Together with the Terms of Service and the other documents referenced therein, this AUP forms a binding agreement (the "Agreement") between Hosting Techniques and The Customer.


The Agreement, including this AUP, binds all customers and users of Hosting Techniques Service and all visitors to Hosting Techniques website; all such customers and users are included in the term "Customer." All other terms defined in the Terms of Service will have the same meaning when used in this AUP.


Hosting Techniques requires that all Customers conduct themselves as good users of the Internet and at all times behave with respect for others. Each Customer is responsible for preventing violations of this AUP by third parties accessing the Service through Customer's computers or accounts, including without limitation hackers and Customer's own users.

A. The following activities are expressly prohibited:

1.    Spam / Unsolicited Commercial Email.


2.    Hosting Techniques does not tolerate spam, whether legal or illegal.


3.    Bulk unsolicited commercial email is automatically considered spam, unless sent to recipients who have requested such messages through an opt-in procedure.


The following are also automatically considered spam:

(a)    any message sent to a recipient from a purchased, rented, licensed, or traded list of email addresses; and

(b)    any message that violates the Data Protection Act UK or the Privacy & Electronic Communications Regulations (PECR).


4.    Take no action that leads to a DNSBL (http://www.dnsbl.info/) listing for any Hosting Techniques provided IP address, including your own IP addresses. If any action on your part causes a DNSBL listing, you are required promptly to cooperate with Hosting Techniques, at your own expense, in clearing the IP address(es) in question from the DNSBL (and such assistance does not limit any other rights or remedies of Hosting Techniques).


5.    Do not fake e-mail header information to misdirect or otherwise "spoof" another party for any reason, including without limitation to evade detection.


6.    Do not set up a mail relay that is not password protected or that could allow anyone to send spam.


7.    Do not host "payload" websites that are linked to spam emails, even if a third party sent those emails.


8.    Do not provide domain name services to entities that violate any of these rules.


9.    Intellectual property infringement, including violations of copyright, trademark, and patent rights, and use or distribution of pirated software.


10.    Hacking or perpetration of any security breach.


11.    Unauthorised access to any computer or system, including intrusion into or scanning of other Hosting Techniques accounts.


12.    Dissemination of deliberately offensive material, including any message or information that is or may be threatening, libelous, obscene, or harassing.


13.    Child pornography or any other activity harmful to minors. (Hosting Techniques does allow hosting of adult content that is legal under European law, including applicable Local (UK) law, provided such content does not fit any excluded criterion listed in this Part A or otherwise violate any Hosting Techniques policy.) Hosting Techniques retains the right to remove any content it deems inappropriate or in bad taste.


14.    Fraud.


15.    Violation of privacy rights, publicity rights, trade secret rights, or information security, including dissemination of material non-public information about companies without authorisation, as well as harvesting or collecting information about Website visitors without their express consent.


16.    Use of third party software without a proper license or other appropriate permission, including Microsoft software.


17.    Network attacks or any unfriendly effort to interfere with service on another network or server.


18.    Virus distribution or distribution of any worm or other harmful code.


19.    Use of Internet relay chat ("IRC"), including hosting of an IRC server, running IRC bots, use of a Hosting Techniques server as an IRC client or proxy, and use of IRC scripts or programs that interfere with service to other users on any server or network.


20.    Illegal activities of any kind.

B: Disruptions & Security:

Hosting Techniques may suspend Service in whole or in part if it reasonably suspects an AUP violation. The Customer will reimburse Hosting Techniques for any expenses resulting from The Customer's violation of the AUP, including legal fees. Hosting Techniques may also disable the Customer's service if Hosting Techniques suspects that such service is the target of an attack or in any way interferes with services provided to other customers, even if The Customer is not at fault. Hosting Techniques does not issue refunds for terminating service due to any of the causes above.


The Customer is responsible for the use of its service, including use by hackers and other unauthorised third parties. The Customer's responsibility includes payment for exceeding transfer and bandwidth limits.


Except where Hosting Techniques specifically accepts such responsibility in The Customer's Signup (pursuant to the Terms of Service), The Customer is responsible for maintaining security, including disaster recovery systems and backups. (Customer is advised to maintain its own backups outside of Hosting Techniques' premises and systems, even if Hosting Techniques provides backups, security, or other services related to data protection.)


C. Reporting AUP Violations:

Hosting Techniques requests that anyone with information about a violation of this AUP, or of Hosting Techniques' Terms of Service, report it by sending an email to abuse@hostingtechniques.co.uk


Unit 5-6 Chancery Gate Business Centre,

Twyford, Berkshire

RG10 9LT