RESOURCE USAGE Sample Clauses

RESOURCE USAGE. You agree that if your web site abuses shared server resources (such as, but not limited to CPU time, disk I/O, and network resources), it can be suspended without notice, and you may be given an option of either upgrading your service level or reducing the resource used to an acceptable level. You agree that by enabling Shell Access (SSH) on your shared hosting account you agree to the following: Lithium Hosting, llc may monitor all activity by logging keystrokes or mirroring SSH sessions. You agree not to tunnel traffic through Lithium Hosting, llc's servers and network. You agree not to attempt to circumvent server or network security or the security of other customer accounts. You will not attempt to install software or make changes to already installed software. You agree not to use SSH to instantiate long running processes or daemonized processes. Lithium Hosting, llc reserves the right to remove SSH access at any time for any reason. Your use of SSH access constitutes agreement to these terms.
AutoNDA by SimpleDocs
RESOURCE USAGE. User may not:
RESOURCE USAGE. Diadem’s Customers may not initiate the following practices. Diadem reserves the right to suspend or terminate accounts found in violation of these items with or without prior notice given and without liability. Diadem reserves the right to determine what constitutes resource abuse and take the appropriate action. In specific, you may not: ● Use twenty-five percent (25%) or more of our system resources for longer than ninety (90) seconds in any consecutive 6 hour period. Activities that could cause this excessive use, include but are not limited to: CGI scripts, FTP, PHP, HTTP, etc. ● Run stand-alone, unattended server-side processes at any point in time on the server. This includes any and all daemons, such as IRCD. ● Run any type of web spider or indexer (including Google Cash / AdSpy) on shared servers. ● Run any software that interfaces with an IRC (Internet Relay Chat) network. ● Run any bit torrent application, tracker, or client. You may link to legal torrents off- site, but may not host or store them on our shared servers. ● Participate in any file-sharing/peer-to-peer activities ● Run any gaming servers such as counter-strike, half-life, battlefield1942, etc. ● Run cron entries with intervals of less than fifteen (15) minutes. ● Run any MySQL queries longer than fifteen (15) seconds. MySQL tables should be indexed appropriately. ● Include the URL when using PHP include functions for including a local file. Instead of including 'xxxx://xxxxxxxxxx.xxx/include.php', use 'include.php' or '/home/username/public_html/include.php'. ● Force html to handle server-side code (like php and shtml) to help reduce usage. ● Use https protocol unless it is necessary; encrypting and decrypting communications is noticeably more CPU-intensive than unencrypted communications. Network Abuse: Diadem does not allow, condone or authorize any forms of Network Abuse including but not limited to Denial of Service attacks, Phishing attempts, port scans, SYN Floods etc. Diadem reserves full right to determine what constitutes Network Abuse and take the appropriate action against the Customer with or without prior notification and without liability. You may not engage in illegal, abusive, or irresponsible behaviour, including but not limited to: ● Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures (including those belonging to Diadem an...
RESOURCE USAGE. All allocated resources provided to the customer for storing and delivering web-based content within a hosting service. This includes, but is not limited to, disk space, memory, CPU, and bandwidth.
RESOURCE USAGE. The Customer will be provided with an account with specified disk space and data transfer allocations. The disk space used by the account includes all files related to the website, including but not necessarily limited to email storage, Content Management System files, and log files. The Customer will be sent a warning email if their usage exceeds 80% of the designated limit. The data transfer use is a measure of all data transfer both inbound and outbound from the Customer’s account. This includes data transfer used for HTTP, Email and FTP purposes. In order to ensure continuity of service should a spike in traffic occur, Adept will not limit data transfer usage, however should the Customer exceed the designated data transfer allowance, additional fees will be charged. The Customer will be sent a warning email if their usage exceeds 80% of the designated monthly limit. The Customer must not run, or allow to be run, any system intensive processes that could potentially affect the level of service provided to other customers of the system. Should Adept find a Customer is using a disproportionate amount of system resources, Adept reserves the right to disable the offending facility, or if necessary the offending site. Data Transfer Overages If the Customer exceeds the allocated amount of data transfer for their Service in any calendar month, additional data will be charged at the following rates: Up to 1Gb: £7.50, Next 24Gb: £2 per Gb. Any additional overage: £1.50 per Gb. Disk Space Overages Disk space usage is recorded daily. If the Customer exceeds the allocated amount of disk space for their Service on more than 2 days in any calendar month, additional storage will be charged based on the peak usage at £2.50 per 100mb (or part of) per month. Account upgrades Where a customer is regularly using in excess of their allocated data transfer and disk space allowances, Adept may offer the customer an upgraded package or add-ons to the existing package part way through the term. Any upgrade applied will be charged pro-rata. If an account is using over its allocation of resources at the renewal date, the account will be upgraded to an appropriate package, and the new fee applied. On upgrading to an Adept Complete hosting package, the account will be subject to a new 12 month minimum term.
RESOURCE USAGE. All hosting services purchased have a variety of resource limitations applied in accordance to the applicable plan associated with the service. It is The Customer’s responsibility to ensure their hosting service does not exceed the resources allocated and to upgrade their service if it is determined more resources are required to continue the smooth operation of a hosting service.
RESOURCE USAGE. ServersNow retains the rights to suspend or terminate services for utilizing excessive amounts of resources. This includes but is not limited to: - CPU usage - RAM usage - Disk usage - Disk IO usage - Bandwidth usage Note: Excessive usage is deemed by ServersNow’s staff. Fair usage amounts are equated by examining the average usage for the same product / service type. Upgrading / Downgrading ServersNow allows a maximum downgrade of 2GB without prior contact to our support staff. Secondly a downgrade can only be applied after 7 days of the last payment. Failure to do so will result in the transaction being reversed and the original amount reinstated. All credits need to be verified by our support staff before they will be charged onto the account. Registration & Account Security Upon registration with this site, you will be issued with a username and password to access your account. You are responsible for maintaining the security of your password for this site. The Company will not be liable for any loss or damage arising from or in connection with your failure to comply with this security obligation. You agree that the Company will be entitled to assume that any person using this site with your username and password is you or your authorised representative.
AutoNDA by SimpleDocs
RESOURCE USAGE. EndLayer users may not misuse resources in the following ways:  Use CGI scripts, HTTP, PHP FTP or any other activities that occupy 25% or more of system resources for over 90 seconds.  Run unattended, standalone server-side processes, including daemons like IRCD, on the server.  Run indexers or web spiders (e.g., AdSpy/Google Cash) on shared EndLayer servers.  Run software interfacing with any Internet Relay Chat (IRC) network.  Run bit torrent clients, trackers or applications (you may provide links to off-site legal torrents, but may not host them on EndLayer servers).  Engage in peer-to-peer/file-sharing activities.  Run gaming servers (e.g., battlefield1942, half-life, counter-strike).  Run cron entries in less than 15-minute intervals.  Run MySQL queries that exceed 15 seconds.  Run inappropriately indexed MySQL tables.  Force HTML to handle server-side code (e.g., PHP, SHTML).  Use unnecessary https protocol (encrypted communications are extremely CPU-intensive). Web, FTP, Publishing Content Policies EndLayer does not allow any of the following content, or links to such content, to be published on EndLayer’s network:  Content of a pornographic, sexually explicit, or violent nature.  “Hate” sites or content that could be reasonably considered as slanderous or libelous.  Content of an illegal nature (including stolen copyrighted material) or content promoting illegal activitiesPirated software sites. Clients posting any of the above content on their sites will be notified using client's current email address on file, and may be suspended or given a time frame to take corrective actions. If no corrective actions are taken, EndLayer will suspend the services of the hosting account until a resolution is met. A repeated violation of this Policy may cause cancellation of service without refund of any fees. Email Usage Policies EndLayer does not support unsolicited email messages sent by Clients through our systems (also known as junk email or SPAM). Clients sending unsolicited email messages from our system, or through other systems with messages referencing their website, will have all of their services temporarily suspended. They will then be contacted by EndLayer and informed of the suspension before having their services reinstated. A repeated violation may cause cancellation of service without refund of any fees. Notwithstanding, EndLayer reserves the right to restrict, suspend or cancel accounts for any user, at any time. Illegal Act...
RESOURCE USAGE. Customers are required to utilize server resources in an efficient and responsible manner. Excessive use of server CPU and memory resources by a customer can interfere with or prevent normal service performance for other customers. Additional information about our policy on CPU, Bandwidth and Disk Usage can be found here. Governing Law and Arbitration The governing law and jurisdiction provision as set forth in Section 24(a) shall apply to all Subscribers. For Subscribers who purchased or signed up for Signon Africa Communications Ltd Services after April 1, 2017, the arbitration clause in Section 24(b) shall also apply. This Agreement is an agreement between Signon Africa Communications Ltd. (“us,” “we,” or “Signon Africa Communications Ltd”) and you ("Subscriber" or "you" and "your"). This Agreement sets forth the general terms and conditions of your use of the products and services made available by Signon Africa Communications Ltd and through the Signon Africa Communications Ltd website (collectively, the "Services"). By using the Services, you agree to be bound by this Agreement. Please read this Agreement carefully. We may in our sole discretion change or modify this Agreement at any time. We will post a notice of any significant changes to this Agreement on the Signon Africa Communications Ltd website for at least thirty (30) days after the changes are posted and will indicate at the bottom of this Agreement the date these terms were last revised. Any changes or modifications to this Agreement shall be effective and binding on you as of the date indicated in a notice posted on this page. If no date is specified, your use of the Services after such changes or modifications shall constitute your acceptance of the Agreement as modified. If you do not agree to abide by this Agreement, you are not authorized to use or access the Services and your sole remedy is to cancel your account.
RESOURCE USAGE. Dedicated and VPS usage is limited by the resources allocated to the specific plan that you have purchased.
Time is Money Join Law Insider Premium to draft better contracts faster.