We support the uncensored flow of information and ideas over the Internet and do not actively monitor Client activity under normal circumstances. Similarly, we do not exercise editorial control over the content of any web site, e-mail transmission or other material created or accessible over or through the Service. In accordance with our Terms Of Sevice, we may remove any materials that, in our sole discretion, may be illegal, may subject us to liability, or which may violate this Acceptable Use Policy.

You may not use your virtual site or email address, to publish material, which The Provider determines, at its sole discretion, to be unlawful, indecent or objectionable. For purposes of this policy, "material" refers to all forms of communications including narrative descriptions, graphics (including photographs, illustrations, images, drawings, logos), executable programs, video recordings, and audio recordings.

A violation constitutes any one of the following:

Illegal Use

The Provider's services may not be used for illegal purposes, or in support of illegal activities. The Provider reserves the right to cooperate with legal authorities regarding any material involved in such activities.

Harm To Minors

Use of the the Provider's service to harm, or attempt to harm, minors in any way, including but not limited to, child pornography.


Use of the Provider's service to transmit any material (by e-mail, uploading, posting or otherwise) that threatens or encourages bodily harm or destruction of property.

Fraudulent Activity

Use of the Provider's service to make fraudulent offers to sell or buy products, items, or services, or to advance any type of financial scheme such as "pyramid schemes," "ponzi schemes," and "chain letters."

Forgery Or Impersonation

Adding, removing or modifying identifying network header information in an effort to deceive or mislead is considered a violation of this Policy. Attempting to impersonate any person by using forged headers or other identifying infrmation is considered a violation of this Policy. The use of anonymous remailers or nicknames does not constitute impersonation.

Copyright Infringement

Use of the the Provider's service to transmit any material (by e-mail, uploading, posting or otherwise) that infringes any copyright, trademark, patent, trade secret or other proprietary rights of any third party, including, but not limited to, the unauthorized copying of copyrighted material, the digitization and distribution of photographs from magazines, books, or other copyrighted sources, and the unauthorized transmittal of copyrighted software.

Server Resources & Availability

Unless explicitly shown, all's hosting accounts operate under a shared hosting environment. Any continual resource abuse, at's sole discretion, may result in dialogue being opened with the Client with further action taken if no satisfactory conclusion is reached. Such continued activities may result in script removal, or even account removal.

Mailing Lists and Newsletters

Customers with mailing lists or regular newsletters that send to 50 or more email addresses must make use of a mailing list manager that sends no more than 100 emails per minute. Using a PHP or Perl/CGI script to insert more than 50 emails into the mail queue at any one time constitutes a violation of this Acceptable Use Policy and may result in mailshot deletion, hosting account suspension or account closure at the discretion of These servers are a shared resource and must be treated accordingly. Customers that force remote ISPs to blacklist a server owned by due to a mailing list or newsletter "spam" are subject to a £200 + VAT penalty administration charge as part of our negotiation with that ISP.


You are responsible for any misuse of your account, even if the inappropriate activity was committed by a friend, family member, guest or employee. Therefore, you must take steps to ensure that others do not gain unauthorized access to your account. In addition, you may not use your account to breach security of another account or attempt to gain unauthorized access to another network or server.

Your password provides access to your account. It is your responsibility to keep your password secure.

Sharing your password and account access with unauthorized users is prohibited. You should take care to prevent others from using your account since you will be held responsible for such use.

Attempting to obtain another user's account password is strictly prohibited, and may result in termination of service.

You must adopt adequate security measures to prevent or minimize unauthorized use of your account.

You may not attempt to circumvent user authentication or security of any host, network or account. This includes, but is not limited to, accessing data not intended for you, logging into or making use of a server or account you are not expressly authorized to access, or probing the security of other networks. Use or distribution of tools designed for compromising security is prohibited. Examples of these tools include, but are not limited to, password guessing programs, cracking tools or network probing tools.