Document Scope

This document is a sub-section of the , a legal agreement between Frogabog, LLC and all of our customers. If you use any service provided by or affiliated with Frogabog, you are legally bound by the . Read it carefully before signing up and ensure that you understand and agree to all parts. Use of our services implies agreement with this contract.

Any questions regarding this agreement should be sent to info@frogabog.com prior to signing up for service.


What are Resource Usage Policies?

In order to protect against resource abuse or other tragedy, we have limitations on our hosting plans.

The Purpose of These Policies

These policies are in place to protect against poor service. We only impose a restriction if an account is found to violate several policies (or one to a very serious degree) or if it is adversely affecting the server. The large majority of sites, at least 99.5%, will never have to take these limits into consideration. That being said, it is good to be aware of them.

Enforcement

It is important to note that many of these limits can be seen as "soft" limits. They are not actively enforced. If, however, the overall performance of a server is affected, we will contact the account owner in regards to these limits. If an account is found to be in violation of these policies, we will do our best to provide reasonable notice depending on the severity of the violation.

We reserve the right to temporarily suspend an account if it is causing a severe problem. Failure to fully comply with these terms is grounds for account suspension and/or termination. If we terminate your account for violating our policies, you will forfeit all rights to a refund--and none will be given.

This list is not all encompassing. Frogabog will be the sole arbiter as to what constitutes a violation of the RUP, and reserves the right to deactivate and remove any site for any violation of this policy, without prior notice and without refund.


General Content & Service Policies

Unsolicited Bulk/Commercial Email / SPAM

SPAMing, or the sending of unsolicited email, from a Frogabog server or using a return email address that is maintained on a Frogabog server is STRICTLY prohibited. Using SPAM to advertise a site hosted on Frogabog's network also constitutes as a violation of this provision.

The transmission of SPAM from our servers and networks can cause irreparable monetary and reputation damage. All damages caused by spamming will be prosecuted to the fullest extent of the law. Frogabog will be the sole arbiter as to what constitutes a violation of this provision.

Any account on our servers or networks that is sending SPAM will be immediately terminated without advanced notice.

Help us STOP SPAM! Please email us at immediately to report a violation of our SPAM policies.

Backups

Frogabog's hosting is not allowed to be used for data backup or storage.

Reselling

Reselling is not allowed on our Shared Hosting plans. Reselling is allowed on Reseller Hosting, a Managed VPS or an Unmanaged VPS.

Non-acceptable Content

This is not an exhaustive list.

Adult Content
Under no circumstance is adult content permitted on Frogabog's servers or networks. All adult oriented pictures, videos, links, written content and similar is strictly prohibited. Should you require hosting for adult oriented content, please contact a host who specializes in this type of hosting.

Email and Mailing Lists

Additional Policies

Shared/Reseller Resource Usage Policies

This section only applies to Shared Hosting and Reseller Hosting products.

Chat Applications

All interactive chat web applications are strictly prohibited on Frogabog's servers. This includes but is not limited to chat applications written in PHP, Perl, CGI, Python, Ruby, etc. in addition to IRC or IRC bots. Any web application that provides 'real-time' chat is not permitted. Shoutboxes, Chatboxes and other web based chat programs other than those specifically provided by Frogabog are prohibited.

Web Applications & Web Accessible Scripts
All web applications that are out of date and actively being exploited will be shut down immediately without notice. As a webmaster you should evaluate your web based applications and scripts on a regular basis to ensure they're secure and up to date.

Processes
Processes invoked by the web server, cron, shell or any other method should not exceed the following limitations:

Database Restrictions

Files and Directories

Web

Email and Mailing Lists

Cron Jobs

Shell