This AUP governs the use of My Company's web hosting service. Violation of this AUP may result in suspension or termination of your service. In the event of a dispute between you and My Company regarding the interpretation of this AUP, My Company's interpretation, in its reasonable commercial judgment, shall govern.

The following is the entire Acceptable User Policy ('AUP') agreement between My Company and the personal or corporate account holder. My Company provides World Wide Web Hosting, web design and script installation. My Company has certain legal and ethical responsibilities consisting with the use of its servers and equipment involved in these services. My Company's general policy is to act as a provider of Internet presence. My Company reserves the rights to suspend or cancel a customer's access to any or all services provided by My Company when we decide that the account has been inappropriately used.

Personal identification information

Users may, however, visit our Site anonymously.

My Company is a shared web hosting service, which means that a number of customers' web sites and other email or storage services are hosted from the same server. My Company uses abuse controls to help ensure that use of our services does not adversely affect the performance of our system or other customers' sites. It is not appropriate to use an account primarily as an online storage space or for archiving electronic files.

We will collect personal identification information from Users only if they voluntarily submit such information to us. Users can always refuse to supply personally identification information, except that it may prevent them from engaging in certain Site related activities

Non-personal identification information

We may collect non-personal identification information about Users whenever they interact with our Site. Non-personal identification information may include the browser name, the type of computer and technical information about Users means of connection to our Site, such as the operating system and the Internet service providers utilized and other similar information.

My Company Customers may not initiate the following (below), if any customer does My Company may terminate the account with no refund. Depending on the situation there will/won't be warnings sent.
a) Use 25% or more of system CPU resources for longer then 90 seconds or 1% of the servers CPU resources for longer than 5 minutes. There are numerous activities that could cause such problems; these include: CGI scripts, FTP, PHP, HTTP, etc.
b) Use of any kind of distributed computing software, including but not limited to SETI@home, Node Zero and Folding@home.
c) Run any type of interactive real-time chat applications that require server resources. Remotely-hosted services are fully allowed.
d) Run stand-alone, unattended server-side processes at any point in time on the server. This includes any and all daemons.
e) Run any software that interfaces with an IRC (Internet Relay Chat) network.
f) Run any file sharing, bit torrent or other P2P network services, client or server software.
g) Run any gaming servers such as counter-strike, half-life, battlefield 1492 etc

Web browser cookies

Our Site may use "cookies" to enhance User experience. User s web browser places cookies on their hard drive for record-keeping purposes and sometimes to track information about them. User may choose to set their web browser to refuse cookies, or to alert you when cookies are being sent. If they do so, note that some parts of the Site may not function properly.

How we use collected information

netsco collects and uses Users personal information for the following purposes:

  • To improve customer service Your information helps us to more effectively respond to your customer service requests and support needs.
  • To personalize user experience We may use information in the aggregate to understand how our Users as a group use the services and resources provided on our Site.
  • To improve our Site We continually strive to improve our website offerings based on the information and feedback we receive from you.
  • To send periodic emails

Unlimited

The email address Users provide for order processing, will only be used to send them information and updates pertaining to their order. It may also be used to respond to their inquiries, and/or other requests or questions. If User decides to opt-in to our mailing list, they will receive emails that may include company news, updates, related product or service information, etc. If at any time the User would like to unsubscribe from receiving future emails, we include detailed unsubscribe instructions at the bottom of each email or User may contact us via our Site.

How we protect your information

We adopt appropriate data collection, storage and processing practices and security measures to protect against unauthorized access, alteration, disclosure or destruction of your personal information, username, password, transaction information and data stored on our Site.

Sensitive and private data exchange between the Site and its Users happens over a SSL secured communication channel and is encrypted and protected with digital signatures. Our Site is also in compliance with PCI vulnerability standards in order to create as secure of an environment as possible for Users.

Third party websites

Users may find advertising or other content on our Site that link to the sites and services of our partners, suppliers, advertisers, sponsors, licensors and other third parties. We do not control the content or links that appear on these sites and are not responsible for the practices employed by websites linked to or from our Site. In addition, these sites or services, including their content and links, may be constantly changing. These sites and services may have their own privacy policies and customer service policies. Browsing and interaction on any other website, including websites which have a link to our Site, is subject to that website\'s own terms and policies.

Changes to this privacy policy

netsco has the discretion to update this privacy policy at any time. When we do, post a notification on the main page of our Site,revise the updated date at the bottom of this page,. We encourage Users to frequently check this page for any changes to stay informed about how we are helping to protect the personal information we collect. You acknowledge and agree that it is your responsibility to review this privacy policy periodically and become aware of modifications.

Your acceptance of these terms

By using this Site, you signify your acceptance of this policy and terms of service. If you do not agree to this policy, please do not use our Site. Your continued use of the Site following the posting of changes to this policy will be deemed your acceptance of those changes.

Contacting us

If you have any questions about this Privacy Policy, the practices of this site, or your dealings with this site, please contact us at:

Netsco

http://netsco.com/
2 rue des halles 95210 saint gratien France
info@netsco.com

Other

You must have valid and current information on file with your domain name registrar for any domain hosted on the My Company network.

Disclaimer

My Company is under no duty, and does not by this AUP undertake a duty, to monitor or police our customers' activities and disclaims any responsibility for any misuse of the My Company network.

Internet Abuse

You may not engage in illegal, abusive, or irresponsible behavior, including:

a) Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures (including those belonging to My Company and its customers) without express authorization of the owner of the system or network;
b) monitoring data or traffic on any network or system without the authorization of the owner of the system or network;
c) Interference with service to any user, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks;
d) Use of an Internet account or computer without the owner's authorization, including, but not limited to Internet scanning (tricking other people into releasing their passwords), password robbery, security hole scanning, and port scanning;
e) Forging of any TCP-IP packet header or any part of the header information in an e-mail or a newsgroup posting; or
f) Any conduct that is likely to result in retaliation against the My Company network.
g) Use of My Company's network in a way that unreasonably interferes with My Company's other customers use of the network

Newsgroup, Chat Forums, Other Networks