Terms Of Service

Datacenter Security , Maintanence and Monitoring


Netandhost.com services are provided only for authorized customer use. Our services may be monitored for all lawful purposes, including to ensure that use is authorized, for management of the services, to facilitate protection against unauthorized access, and to verify security procedures, survivability, and operational security. During monitoring, information may be examined, recorded, copied and used for authorized purposes.

Any account found connecting to a third party network or system without authorization from the third party is subject to suspension. Access to networks or systems outside of your direct control must be with expressed written consent from the third party. Netandhost.com may, at its discretion, request and require documentation to prove access to a third party network or system is authorized.

We reserve the right to refuse service to anyone. Any material that, in our judgment, is obscene, threatening, illegal, or violates our terms of service in any manner may be removed from our servers (or otherwise disabled), with or without notice Failure to respond to email from our support department within 48 hours may result in the suspension or termination of your services. All abuse issues must be dealt with via email and will have a response within 48 hours.

If in doubt regarding the acceptability of your site or service, please contact us at support@netandhost.com and we will be happy to assist you.Any site found to host child pornography or linking to child pornography will be suspended immediately without notice.

Resellers: We will suspend the site in question and will notify you, so you may terminate the account. We will further monitor your activity; more than one infraction of this type may result in the immediate termination of your account.

Direct customers: Your services will be terminated with or without notice. Violations will be reported to the appropriate law enforcement agency. It is your responsibility to ensure that scripts/programs installed under your account are secure and permissions of directories are set properly, regardless of installation method. When at all possible, set permissions on most directories to 755 or as restrictive as possible. Users are ultimately responsible for all actions taken under their account. This includes the compromise of credentials such as user name and password. It is required that you use a secure password. If a weak password is used, your account may be suspended until you agree to use a more secure password. Audits may be done to prevent weak passwords from being used. If an audit is performed, and your password is found to be weak, we will notify you and allow time for you to change/update your password.