Terms And Conditions
All the services and products provided under ColaHost are meant to be used for lawful purposes only. Any usage that violates any United States federal, state, or city law is strictly prohibited. This includes everything only using copyrighted materials or threatening or materials protected by some trade secrets. We are not responsible for the damages you suffer for violating our terms. We hold the right to change the TOS and other policies without prior notification.
Malware Suspension
We give our first priority to the data security. So we use maldet, csx for scanning our user files. If any account is caught with malware files simply that hosting account is suspended permenantly. And Won't be unsuspended any more.
Uptime
Our services all we provide maximu 99.99% Uptime. But if any damages to the server it may take longer downtime than usual. But user data is highly secured because we always maintain backups. But in that downtime user can request the money which eqauls to the time of downtime. (Example:- if the downtime is for 1 day if you buy yearly plan then price for 1 day will be calculated and can be refunded that amount)
Abuse
1. Spam is any email sent to end users that the receiver has specified they did not want to receive.
Providers should ensure that customers are following the M3AAWG Sender Best Current Practices.1
Hosting providers will also want to subscribe to as many relevant Feedback Loop reports as it is
possible to process.
2. Spamvertising (hosted redirect and payloads)
Spamvertising occurs when a hosting provider’s end user engages a third party to advertise its Web
presence. Most spam complaints are caused by end users sending emails to potential customers that
tout some overhyped product or service. Spamvertising is done via a third party. Providers who
receive one of these complaints are most likely in the loop either as the sender of the email or the
host of the site being advertised.
3. Phishing outbound (hosting and inbound for client credentials)
Phishing happens primarily when an end-user account has been compromised, almost always as a
result of outdated scripts run by end users. A phishing site is a fraudulent site purporting to be a
legitimate company, like Bank of America or PayPal, that directs the individual to enter confidential
information. The phishers then have everything they need to rob the individual who has just been
scammed.
4. Hacked or defaced pages (hosted client-side)
While phishing complaints will often fall into this category, not all hacked accounts will be used for
phishing. Some may simply be defaced and the end users’ data corrupted or destroyed. Frequently
hackers will also inject malicious code or upload bots that are set to cause additional problems. Third
parties and law enforcement agencies analyze these events and provide information about how to
repair hacked sites. Most accounts are compromised due to end users’ out-of-date CMS (Content
Management System) installations such as Joomla or WordPress.
5. Child sexual abuse material (hosted client-side)
6. Copyright and trademark/intellectual property issues (hosted client-side)
7. Distributed denial of service and other outbound hostile traffic (hosted amplification,
redirect, botnet C&C hosts)
8. Malicious signups (whack-a-mole/multi-account, multi-platform)