Cloud Hosting Acceptable Usage Policy

1. Background.

Linux Tech imposes reasonable rules and regulations regarding the use of its services. Such rules and regulations are
called Acceptable Use Policies (AUPs) and are posted on the Linux Tech website. The AUPs are not exhaustive and
Linux Tech reserves the right to modify the AUPs at any time, effective upon either the posting of the modified AUPs to
or notification of the modified AUPs. By registering for and using Linux Tech’s services, you agree to abide by this AUP
and any service specific AUPs as modified from time to time. Any violation of this AUP and other respective service
specific AUPs may result in the suspension or termination of your account or such other action as deems
appropriate. An unlisted activity may also be a violation of the AUPs if it is illegal, irresponsible, or disruptive use of
the Internet. No credits will be issued for any interruption in service resulting from policy violations.

Violation of any AUP is strictly prohibited and may result in the immediate termination or suspension of the
services you receive from Linux Tech. You shall remain solely liable and responsible for your use of the services and
any and all content that you display, upload, download or transmit through the use of the services. “Content”
includes, without limitation, your emails, web pages, voice calls, SMS messages and domains names. It is Linux Tech’s
policy to terminate repeat infringers. Linux Tech reserves the right to refuse service to anyone at any time.

By using the Services provided by Linux Tech, you’ve indicated your full acceptance of the terms in this agreement, our “Acceptable Usage Policy” (AUP) and “Terms of Service” agreements, and you agree that is your responsibility to check the Linux Tech website for changes to these agreements.

2. Customer Security Responsibilities.

The customer is solely responsible for any breaches of security affecting servers under customer control. If a
customer’s server is involved in an attack on another server, network, system, account or person, it will be shut
down and an immediate investigation will be launched to determine the cause/source of the attack. In such an
event, the customer is responsible for the cost to rectify any damage done to the affected server, network, system, account or person and any other item affected by the security breach. Linux Tech’s labor used to rectify any such
damage is categorized as emergency security breach recovery and is currently charged at R 805.00 (ZAR) per hour.

3. System and Network Security

Violations of system or network security are prohibited, and may result in criminal and civil liability. Linux Tech may
investigate incidents involving such violations and may involve and will cooperate with law enforcement if a
criminal violation is suspected. Examples of system or network security violations include, without limitation, the
following:

(a) Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the
vulnerability of a system or network or to breach security or authentication measures without express
authorization of the owner of the system or network.

(b) Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner
of the system or network.

(c) Interference with service to any user, host or network including, without limitation, mailbombing, flooding, deliberate attempts to overload a system and broadcast attacks.

(d) Forging of any TCP-IP packet header or any part of the header information in an email or a newgroup posting.

Violators of the policy are responsible, without limitations, for the cost of labor to clean up and correct any damage
done to the operation of the network and business operations supported by the network, and to respond to
complaints incurred by Linux Tech. Such labor is categorized as emergency security breach recovery and is currently
charged at R 805.00 (ZAR) per hour required. Linux Tech is concerned with the privacy of online communications and
web sites. In general, the Internet is neither more nor less secure than other means of communication, including
mail, facsimile, and voice telephone service, all of which can be intercepted and otherwise compromised. As a
matter of prudence, however, Linux Tech urges its customers to assume that all of their online communications are
insecure unless transmissions are through an encrypted connection. Linux Tech cannot take responsibility for the
security of information transmitted over Linux Tech’s Cloud hosting facilities.

4. Password Protection

The customer is responsible for protecting their own passwords and for any authorized or unauthorized use made
of customers’ passwords. The customer will not use or permit anyone to use Linux Tech’s Cloud hosting service to
guess passwords or to access other systems or networks without authorization. Linux Tech will fully cooperate with
law enforcement authorities in the detection and prosecution of illegal activity.

5. Internet Etiquette

The customer is expected to be familiar with and to practice good Internet etiquette (Netiquette). The customer
will comply with the rules appropriate to any network to which Linux Tech may provide access. The customer should
not post, transmit, or permit Internet access to information the customer desires to keep confidential. The
customer is not permitted to post any material that is illegal, libelous, tortuous, indecently depicts children or is
likely to result in retaliation against Linux Tech by offended users. Linux Tech reserves the right to refuse or terminate
service at any time for violation of this section.

6. Copyright Infringement – Software Piracy Policy

The Linux Tech network may only be used for lawful purposes. Transmission, distribution, or storage of any
information, data or material in violation of United States or state regulation or law, or by the common law, is
prohibited. This includes, but is not limited to, material protected by copyright, trademark, trade secret, or other
intellectual property rights.

Making unauthorized copies of software is a violation of the law, no matter how many copies you are making. If you
copy, distribute or install the software in ways that the license does not allow, you are violating copyright law. If
caught with pirated software, you or your company may be liable under both civil and criminal law, and you may
be fined and/or receive a jail sentence. Linux Tech will cooperate fully with any civil and/or criminal litigation arising
from the violation of this policy.

7. Network Responsibility

Customers have a responsibility to use the Linux Tech Cloud platform and network responsibly. This includes
respecting the other customers of Linux Tech. Linux Tech reserves the right to suspend and or cancel service of any
Customer who uses the Linux Tech Cloud platform or network in such a way that adversely effects other Linux Tech
customers. This includes but is not limited to:

(a) Attacking or attempting to gain unauthorized access to servers and services that belong to Linux Tech or its
customers (i.e. computer hacking), and/or

(b) Participating in behavior which result in reprisals that adversely effect the Linux Tech network or other customers’ access to the Linux Tech network.

(c) Linux Tech will react strongly to any use or attempted use of an Internet account or computer without the owner’s
authorization. Such attempts include, but are not limited to, “Internet Scamming” or phishing (tricking other people
into releasing their passwords), password robbery, vulnerability scanning, port scanning, etc. Any unauthorized use
of accounts or computers by a Linux Tech customer, whether or not the attacked account or computer belongs to
Linux Tech, will result in severe action taken against the attacker. Possible actions include warnings, account
suspension or cancellation, and civil or criminal legal action, depending on the seriousness of the attack. Any
attempt to undermine or cause harm to a server, or customer of Linux Tech is strictly prohibited.

Linux Tech will cooperate fully with any civil and/or criminal litigation arising from the violation of this policy.

8. Lawful Purpose

All services may be used for lawful purposes only. Transmission, storage, or presentation of any information, data
or material in violation of any applicable law, regulation, or AUP is prohibited. This includes, but is not limited to:

(a) Copyrighted material or material protected by trade secret and other statute or dissemination of harmful or
fraudulent content.

(b) Using any Linux Tech service or product for the purpose of participating in any activity dealing with subject matters
that are prohibited under applicable law is prohibited.

Any conduct that constitutes harassment, fraud, stalking, abuse, or a violation of federal export restriction in
connection with use of Linux Tech services or products is prohibited. Using the Linux Tech network to solicit the
performance of any illegal activity is also prohibited, even if the activity itself is not performed. In addition, knowingly receiving or downloading a file that cannot be legally distributed, even without the act of distribution, is
prohibited.

Servers hosted within Linux Tech network are open to the public. You are solely responsible for your usage of the
Linux Tech network and servers and any statement you make on servers hosted within the Linux Tech network may be
deemed “publication” of the information entered. Acknowledging the foregoing, you specifically agree not to use
our service in any manner that is illegal or libellous.

9. Child Pornography on the Internet

Linux Tech will cooperate fully with any criminal investigation into a Customer’s violation of the Child Protection Act
concerning child pornography. Customers are ultimately responsible for the actions of their clients over the Linux Tech
Cloud platform and network, and will be liable for illegal material posted by their clients.

10. Unsolicited Commercial Email/Unsolicited Bulk Email (UCE/UBE) and SPAM

Unsolicited commercial email (UCE) is defined by Linux Tech as any electronic communication (email, ICQ, IRC, Instant
Messenger, voice calls etc…) sent for purposes of distributing commercial information of any kind, soliciting the
purchase or sale of products or services or soliciting any transfer of funds to a recipient who has not agreed to
receive such communication.

Unsolicited bulk email (UBE) is defined by Linux Tech as any electronic communication (email, SMS, instant messages, voice calls etc…) to multiple recipients who have not agreed to receive such communication.

Use of the Linux Tech network, servers or services to transmit any broadcast voice calls, unsolicited commercial or
unsolicited bulk-email is expressly prohibited, as is hosting web sites or services on a server which are advertised
in any UCE/UBE. Linux Tech also prohibits the sending of any fraudulent, malicious, harassing, false or misleading
electronic communications, including, without limitation, chain letters, pyramid schemes, or emails with forged
headers. Posting off-topic advertisements to discussion groups etc., is also expressly prohibited. Additionally, Linux Tech customers are expressly prohibited from sending any UCE/UBE from our network or any email from another
network that in any way references a document, image, or web site that resides on the Linux Tech network or in one
of our data centers. Violations of this type may result in the termination of the offending Linux Tech account. Our
customers are ultimately responsible for any violations of the AUP by their clients, and any violation of the AUP by
a client of a Linux Tech customer shall be deemed a violation of the AUP by such Linux Tech customer.

Email sending: No more than 500 emails per day per email account.

Customers whose actions directly or indirectly result in Linux Tech IP space being listed in any of the various abuse
databases may be subject to having the offending account(s), domain(s), server(s), or user(s) immediately
removed from our network. In addition, if Linux Tech in its sole discretion determines that a customer is in violation of
our AUP, Linux Tech may, at its sole discretion, restrict, suspend or terminate a customer’s account. Linux Tech will, in
most cases, attempt to contact a customer prior to suspension or termination of a server(s), but can not guarantee
prior notification. Any server suspended or terminated for AUP violations will be reconnected only after the
customer agrees to cease all activities that violate the Linux Tech AUP and pays all applicable reconnect fees and
related charges. Any server suspended a second time for AUP violations will be immediately and permanently
removed from our network and Cloud platform.

Customers that Linux Tech determines in its sole discretion to be in violation of the Linux Tech AUP may be subject to
additional fees or fines including, without limitation, any applicable reconnection fees.

11. IP Address Overlap

Linux Tech administers the network on which customer servers and services reside. The customer cannot use IP
addresses which were not assigned to them by Linux Tech staff. Any server found using IPs which were not officially
assigned will be suspended from network access until such time as the IP addresses overlap can be corrected.

12. Billing

The customer understands that they are responsible for paying their account.. The customer may request that the customer’s service be terminated or suspended, but the customer will still be responsible for paying for any resources used up to the point of suspension or termination.

13. Suspension

If Linux Tech in its sole discretion determines that a customer’s server or other account has become the source or
target of any violation concerning the Linux Tech Acceptable Use Policy (AUP), Linux Tech reserves the right to suspend
network access to that server. While Linux Tech will attempt to contact the customer before suspending network
access to the customer’s server(s), prior notification to the customer is not assured. In certain cases, Linux Tech will
contact law enforcement and other agencies regarding these activities. Customers are responsible for all charges, as well as any fees relating to the investigation, suspension, administration and handling of their servers before, during and after the suspension period.

14. Cancellation

Linux Tech reserves the right to cancel a customer’s service at any time. If inappropriate activity is detected, all
accounts of the customer in question will be deactivated until an investigation is complete. Prior notification to the
Customer is not assured. In extreme cases, law enforcement will be contacted regarding the activity. All fees paid
in advance of cancellation will be prorated and paid by Linux Tech if Linux Tech institutes its right of cancellation. Any
violation of policies which results in extra costs will be billed to the customer i.e. transfer, space etc.

15. Data Backup and Restoration

Although Linux Tech does perform backups of certain data, we highly recommend that you maintain a local backup of
your data. Linux Tech shall not be liable for damages, of any kind, resulting from loss of data, corruption of data,
interruption of service, or loss of business. It is the customer’s duty to communicate with Linux Tech and to check that their data is
being successfully backed up and that it is available.

16. Indemnification

Linux Tech wishes to emphasize that utilising Linux Tech’s services, the customer indemnifies Linux Tech for any violation of
the Terms of Service or its equivalent, law or AUP that results in loss to Linux Tech or the bringing of any claim against
Linux Tech by any third-party. This means that if Linux Tech is sued because of a customer’s or a customer of a
customer’s activity, the customer will pay any damages awarded against Linux Tech, plus costs and reasonable
attorney’s fees.
Linux Tech will not be liable to the client or any third party in respect of any and all damages, loss, claims or costs, or whatever nature and including but limited to direct, indirect consequential or special damages, suffered by the client or third party, whosoever arising, and Linux Tech will moreover not be liable whether the loss was the result of the act or omission of an employee, vicarious or strict liability
In the event that Linux Tech is nonetheless held liable, the quantum of Linux Tech’s liability will not exceed the monthly or pro rata fees due for the Service that occasioned the loss, in the preceding three (3) months, regardless of whether the claim arises out of negligence on the part of Linux Tech’s or any other cause.

17. Disclaimer of Responsibility

Linux Tech is under no duty to look at each customer’s or user’s activities to determine if a violation of the AUPs has
occurred, nor do we assume any responsibility through our AUPs to monitor or police Internet-related activities. Linux Tech disclaims any responsibility for any such inappropriate use and any liability to any person or party for any
other person’s or party’s violation of this policy.

All Sub-Networks, resellers and clients of Linux Tech must adhere to the above policies. Failure to follow any term or
condition will be grounds for immediate Cancellation

Indirect or attempted violations of the AUPs and actual or attempted violations by a third party on your behalf, shall be considered violations of these AUPs by you.

Ready to Elevate Your Business
Experience?

Join us today and explore the limitless possibilities with Linux Tech’s innovative
hosting solutions.

How We Use Cookies

We use cookies to give you a better experience, improve performance and analyze traffic. By using our website you agree to our use of cookies. Privacy Policy