Acceptable Use Policy

Statement of Support

This Acceptable Use Policy applies to www.crafthost.com operated by Crafthost SRL of Umberto Giordano Square, 220122 Milan MI, Italy (“Crafthost”, “we”, “us”, “our”) and covers account usage and content and is in place to protect our network and customers from abuse that may affect other sites or services hosted on our network.

Please read this policy thoroughly to make sure you understand what content is acceptable.This policy is an integral part of our Terms of Service, which each customer agrees to abide by when signing up for an account with us. Any violation of this policy will be deemed a violation of our Terms of Service.

GENERAL PROHIBITIONS

You shall not use our website, systems, network, or any of our services for any of the following:

  • in any way that breaches any applicable local, national or international law or regulation
  • in any way that is unlawful or fraudulent, or has any unlawful or fraudulent purpose or effect;
  • for the purpose of harming or attempting to cause harm to others
  • to send, knowingly receive, upload, download, use or reuse any material which does not comply with our content standards as set out in this policy
  • to transmit, or procure the sending of, any unsolicited or unauthorised advertising or promotional material or any other form of similar solicitation (spam).
  • to knowingly transmit any data, send, or upload any material that contains viruses, Trojan horses, worms, time bombs, keystroke loggers, spyware, adware, or any other harmful programs or similar computer code designed to adversely affect the operation of any computer software or hardware

You agree:

  • not to reproduce, duplicate, copy or resell any part of our website and/or our Services in contravention of the provisions of our Terms of Service
  • not to access without authority, interfere with, damage, or disrupt: a) any part of our website, systems, or networks; b) any equipment or network on which our site is stored or which you have access to as part of the receipt of our services; c) any software used in the provision of our website and/or services; or d) any equipment, network, or software owned or used by any third party.

SERVER RESOURCES AND NETWORK USAGE

On accounts where resources are shared, these operate under a fair use policy.

Where resource limits are not specified or are listed as unlimited within the account specification, then fair use will apply.

Fair use means that any single site can use as many resources as are available as long as that usage does not adversely affect the performance of other sites hosted upon the same server.

While extremely rare, it is at our sole discretion to determine whether a website is deemed to be using excessive resources; if a site is deemed to be doing so, we will recommend remedial action, which may include:

  • the option to reduce your resource usage through the modification of your application (for example, if the cause is through malware infection or poor code)
  • upgrade to a non-shared plan

If you choose not to take remedial action, then the website or application will be disabled to prevent it from adversely affecting other clients.

We reserve the right to shut down or remove any scripts that pose a potential security risk or which are deemed by us, and at our sole discretion, to be adversely affecting server performance or network integrity (for example, scripts that have known security vulnerabilities).

BANNED CONTENT

The following applies to all content hosted on any of our services:
Content must:

  • be accurate (where it states facts);
  • be genuinely held (where it states opinions)
  • Comply with applicable law and in any country from which such content can be received or uploaded.

The following content is explicitly banned:

  • contains any material which is defamatory of any person;
  • contain any material which is obscene, offensive, hateful or inflammatory;
  • promotes sexually explicit material (unless we have given our explicit permission to use our services to provide adult content);
  • promote violence;
  • promote any form of discrimination.
  • infringe any copyright or trade mark of any other person;
  • be likely to deceive any person;
  • be made in breach of any legal duty owed to a third party, such as a contractual duty or a duty of confidence;
  • promote any illegal activity;
  • be threatening in any way
  • harass, upset, annoy or cause alarm to another person
  • be used to impersonate any person or to misrepresent your identity or affiliation with any organisation or person;
  • give the impression that it has emanated from us, if this is not the case.
  • advocate, promote, or assist any unlawful act.
  • contain viruses, worms, Trojans or other malicious components;
  • contain warez, which includes but is not limited to pirated software, ROMs, emulators, phreaking, hacking, password cracking, IP spoofing, and encrypting of any of the above. Also includes any sites which provide links or 'how to' information about such material;
  • Proxy software;
  • IRC Hosts;
  • BitTorrent software may not be used on any of our services due to wide-scale abuse; and
  • any content that has the potential to cause us adverse publicity

SYSTEM ABUSE

Any customer in violation of our system or network security is subject to criminal and civil liability, as well as immediate account termination. Examples include, but are not limited to, the following:

  • Unauthorized access, use, probing, or scanning of our system’s security, authentication measures, data, or traffic;
  • Interference with the service to any user, host or network, including, but not limited to: e-mail bombing, flooding, deliberate attempts to overload the system, and broadcast attacks, forging of any TCP/IP packet header or any part of the header information in an e-mail or newsgroup posting;
  • Any attempt at doing harm to a server or a customer of our web hosting services.

BACKGROUND OPERATIONS/PROGRAMS ON SERVERS

‘Background process’ is a program that runs in the background of the operating system. What is specific for a background process is that, once started, it runs simultaneously with other foreground processes. This means that the shell executing the background operation does not wait for it to finish or terminate, as it does with foreground processes, but is free to start executing more operations along with the background one.

Background processes are not permitted on any of our shared hosting servers, as they usually lead to CPU overload and can be used for malicious and/or illegal actions. As our primary task is to provide the highest quality web hosting service to all our customers, we cannot permit any background processes to be executed and threaten the performance of our server network.

Our shared hosting system does not allow a big multitude of users to simultaneously use the system memory and processing time of our servers.

EXCESSIVE USE OF SYSTEM RESOURCES

In order to ensure higher server performance and quality of hosting service, all shared hosting plans are subject to certain resource limitations concerning, but not limited to, server CPU usage, memory usage, disk space, and traffic.

If a hosting account exceeds the allowed amount of system resources, the account owner will be immediately notified to take actions in order to reduce the usage. If such action is not instantly taken by the owner, the account will be suspended. If excessive CPU usage is detected, the account owner will be suggested to place an order for a CPU usage upgrade or upgrade to a plan that allows higher CPU usage. If any hosting account is found to be causing degradation of the server and/or our hosting network’s performance, regardless of the reason, the account will be subject to suspension or immediate removal, depending on the situation. We will be the sole arbiter in determining whether a given account is excessively using the server resources and/or causing a server degradation.

SPAM

Spamming is prohibited. Users may not utilize our web hosting services to transmit, distribute, or deliver any unsolicited bulk or commercial messages over the Internet (an action known as “spam” or “spamming”).

Spamming is a violation of ethical norms and will be interpreted as an infringement. We will not tolerate the sending of unsolicited bulk or commercial messages through our services, as well as through another service that is mentioning, in some way, our customer’s domain name or implies the utilization of our network or our e-mail services for sending the unsolicited bulk or messages.

Spamvertising is prohibited. ‘Spamvertising’ refers to the practice of sending unsolicited spam messages for the purpose of advertising a particular website. If such e-mails are relayed through 3rd party (e-mail spoofing) and/or are promoting a domain hosted on our servers, this will lead to immediate account suspension unless an evidence of legitimacy for non-involvement of the domain owner in the particular illegal action is provided.

’E-mail spoofing’ is a fraudulent e-mail activity in which the sender’s (3rd party) e-mail address and other parts of the e-mail header are changed so as to appear that the e-mail has been sent from a different source (e-mail address owner/server).

‘Unsolicited message’ is a message that is sent against the privacy policy of a newsgroup or is sent to a recipient without their explicit permission. We, at our sole discretion, shall determine whether any of the messages you are sending are spam or spamvertising. For your information, spamming generally includes, but is not limited to, the following:

  • Sending of unsolicited messages in bulk, or sending of unsolicited e-mails, which provoke complaints from recipients;
  • Sending of junk mail;
  • Use of distribution lists that include people who have not given prior explicit permission to be involved in such a distribution process;
  • Posting commercial ads to USENET newsgroups that do not permit it;
  • Posting articles containing binary-encoded data to non-binary newsgroups;
  • Excessive and repeated posting of off-topic messages to newsgroups;
  • Excessive and repeated cross-posting;
  • E-mail harassment of another Internet Customer or Customers, including but not limited to the transmission of any threatening, libellous or obscene material, or material of any nature that may be deemed offensive;
  • E-mailing of age-inappropriate communications or content to anyone under the age of 18.

COPYRIGHTS

Copyrighted material must not be placed on customers’ accounts without the explicit permission of the copyright owner or a person explicitly authorized to give such permission by the copyright owner. Upon receipt of a claim for copyright infringement or a notice of such violation, we will immediately run a full investigation and, upon confirmation, will promptly remove the infringing material from the services. Further procedures (in accordance with our stated below corrective measures) will be carried out if necessary. We will assume no liability to any customer of the services for the removal of any such material.

COMMUNICATION STANDARDS

Any data, information, or communication made on or using the Services by any person must conform to appropriate and lawful standards of accuracy, decency, and lawfulness, which shall be applied in our discretion, acting reasonably. In particular, you warrant and undertake that any data and each such communication shall at all times be:

  • Submitted lawfully and without infringement of any Intellectual Property Rights of any person;
  • Free of any virus (at the point of entering our systems);
  • factually accurate;
  • provided with all necessary consents of all relevant third parties;
  • not defamatory or likely to give rise to an allegation of defamation;
  • not obscene, seditious, vulgar, pornographic, sexually explicit, discriminatory, or deceptive;
  • not abusive, threatening, offensive, harassing or invasive of privacy;
  • not racist, sexist or xenophobic;
  • not liable to offend religious sentiments or deeply held beliefs; and
  • unlikely to cause offence, embarrassment, or annoyance to any person.

BREACHES

We will determine, at our discretion, whether there has been a breach of this acceptable use policy through your use of our site or our services. When a breach of this policy has occurred, we may take such action as we deem appropriate.

Failure to comply with this acceptable use policy constitutes a material breach of this policy and our Terms of Service and may result in our taking all or any of the following actions:

  • Remove infringing content from any website hosted by us without notice to you;
  • immediate, temporary, or permanent withdrawal of your right to use our site and/or our services.
  • immediate, temporary, or permanent removal of any posting or material uploaded by you to our site or any site hosted by us.
  • issuing of a warning to you.
  • Disclosure of such information to law enforcement authorities as we reasonably feel is necessary.

Responses described in this policy are not limited, and we may take any other action we reasonably deem appropriate. Where we become aware of any issue related to the content or your use of our Services which could have an adverse impact on our network, systems, or other customers, we reserve the right to immediately suspend or deactivate the services and your account. Where reasonably possible, we shall inform you of such action before it is taken.

REPORTING VIOLATIONS

If you need to report a violation of this policy or believe that you or your system has been subject to an attack originating from our services, please contact us immediately.

HELP AND COMPLAINTS

If you have any questions about this notice, please contact us.

CHANGES

The first version of this notice was issued on Sunday, 26 January, 2025, and is the current version. Any prior versions are invalid, and if we make changes to this policy, we will revise the effective date.

Need help? We're always here for you contact
servers
cloud server

Welcome to the new online tool

In this section of the site you can make an appointment with one of our sellers.
Select the service you need and the process will guide you through your booking.

step 1step 2step 3step 4step 5step 6
Determine Website/Application Characteristics
What type of website or application are you planning to host?
step 1step 2step 3step 4step 5step 6
Assess Traffic and Resource Needs
How would you describe your expected traffic and resource needs?
step 1step 2step 3step 4step 5step 6
Consider Specific Hosting Features
Are you looking for any specific hosting features?
step 1step 2step 3step 4step 5step 6
Evaluate Desired Level of Control
How much control do you want over your hosting environment?
step 1step 2step 3step 4step 5step 6
Consider Management Preferences
How hands-on do you want to be with server management?
step 1step 2step 3step 4step 5step 6
Additional Support and Services
Are premium support and additional management services important to you?
captcha

Based on your responses, here's the recommended hosting plan:

cloud server

Shared Hosting with
Anycast DNS

Please note that these are general recommendations, and for more tailored advice, feel free to reach out to our support team.

Feedback

A few minutes of your time helps us improve. We genuinely aooreciate your help!

Feedback

A few minutes of your time helps us improve. We genuinely aooreciate your help!