Silicon Valley Web Hosting

| Contact Us | Access Portal

888-GET-SVWH

Legal

Contact Us

End User Content Agreement

For all Unmanaged Dedicated Server, VPS, Shared, and Colocation Server clients it is at Silicon Valley Web Hosting's discretion

  • To deactivate at the Ethernet port, any Silicon Valley Web Hosting customer, for moderate to major end-user content-resultant abuse resulting in flooding, vengeance-based attacks, massive SPAM relay, scanning, or any other particular violation of our AUP, as determined by current Abuse Engineer or Technical Group Administrator
  • To maintain a continuous assurance of networking health to our customer base. "End-user Content" is hereby defined as server content uploaded by a customer of a direct client of Silicon Valley Web Hosting, including, but not limited to the following: PHP modules (bulletin boards, forums, guest books, picture galleries, etc), installed P2P software, formmail or sendmail scripts, content uploaded via FTP, SCP, or web form to the server in question.
  • To demonstrate that, according to our official AUP, aforementioned content is entirely within the jurisdiction of the SVWH.Net customer in question to maintain and assure the security thereof

Regardless of the phases outlined below, permanent (irreversible) termination of any server profile may be required at any stage by a Technical Group Administrator, which corresponds with the Silicon Valley Web Hosting official AUP and the protection of the health and efficiency of our critical network segments, regardless of situation's parameters. Extreme processes will only be instigated in warranted cases, of course, depending on severity of attack and/or depth of server intrusion, as we attempt to provide our customer a chance to rectify the situation with the following recourses:

Step 1 - Deactivation/Quarantine.

Initial Deactivation; (12 hours), timeout. A ticket will be logged within Technical Support, and the server will be set to Abuse Quarantine status, within our internal records. Any and all available data on the violation in question will be passed to the customer during this time. Temporary access through a separate address, or a similar recourse, will be available to the customer during this time, in order to provide for repair, cleansing, and required security advancements in preparation for the end of the "timeout" phase. In the case that we, or an upstream provider, is actually required to black hole the server's address space due to massive network connectivity issues, we may provide a specific IP to the customer for connecting to the server during the “timeout” phase.

Reactivation will continue only after current Abuse Engineer and on-staff Administrator approve. Attached monitoring and any other affected FS-provided services must be revived upon server reactivation. Ticket details, resolution data, any helpful information WILL be logged to the permanent notes in the dedicated server profile in question. After determining that the server is once again in an optimal and secure operating condition, the customer will be allowed to upgrade to a Managed Server plan, pending an Administrator's approval.

Step 2 - Administrative Hold.

In the event of a second moderate to major violation of this nature (Within 60 Days), as determined by currently on-call Abuse Engineer or Administrator, the server in question will be semi-permanently deactivated, including all attached services & support pathways. A ticket will be logged with the Administrative Staff, and the server will be set to Abuse Quarantine status. The server will remain deactivated until an Administrator is satisfactorily convinced of the customer's ability to handle administration of end-user content going forward. The customer in question will be required to sign a "Last Chance" clause, if approved for reactivation by an Administrator, which, if breached, will require a mandatory cancellation of services (WITHOUT RECOURSE) regardless of the circumstances involved.

Stipulations to Administrative Hold & Expiring Violations

There is no required turnaround time, or preset cool down period, when a server is placed into Abuse Quarantine & deactivated for the second time within the 60 (sixty) or less days. Managed Server plan upgrades will not be available during a quarantine phase, as the policing of end-user content and all related situations are wholly the responsibility of the customer in question. As previously eluded to, multiple violations are recognized within two month (60 day) intervals - beyond that, internally-noted Abuse violations may be deleted from the server's permanent record.

For all Managed Dedicated Server and Managed Colocation Server clients it is Silicon Valley Web Hosting's intention

  • To deactivate at the Ethernet port, any Silicon Valley Web Hosting customer, for moderate to major end-user content-resultant abuse resulting in flooding, vengeance-based attacks, massive SPAM relay, scanning, or any other particular violation of our AUP, as determined by current Abuse Engineer or Technical Group Administrator.
  • To maintain a continuous assurance of networking health to our customer base. "Enduser Content" is hereby defined as server content uploaded by a customer of a direct client of SVWH.Net, including, but not limited to the following: PHP modules (bulletin boards, forums, guest books, picture galleries, etc), installed P2P software, formmail or sendmail scripts, content uploaded via FTP, SCP, or web form to the server in question.
  • To demonstrate that, according to our official AUP, aforementioned content is entirely within the jurisdiction of the SVWH.Net customer in question to maintain and assure the security thereof. Regardless of the phases outlined below, permanent (irreversible) termination of any server profile may be required at any stage by a Technical Group Administrator, which corresponds with the Silicon Valley Web Hosting official AUP and the protection of the health and efficiency of our critical network segments, regardless of situation's parameters. Extreme processes will only be instigated in warranted cases, of course, depending on severity of attack and/or depth of server intrusion, as we attempt to provide our customer a chance to rectify the situation with the following recourses:

Step 1 - Deep Analysis & Cleansing.

Before Step 2 - Deactivation is required by the acting Abuse Engineer or current Administrator, the customer in question will have the opportunity to purchase a package of "Advanced Support" as an “exception” (separate addition) to Managed Serve Plan hours: this hour of Advanced Support (normal Administrative fee of $100.00/hour) is not tallied within our Managed Server Plan structure, as the responsibility over end-user data is always the complete responsibility of the customer in question. This hour (minimum) of "Advanced Support" will be utilized as an advanced cleansing and security procedure - including all regular criteria checks, though with a particular focus on the abuse of end-user application content: elderly/outdated/vulnerable software builds, poorly-secured application interfaces, or any other possible modules that may allow unscrupulous behavior. Deep analysis of the webserver (or any other apparently compromised service), will transpire, and filesystem-wide sweeps for weak content and/or content capable of being manipulated will occur. Once complete, details of the audit will be logged within the permanent notes of the server profile in question. An 'official deactivation' will not occur in this case, though we may require a temporary Ethernet deactivation, depending on the severity of the issue, not to exceed the maximum time needed to bring the problem under control. The customer will be informed of the anomalies that were present, and should be instructed on proper maintenance practices going forward, in lieu of assuring up-to-date applications (or any form of content), throughout their customer content hierarchy.

Step 2 - Deactivation/Quarantine.

Initial Deactivation; (12 hours), timeout. A ticket will be logged within Technical Support, and the server will be set to Abuse Quarantine status, in our internal records. Any and all available data on the violation in question will be passed to the customer during this time. Temporary access through a separate address, or a similar recourse, will be available to the customer during this time, in order to provide for repair, cleansing, and required security advancements in preparation for the end of the "timeout" phase. In the case that we, or an upstream provider, is required to black hole the server's address space due to massive network connectivity issues, we have IP ranges set aside for binding to the server temporarily.

Reactivation will continue only after current Abuse Engineer and on-staff Administrator approve. Attached monitoring and any other affected FS-provided services must be revived upon server reactivation. Ticket details, resolution data, any helpful information WILL be logged to the permanent notes in the dedicated server profile in question. After determining that the server is once again in an optimal and secure operating condition, the customer will be allowed to upgrade a Managed Server Plan, pending an Administrator's approval.

Step 3 - Administrative Hold.

In the event of a second moderate to major violation of this nature (Within 60 Days), as determined by currently on-call Abuse Engineer or Administrator, the server in question will be semi-permanently deactivated, including all attached services & support pathways. A ticket will be logged with the Administrative Staff, and the server will be set to Abuse Quarantine status. The server will remain deactivated until an Administrator is satisfactorily convinced of the customer's ability to handle administration of end-user content going forward. The customer in question will be required to sign a "Final Chance" clause, if approved for reactivation by an Administrator, which, if breached, will require a mandatory cancellation of services (WITHOUT RECOURSE) regardless of the circumstances involved.

Stipulations to Administrative Hold & Expiring Violations.

There is no required turnaround time, or preset timeout period, when a server is placed into Abuse Quarantine & deactivated for the second time within the 60 (sixty) or less days. Managed Server Plan upgrades will “not” be available during a quarantine phase, as the policing of end-user content and all related situations are wholly the responsibility of the customer in question. As previously eluded to, multiple violations are recognized within two month (60 day) intervals - beyond that, noted Abuse violations may be deleted from the server's permanent record.

© Silicon Valley Web Hosting
PO 9304,
San Jose, CA 95157
Phone: 888-GET-SVWH (438-7894)
Fax: 1-866-306-4216