RESOURCE USAGE Sample Clauses

RESOURCE USAGE. You agree that if your web site abuses shared server resources (such as, but not limited to CPU time, disk I/O, and network resources), it can be suspended without notice, and you may be given an option of either upgrading your service level or reducing the resource used to an acceptable level. You agree that by enabling Shell Access (SSH) on your shared hosting account you agree to the following: Lithium Hosting, llc may monitor all activity by logging keystrokes or mirroring SSH sessions. You agree not to tunnel traffic through Lithium Hosting, llc's servers and network. You agree not to attempt to circumvent server or network security or the security of other customer accounts. You will not attempt to install software or make changes to already installed software. You agree not to use SSH to instantiate long running processes or daemonized processes. Lithium Hosting, llc reserves the right to remove SSH access at any time for any reason. Your use of SSH access constitutes agreement to these terms.
AutoNDA by SimpleDocs
RESOURCE USAGE. User may not:
RESOURCE USAGE. Webdukes’s Customers may not initiate the following practices. Webdukes reserves the right to suspend or terminate accounts found in violation of these items with or without prior notice given and without liability. Webdukes reserves the right to determine what constitutes resource abuse and take the appropriate action. In specific, you may not: Use twenty-five percent (30%) or more of our system resources for longer than ninety (90) seconds in any consecutive 3 hour period. Activities that could cause this excessive use, include but are not limited to: CGI scripts, FTP, PHP, HTTP, etc. Run stand-alone, unattended server-side processes at any point in time on the server. This includes any and all daemons, such as IRCD. Run any type of web spider or indexer (including Google Cash / AdSpy) on shared hosting servers. Run any software that interfaces with an IRC (Internet Relay Chat) network. Run any bit torrent application, tracker, or client. You may link to legal torrents off-site, but may not host a web page or store them on our shared servers. Participate in any file-sharing/peer-to-peer activities Run any gaming servers such as counter-strike, half-life, battlefield1942, etc. Run cron entries with intervals of less than fifteen (15) minutes. Run any MySQL queries longer than fifteen (15) seconds. MySQL tables should be indexed appropriately. Include the URL when using PHP include functions for including a local file. Instead of including ‘xxxx://xxxxxxxxxx.xxx/include.php’, use ‘include.php’ or ‘/home/username/public_html/include.php’. Force html to handle server-side code (like php and shtml) to help reduce usage. Use https protocol unless it is necessary; encrypting and decrypting communications is noticeably more CPU-intensive than unencrypted communications. Network Abuse: Webdukes does not allow, condone or authorize any forms of Network Abuse including but not limited to Denial of Service attacks, Phishing attempts, port scans, SYN Floods etc. Webdukes reserves full right to determine what constitutes Network Abuse and take the appropriate action against the Customer with or without prior notification and without liability. You may not engage in illegal, abusive, or irresponsible behaviour, including but not limited to: Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures (including those belonging to Webduke...
RESOURCE USAGE. Any and all allocated resources provided to the customer to allow for the storage and delivery of the web based content within a hosting service. This includes but is not limited to disk space, Memory, CPU, Bandwidth
RESOURCE USAGE. The Customer will be provided with an account with specified disk space and data transfer allocations. The disk space used by the account includes all files related to the website, including but not necessarily limited to email storage, Content Management System files, and log files. The Customer will be sent a warning email if their usage exceeds 80% of the designated limit. The data transfer use is a measure of all data transfer both inbound and outbound from the Customer’s account. This includes data transfer used for HTTP, Email and FTP purposes. In order to ensure continuity of service should a spike in traffic occur, Adept will not limit data transfer usage, however should the Customer exceed the designated data transfer allowance, additional fees will be charged. The Customer will be sent a warning email if their usage exceeds 80% of the designated monthly limit. The Customer must not run, or allow to be run, any system intensive processes that could potentially affect the level of service provided to other customers of the system. Should Adept find a Customer is using a disproportionate amount of system resources, Adept reserves the right to disable the offending facility, or if necessary the offending site. If the Customer exceeds the allocated amount of data transfer for their Service in any calendar month, additional data will be charged at the following rates: Up to 1Gb: £7.50, Next 24Gb: £2 per Gb. Any additional overage: £1.50 per Gb. Disk space usage is recorded daily. If the Customer exceeds the allocated amount of disk space for their Service on more than 2 days in any calendar month, additional storage will be charged based on the peak usage at £2.50 per 100mb (or part of) per month. Where a customer is regularly using in excess of their allocated data transfer and disk space allowances, Adept may offer the customer an upgraded package or add-ons to the existing package part way through the term. Any upgrade applied will be charged pro-rata. If an account is using over its allocation of resources at the renewal date, the account will be upgraded to an appropriate package, and the new fee applied. On upgrading to an Adept Complete hosting package, the account will be subject to a new 12 month minimum term.
RESOURCE USAGE. EndLayer users may not misuse resources in the following ways:  Use CGI scripts, HTTP, PHP FTP or any other activities that occupy 25% or more of system resources for over 90 seconds.  Run unattended, standalone server-side processes, including daemons like IRCD, on the server.  Run indexers or web spiders (e.g., AdSpy/Google Cash) on shared EndLayer servers.  Run software interfacing with any Internet Relay Chat (IRC) network.  Run bit torrent clients, trackers or applications (you may provide links to off-site legal torrents, but may not host them on EndLayer servers).  Engage in peer-to-peer/file-sharing activities.  Run gaming servers (e.g., battlefield1942, half-life, counter-strike).  Run cron entries in less than 15-minute intervals.  Run MySQL queries that exceed 15 seconds.  Run inappropriately indexed MySQL tables.  Force HTML to handle server-side code (e.g., PHP, SHTML).  Use unnecessary https protocol (encrypted communications are extremely CPU-intensive). EndLayer does not allow any of the following content, or links to such content, to be published on EndLayer’s network:  Content of a pornographic, sexually explicit, or violent nature.  “Hate” sites or content that could be reasonably considered as slanderous or libelous.  Content of an illegal nature (including stolen copyrighted material) or content promoting illegal activitiesPirated software sites. Clients posting any of the above content on their sites will be notified using client's current email address on file, and may be suspended or given a time frame to take corrective actions. If no corrective actions are taken, EndLayer will suspend the services of the hosting account until a resolution is met. A repeated violation of this Policy may cause cancellation of service without refund of any fees. EndLayer does not support unsolicited email messages sent by Clients through our systems (also known as junk email or SPAM). Clients sending unsolicited email messages from our system, or through other systems with messages referencing their website, will have all of their services temporarily suspended. They will then be contacted by EndLayer and informed of the suspension before having their services reinstated. A repeated violation may cause cancellation of service without refund of any fees. Notwithstanding, EndLayer reserves the right to restrict, suspend or cancel accounts for any user, at any time. Customers found using our system for illegal activities, including but...
RESOURCE USAGE. FARMERS reserves the right to impose limits on the total amount of disk space and other resources available for your use on FARMERS operated computers. FARMERS reserves the right to delete, without notice, personal e-mail files that have not been accessed for more than one month. Disk space for storage of web pages is available in amounts specific to each Internet service package. Use of excess space will be charged on a monthly basis according to rates and prices published online at the time of use. FARMERS reserves the right to remove files that exceed allowed limits. Electronic mail passes through multiple mail servers on the Internet as it passes from source to destination. Privacy can never be guaranteed from every possible mail server; therefore, users seeking total privacy should use some encryption scheme to render messages unreadable. With regards to FARMERS’ mail servers, FARMERS places a high value on privacy and will only examine users' mail when absolutely required, for example when troubleshooting e-mail delivery problems or being presented with a search warrant for the information. FARMERS bears certain legal liabilities for the use of its computer network and equipment. As such, FARMERS prohibits any and all use of FARMERS’ network for illegal purposes. When presented with a search warrant, FARMERS is obligated to release any information named therein, and will cooperate with authorities in any criminal investigation of inappropriate Internet usage. However, FARMERS recognizes that the legal status of the Internet has not yet been resolved satisfactorily, either through legislation or court precedent. Therefore, FARMERS must make certain decisions regarding the illegality of various specific actions. Among the actions FARMERS considers illegal and therefore will not allow on its network are: unauthorized distribution of copyrighted material; exploitation of minors; and unauthorized use of computer resources. FARMERS believes the First Amendment rights of free speech, freedom of the press and freedom of association apply to the Internet to the same degree as they do to print media and that any attempt to infringe upon those rights is void of legitimacy.
AutoNDA by SimpleDocs
RESOURCE USAGE. All hosting services purchased have a variety of resource limitations applied in accordance to the applicable plan associated with the service. It is The Customer’s responsibility to ensure their hosting service does not exceed the resources allocated and to upgrade their service if it is determined more resources are required to continue the smooth operation of a hosting service.
RESOURCE USAGE. User may not: o Use 25% or more of system resources for longer than 90 seconds. Run stand-alone, unattended server-side processes at any point in time on the server. This includes any and all daemons, such as IRCD. o Run any type of web spider or indexer (including Google Cash / AdSpy) on shared servers. o Run any software that interfaces with an IRC (Internet Relay Chat) network on shared servers. o Run any bit torrent application, tracker, or client. You may link to legal torrents off-site, but may not host or store them on our shared servers. o Participate in any file-sharing/peer-to-peer activities on shared servers. o Run any gaming servers such as counter-strike, half-life, battlefield1942, etc on shared servers – game servers are obviously excluded o Run cron entries with intervals of less than 5 minutes. o Run any MySQL queries longer than 15 seconds. MySQL tables should be indexed appropriately. o When using PHP include functions for including a local file, include the local file rather than the URL. Instead of include(“xxxx://xxxxxxxxxx.xxx/include.php”) use include(“include.php”) o To help reduce usage, do not force html to handle server-side code (like php and shtml).
RESOURCE USAGE. Customers are required to utilize server resources in an efficient and responsible manner. Excessive use of server CPU and memory resources by a customer can interfere with or prevent normal service performance for other customers. Additional information about our policy on CPU, Bandwidth and Disk Usage can be found here. The governing law and jurisdiction provision as set forth in Section 24(a) shall apply to all Subscribers. For Subscribers who purchased or signed up for Signon Africa Communications Ltd Services after April 1, 2017, the arbitration clause in Section 24(b) shall also apply. This Agreement is an agreement between Signon Africa Communications Ltd. (“us,” “we,” or “Signon Africa Communications Ltd”) and you ("Subscriber" or "you" and "your"). This Agreement sets forth the general terms and conditions of your use of the products and services made available by Signon Africa Communications Ltd and through the Signon Africa Communications Ltd website (collectively, the "Services"). By using the Services, you agree to be bound by this Agreement. Please read this Agreement carefully. We may in our sole discretion change or modify this Agreement at any time. We will post a notice of any significant changes to this Agreement on the Signon Africa Communications Ltd website for at least thirty (30) days after the changes are posted and will indicate at the bottom of this Agreement the date these terms were last revised. Any changes or modifications to this Agreement shall be effective and binding on you as of the date indicated in a notice posted on this page. If no date is specified, your use of the Services after such changes or modifications shall constitute your acceptance of the Agreement as modified. If you do not agree to abide by this Agreement, you are not authorized to use or access the Services and your sole remedy is to cancel your account.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!