Terms of Service

Acceptable Use Policy 2017

These terms are automatically put in place when a customer decides to use our service 

• You agree that you will NOT use the Services to:
o Violate any applicable local, state or federal law or regulation, including,

but not limited to, any copyright, trademark, patent, anti-piracy, or other intellectual property law or regulation, or any export control or child pornography law, or encourage or enable others to violate any such law or regulation.

o Transmit, distribute, publish, post, store, link, or otherwise traffic in information, software, or material that:

2.1. Constitutes, depicts, fosters, promotes or relates in any manner to child pornography, child erotica, bestiality, or non-consensual sex acts, or is otherwise obscene.

2.2. Encourages, glorifies, incites, or promotes illegal activity or drug use, excessive violence or cruelty, or Ponzi-type schemes.

2.3. Is fraudulent or facilitates phishing, hacking, or identity theft, or attempts to impersonate the identity of a third party.

2.4. Infringes upon a third-party business, intellectual property, contractual, privacy, or fiduciary right or improperly exposes trade secrets or other confidential or proprietary information.

2.5. Contains malicious applications or code of any type.

2.6. Makes or facilitates any form of computer, server, or network attack or disruption.

2.7. Compromises, disrupts, or degrades the normal and proper operation of any computer, server, or Internet system, including Uganda Hosting systems.

 

2.8. Is defamatory, libelous, threatening, harassing or abusive.o Send, post, host, enable, or facilitate any types of mail-bombs or SPAM (“SPAM” is defined as any type of unsolicited e-mail).

 

 

o Use or provide open proxies or Internet Relay Chat (IRC).
o Host any type of servers or other server applications that are frequent

targets of denial of service (DDoS) attacks or other types of attacks.
o Collect personal information such as email addresses, screen names or

other personally identifiable information without the consent of the party so identified.
 host any type of servers or other server applications that are frequent targets of denial of service (DDoS) attacks or other types of attacks.
6. Collect personal information such as email addresses, screen names or other personally identifiable information without the consent of the party so identified.

7)A late payment will be added to invoices if customer fails to pay before due date 

8) Uganda Hosting Limited reserves the right to change these agreements, without informing the client.