advertising or promoting software or services that have the primary purpose of encouraging or facilitating unsolicited commercial E-mail or spam.
  15. Harassment, whether through language, frequency, or size of messages.
  16. Unauthorized use or forging of mail header information.
  17. Solicitations of mail or any other E-mail address other than that of the poster's account or service, with the intent to harass or collect replies.
  18. Creating or forwarding "chain letters" or other "pyramid schemes" of any type.
  19. Use of unsolicited E-mail originating from within the Hypernia network or networks of other Internet Service Providers on behalf of or to advertise any service hosted by Hypernia or connected via the Hypernia network.
  20. Exporting, re-exporting, or permitting downloads of any content in violation of the export or import laws of the United States or without all required approvals, licenses and exemptions.

No failure or delay in exercising or enforcing this policy shall constitute a waiver of the policy or of any other right or remedy. If any provision of this policy is deemed unenforceable due to law or change in law, such a provision shall be disregarded and the balance of the policy shall remain in effect.

This Acceptable Use Policy applies to all persons and entities (collectively, “customers”) using the products and services of Hypernia Communications, Inc., (“Hypernia”) including Internet service. The policy is designed to protect the security, integrity, reliability, and privacy of both the Hypernia network and the products and services Hypernia offers to its customers. Hypernia reserves the right to modify this policy at any time, effective immediately upon posting of the modification. Your use of Hypernia’s products and services constitutes your acceptance of the Acceptable Use Policy in effect at the time of your use. You are solely responsible for any and all acts and omissions that occur during or relating to your use of the service, and you agree not to engage in any unacceptable use of the service.

What Uses are Prohibited? 
Unacceptable use includes, but is not limited to, any of the following:

  1. Posting, transmission, re-transmission, or storing material on or through any of Hypernia’s products or services, if in the sole judgment of Hypernia such posting, transmission, re-transmission or storage is: (a) in violation of any local, state, federal, or non-United States law or regulation (including rights protected by copyright, trade secret, patent or other intellectual property or similar laws or regulations); (b) threatening or abusive; (c) obscene; (d) indecent; or (e) defamatory. Each customer shall be responsible for determining what laws or regulations are applicable to his or her use of the products and services.
  2. Installation or distribution of “pirated” or other software products that are not appropriately licensed for use by customer.
  3. Resale of Hypernia’s products and services without the express prior written consent of Hypernia (unless you are an authorized wholesaler).
  4. Deceptive marketing practices.
  5. Actions that restrict or inhibit anyone – whether a customer of Hypernia or otherwise – in his or her use or enjoyment of Hypernia’s products and services, or that generate excessive network traffic through the use of automated or manual routines that are not related to ordinary personal or business use of Internet services.
  6. Introduction of malicious programs into the Hypernia network or servers or other products and services of Hypernia (e.g., viruses, trojan horses and worms).
  7. Causing or attempting to cause security breaches or disruptions of Internet communications. Examples of security breaches include but are not limited to accessing data of which the customer is not an intended recipient, or logging into a server or account that the customer is not expressly authorized to access. Examples of disruptions include but are not limited to port scans, flood pings, packet spoofing and forged routing information.
  8. Executing any form of network monitoring that will intercept data not intended for the customer.
  9. Circumventing user authentication or security of any host, network or account.
  10. Interfering with or denying service to any user other than the customer’s host (e.g., denial of service attack).
  11. Using any program/script/command, or sending messages of any kind, designed to interfere with, or to disable a user’s terminal session.
  12. Failing to comply with Hypernia’s procedures relating to the activities of customers on Hypernia-owned facilities.
  13. Furnishing false or incorrect data on the order form contract (electronic or paper) including fraudulent use of credit card numbers or attempting to circumvent or alter the processes or procedures to measure time, bandwidth utilization or other methods to document “use” of Hypernia’s products or services.
  14. Sending unsolicited mail messages, including the sending of “junk mail” or other advertising material to individuals who did not specifically request such material, who were not previous customers of the customer or with whom the customer does not have an existing business relationship (e.g., E-mail “spam”); or distributing, advertising or promoting software or services that have the primary purpose of encouraging or facilitating unsolicited commercial E-mail or spam.
  15. Harassment, whether through language, frequency, or size of messages.
  16. Unauthorized use or forging of mail header information.
  17. Solicitations of mail or any other E-mail address other than that of the poster’s account or service, with the intent to harass or collect replies.
  18. Creating or forwarding “chain letters” or other “pyramid schemes” of any type.
  19. Use of unsolicited E-mail originating from within the Hypernia network or networks of other Internet Service Providers on behalf of or to advertise any service hosted by Hypernia or connected via the Hypernia network.
  20. Exporting, re-exporting, or permitting downloads of any content in violation of the export or import laws of the United States or without all required approvals, licenses and exemptions.

No failure or delay in exercising or enforcing this policy shall constitute a waiver of the policy or of any other right or remedy. If any provision of this policy is deemed unenforceable due to law or change in law, such a provision shall be disregarded and the balance of the policy shall remain in effect.

Virtual Private Servers

  1. The supplier provides Virtual Private Servers (VPS) which are accessed via TCP/UDP.
  2. All content on customer VPS remain the responsibility of the customer, and will be liable for any costs incurred from over-usage or misuse.
  3. Any Virtual Servers (VPS) using high usage of CPU, HDD I/O or Bandwidth can be suspended or terminated without notice.
  4. In order to maintain a stable virtual server environment for everyone, by using our VPS service you agree not to use the equivalent of a full CPU core for yourself continuously. We allow temporarily bursting to higher than this, as we operate on a fair share CPU policy. If you require and plan to use excessive CPU usage on a long term basis, Virtual currency miners and other forms of CPU mining are strictly prohibited on our VPS plans.
  5. Should you exceed your allocated bandwidth limit overage fees will apply. Over usage is charged per GB. If the first incident of overuse does not exceed the bandwidth limit, the fees will be waived.
  6. The supplier reserves the right to delete without prior warning any files which violate the below terms. The supplier also reserves the right to modify, suspend or terminate your service at their discretion.
  7. We do not allow IRC, Bittorrents or Warez Linking. IRC ports are filtered out on all of our host machines, and any user found to be using their VPS for IRC, Bittorrents, Warez Linking or any other illegal activity will be terminated.

Abusable Resources 
Upon notification of the existence of an abusable resource (e.g., open news server, unsecured mail relay, or smurf amplifier), the customer shall immediately take all necessary steps to avoid any further abuse of such resource. Any abuse of an open resource that occurs after the customer has received such notification shall be considered a violation of this policy and enforced as such.

Enforcement
Hypernia may immediately suspend and/or terminate the customer's service for violation of any provision of this policy upon verbal or written notice, which notice may be provided by voicemail or E-mail. Prior to suspension or termination, Hypernia attempts to work with our customers to cure violations of this policy and ensure that there is no re-occurrence; however, Hypernia reserves the right to suspend or terminate based on a first offense

It is important to note that many of these limits can be seen as “soft” limits. They are not actively enforced, and you can run up to or even over most of them without issue. If, however, you start to affect the overall performance of a server, we do need to have limits and policies in place. Without them it’s incredibly hard to explain to the customer, in quantitative terms, exactly how a site is consuming too many system resources. If an account is found to be in violation of these Resource Usage Policies, we will do our best to work with clients to give 48 hours, 5 days, or 10 days notice depending on the severity of the violation. We reserve the right as outlined in the TOS to suspend a site if it is causing a severe problem.

Electronic Communications Privacy Act Notice 
Hypernia makes no guarantee of confidentiality or privacy of any information transmitted through or stored upon Hypernia technology, and makes no guarantee that any other entity or group of users will be included or excluded from Hypernia's network. In addition, Hypernia may periodically monitor transmissions over its network for maintenance, service quality assurance or any other purpose permitted by the Electronic Communications Privacy Act, P.L. No. 99-508, as amended.