These Terms of Service (hereinafter referred to as "these Terms") are entered into by and between the user and [Company Name] (hereinafter referred to as "the Company") regarding the VPS virtual server rental service provided by the Company (hereinafter referred to as "the Service").
I. Acceptance of Terms
By using this service, you acknowledge that you have read, understood, and agree to abide by the terms and conditions herein. The Company reserves the right to amend these terms and conditions at any time. Any amendments will be posted on this website without prior individual notice. Your continued use of this service shall be deemed as acceptance of the amended terms and conditions.
II. Service Content
- This service is a virtual private server (VPS) rental service, providing designated hardware resources (such as CPU, memory, storage, bandwidth) for customers to remotely operate and manage independently.
- Unless otherwise agreed in writing, services do not include data backup, program installation, website design, security enhancement, hosting maintenance, and other items.
- Users are responsible for system setup, maintenance, updates, and data backup.
III. User Obligations and Restrictions
Users shall not engage in the following acts using this service. Otherwise, the Company has the right to terminate or suspend the service at any time without any liability for compensation:
- Disseminating, storing, or forwarding any content that violates the laws of the Republic of China, such as:
- Distribute malware, viruses, Trojans;
- Operating websites or services related to gambling, pornography, or fraud.
- Acts that infringe on copyright or other intellectual property rights.
- Participating in or assisting in attacks such as DDoS, Port Scan, Brute Force, SMTP Relay, or unauthorized penetration activities.
- Disrupt network order, or cause excessive load or resource exhaustion on our company's systems or third-party servers.
- Unauthorized data mining, network scanning, or probing other systems and web pages.
4. Cybersecurity and Data Responsibility
- Our company takes reasonable security measures to protect system safety, but does not assume full responsibility for user data damage, loss, or leakage. Users are responsible for their own backup mechanisms.
- Users are responsible for managing their system security settings, including software updates, vulnerability patching, strong password configuration, firewalls, and access permissions.
- If security incidents arise due to user misuse, account password leakage, or negligence in management, the corresponding losses and legal responsibilities shall be borne solely by the user, and this company shall not be held liable.
V. Costs and Billing
- This service is prepaid. Billing is based on selected resources and plans. If the user fails to renew by the due date, the service will be automatically shut down and all data will be deleted after the grace period (default is 7 days), without further notice.
- All payments are non-refundable, unless the company is unable to continue providing services, in which case the unused portion of the fees will be refunded on a pro-rata basis.
- All costs, billing details, and invoice contents shall be subject to those listed in our company's order system.
VI. Service Termination and Interruption
- If users violate these terms or engage in other high-risk behaviors (such as illegal use, repeated security reports, illegal content, etc.), the Company reserves the right to terminate the service at any time without any responsibility for refunds or compensation.
- In the event of temporary interruptions caused by routine maintenance, unforeseen accidents, third-party disconnections, or force majeure (e.g., natural disasters, war, government orders, etc.), our company will make every effort to provide advance notice and restore service as quickly as possible. However, we shall not be liable for any indirect damages or losses incurred due to such interruptions.
7. Description of Compliant Use
To maintain the stable and legal operation of the platform, the following uses or behaviorsStrictly forbidden:
- Run any form of TOR node (relay / bridge / exit);
- Run an IRC server or relay service;
- Running SMTP mass mailing tools, unauthorized mail relay servers;
- Engage in any form of cryptocurrency mining (including ETH, BTC) or unauthorized blockchain nodes;
- Provide publicly accessible VPN, proxy, or reverse proxy services.
- Running publicly accessible server services that are prone to abuse (e.g., NTP, SNMP, DNS).
Any violation of the above terms will result in immediate suspension, IP blocking, without prior notice or refund.
VIII. DMCA Notice Handling Mechanism
- If our company receives a copyright infringement notice from a third party (e.g., a U.S. DMCA notice), we will immediately notify the user and request a response or resolution within 72 hours.
- Users must provide a reasonable explanation within the deadline or cooperate in removing the relevant content. If there is no response or the content is clearly illegal, the company will proceed to delete the content or terminate the account.
- Users shall be responsible for ensuring that the content uploaded or stored possesses legal authorization and shall not upload any pirated, bootleg, or unauthorized music, videos, games, commercial software, etc.
- If the same account receives three or more copyright infringement reports, regardless of whether they come from the same source, our company may permanently disable the account at its discretion and reserves the right to pursue legal action and claim damages.
