Terms And Conditions

All the services and products provided under ColaHost are meant to be used for lawful purposes only. Any usage that violates any United States federal, state, or city law is strictly prohibited. This includes everything only using copyrighted materials or threatening or materials protected by some trade secrets. We are not responsible for the damages you suffer for violating our terms. We hold the right to change the TOS and other policies without prior notification.

Malware Suspension

We give our first priority to the data security. So we use maldet, csx for scanning our user files. If any account is caught with malware files simply that hosting account is suspended permenantly. And Won't be unsuspended any more.

Uptime

Our services all we provide maximu 99.99% Uptime. But if any damages to the server it may take longer downtime than usual. But user data is highly secured because we always maintain backups. But in that downtime user can request the money which eqauls to the time of downtime. (Example:- if the downtime is for 1 day if you buy yearly plan then price for 1 day will be calculated and can be refunded that amount)

Abuse

1. Spam is any email sent to end users that the receiver has specified they did not want to receive. Providers should ensure that customers are following the M3AAWG Sender Best Current Practices.1 Hosting providers will also want to subscribe to as many relevant Feedback Loop reports as it is possible to process.
2. Spamvertising (hosted redirect and payloads) Spamvertising occurs when a hosting provider’s end user engages a third party to advertise its Web presence. Most spam complaints are caused by end users sending emails to potential customers that tout some overhyped product or service. Spamvertising is done via a third party. Providers who receive one of these complaints are most likely in the loop either as the sender of the email or the host of the site being advertised.
3. Phishing outbound (hosting and inbound for client credentials) Phishing happens primarily when an end-user account has been compromised, almost always as a result of outdated scripts run by end users. A phishing site is a fraudulent site purporting to be a legitimate company, like Bank of America or PayPal, that directs the individual to enter confidential information. The phishers then have everything they need to rob the individual who has just been scammed.
4. Hacked or defaced pages (hosted client-side) While phishing complaints will often fall into this category, not all hacked accounts will be used for phishing. Some may simply be defaced and the end users’ data corrupted or destroyed. Frequently hackers will also inject malicious code or upload bots that are set to cause additional problems. Third parties and law enforcement agencies analyze these events and provide information about how to repair hacked sites. Most accounts are compromised due to end users’ out-of-date CMS (Content Management System) installations such as Joomla or WordPress.
5. Child sexual abuse material (hosted client-side)
6. Copyright and trademark/intellectual property issues (hosted client-side)
7. Distributed denial of service and other outbound hostile traffic (hosted amplification, redirect, botnet C&C hosts)
8. Malicious signups (whack-a-mole/multi-account, multi-platform)