Why Choose Us

Not fully convinced to choose ExcellentHost or want to know what distinguishes us from the myriad of other webhosting companies? No problem! We have compiled an interesting list of reasons that most customers select us on the basis of our features, performance, reliability and more. Of course, if you have any specific needs or would like to see which plan is right for you, don't hesitate to contact our sales department at sales[at]excellenthost.com.

Acceptable Use Policy

Please Read All Following Contractual Terms Carefully

(Last Update : September 2007)

By submitting the online order form, or by using ExcellentHost Enterprises' service, Customer hereby agrees to ExcellentHost Enterprises' Terms of Service (TOS), Acceptable Use Policy (AUP), No Spam Policy (NSP), and Privacy Policy.

Unless otherwise specified, in this TOS, the AUP, the NSP, and the Privacy Policy, the usage of “us”, “we”, “our”, and “ours” shall refer to ExcellentHost Enterprises, a company based in Canada, and all its parents, subsidiaries, successors, and assigns. The usage of “you”, “your”, “they”, and “them” shall refer to the Customer of ExcellentHost Enterprises.

Note that the most current version of our Agreements on our website supercedes any previous agreements, arrangements or terms noted at any other time in the past or present. All Customers agree to be regulated by our Agreements and must make every effort to follow its terms. Failure to comply with any sections of our Agreements will result in corrective action at our sole discretion. Refer to Section 1 of the Acceptable Use Policy for further information
1. Introduction, Purpose, and General Terms.
1.1. This Web site gives you the ability to learn about ExcellentHost Enterprises and its productsand services as well as the ability to access our network and services (“ExcellentHost Enterprises Services”). By using this site, and any other sites or services owned, operated, or providedby ExcellentHost Enterprises, you signify your agreement to the terms, conditions and notices of this policy. “You” when used in the Agreement shall mean the ExcellentHost Enterprises Customer of record and that ExcellentHost Enterprises Customer’s end users.
1.2. This Acceptable Use Policy is used in conjunction with the terms of service (TOS), the No-Spam Policy (NSP), and the Privacy Policy. Violating any of these policies and agreements grants ExcellentHost Enterprises the authority to take action to restrict or terminate your access to ExcellentHost Enterprises Services. ExcellentHost Enterprises reserves the right, at its sole discretion, to update or revise this policy, any other policy or statement on any ExcellentHost Enterprises Web site, and any product offerings or programs described on any ExcellentHost Enterprises Web site. Please check back periodically to review any changes to this policy.
1.3. This document sets forth the principles, guidelines and requirements of the Acceptable Use Policy of ExcellentHost Enterprises (“Company”) governing the use by the Customer (“Customer”) of the Company’s services and products (“Services and Products”). The purpose of ExcellentHost Enterprises Acceptable Use Policy (the AUP”) is to comply with all international, federal, state, and local laws and to protect the network security, network availability, physical security, Customer privacy, and other factors affecting the services provided by ExcellentHost Enterprises. ExcellentHost Enterprises reserves the right to impose reasonable rules and regulations regarding the use of its services provided to all Customers and such rules and regulations are subject to change.
1.4. In order to maintain an informative and valuable service that meets the needs of the users of this site and ExcellentHost Enterprises Services, the rules in this AUP have been established to protect against abuse. The AUP is not an all-inclusive, exhaustive list and ExcellentHost Enterprises reserves the right to revise, amend, or modify the AUP at any time as needed, effective upon either the posting of the revised, amended, or modified AUP to


or notification to the Customer via e-mail to the e-mail address of Customer as set forth in the Service Descriptions.

1.5. Any violation of the AUP may result in the suspension or termination of your account or such other action, as ExcellentHost Enterprises deems appropriate. No credits will be issued for any interruption in service resulting from violations of the AUP.
1.7. Any questions or comments regarding the AUP should be directed to ExcellentHost Enterprises by e-mail to the following e-mail address

support@excellenthost.com, for issues concerning the AUP.
2. General Prohibitions.
You may not use this site or ExcellentHost Enterprises Services for any purpose that is unlawful or in any manner that could damage, disable, overburden or impair the operation of this site, the ExcellentHost Enterprises Network, or ExcellentHost Enterprises Services, or any other party’s use or enjoyment of this site, the ExcellentHost Enterprises Network, or ExcellentHost Enterprises Services.
2.1. You may not use this site or ExcellentHost Enterprises Services for any purpose that is unlawful or in any manner that could damage, disable, overburden or impair the operation of this site, the ExcellentHost Enterprises Network, or ExcellentHost Enterprises Services, or any other party’s use or enjoyment of this site, the ExcellentHost Enterprises Network, or ExcellentHost Enterprises Services.
2.2. Adult Content Prohibited on ALL Servers
2.2.1. Adult-oriented sites demand special system, network, and bandwidth requirements. ExcellentHost Enterprises does not accommodate those extraordinarily large requirements in its standard shared, reseller or Windows-based hosting plans on all servers. Therefore you may NOT use ExcellentHost Enterprises services for adult-oriented, pornography and/or related material as they are strictly prohibited. This includes sites that may include sexual content, or links to adult content elsewhere.
2.2.2. Where allowed by applicable law, ExcellentHost Enterprises does not prohibit you from posting a static Web page that meets all of the following criteria:
  • the page merely advertises an adult service and provides information about how to contact the service offline, i.e., by telephone, facsimile, or postal mail and not via a link from a Web site that uses ExcellentHost Enterprises services;
  • the page does not display any sexually explicit content and does not link to any Web page or site displaying any sexually explicit content; and
  • the page does not require a user to log in with a username or password to access any of the Web site’s content.
2.2.3. In some jurisdictions, even the notice andadvertisement of adult-oriented services maybe illegal. It is your sole responsibility tolearn the laws that govern what you are and arenot allowed to post on your Web site. As partof your agreement with ExcellentHost Enterprises, you mustcomply with all such applicable laws.

However, ExcellentHost Enterprises cannot and does not adviseyou or make any recommendations to you aboutthe existence of any such laws in a particularjurisdiction. Nor does ExcellentHost Enterprises advise youabout how to comply with any such laws. Furthermore,laws vary throughout the United States of Americaand all over the world, so you should contactyour legal advisor for more information and specificrecommendations concerning the kinds of onlinematerials that are legal in your region.
2.2.4. If you use ExcellentHost Enterprises service topublish any content that any applicable law deems “harmful,” “inappropriate,” or “unsuitable” forminors (persons under 18 years of age), thenyou must provide appropriate protection to preventminors from accessing that content. Such protectionis your sole responsibility because ExcellentHost Enterprises does not censor the content of your Websites and pages.
2.2.5. If you have a reseller account with ExcellentHost Enterprises, you may not resell our hosting services to any clients or customers that sell adult content.
2.2.6. You may not use ExcellentHost Enterprises servicesto sell or solicit sales for any of the followingitems, products or services because they areor may be illegal in one or more jurisdictionswhere ExcellentHost Enterprises services are offered,or where they can be viewed through ExcellentHost Enterprises services:
  • Online pornography or adult content for which a viewer must subscribe to access it,
  • Adult content-related products or services (including X-rated videos, pictures, etc. especially of individuals under 18 years of age), and
  • Obscene materials, as defined by law.
If we find any of your sites (or any of the sites of your customers, if you have a reseller account) to be selling any of the prohibited products or services, the offending accounts shall be subject to immediate account termination.
3. Compliance with Law.
Customer shall not use ExcellentHost Enterprises Service or any other service or network to post, upload, transmit, retransmit, store, distribute or facilitate the distribution of any content, including without limitation text, communications, software, images, sounds, data, or other information that, in ExcellentHost Enterprises sole discretion:
3.1. violates, attempts to violate,or helps any third party to violate any local,state, federal, international, or non-UnitedStates law, ordinance, or regulation,
3.2. is threatening, obscene, indecent,pornographic, abusive, harassing, libelous, defamatory,deceptive, fraudulent, invasive of another’sprivacy, tortious, inaccurate, or that otherwisecould adversely affect any individual, groupor entity (collectively, “Persons”),
3.3. threatens or encourages bodilyharm or destruction of property,
3.4. harms any person,
3.5. victimizes, harasses, degrades,or intimidates an individual or group of individualson the basis of religion, sex, sexual orientation,race, ethnicity, national origin, immigrationstatus, age, disability, or any other reason,
3.6. is posted in violation of a newsgroupcharter,
3.7. contains viruses, corrupted files,or any other similar software or programs thatmay damage the operation of another’s computer,
3.8. violates any terms or conditionsof any other network access provider or Internetservice provider,
3.9. violates the rights of any person,including rights protected by copyright, tradesecret, patent or other intellectual propertyor similar laws or regulations including, butnot limited to, the installation or distributionof “pirated” information contentor data or other software products that are notappropriately licensed for use by Customer. Customershall be responsible for determining what lawsor regulations are applicable to its use of theServices and Products,
3.10. adds, removes, or modifies identifyingnetwork header information in an effort to deceiveor mislead any person. Additionally, attemptingto impersonate any person by using forged headersor other identifying information is prohibited.However, the use of anonymous remailers or nicknamesdoes not by itself constitute impersonation,unless such use is made with the intent to deceive,defraud, or mislead any person or to violateany applicable laws or regulations,
3.11. collects, attempts to collect,or helps any third party to collect personalinformation about third parties without theirknowledge or consent or in a manner that violatesapplicable laws concerning privacy,        
3.12. has a negative effect on ExcellentHost Enterprises or its network (including, without limitation, overloading servers on the ExcellentHost Enterprises Network; causing portions of the ExcellentHost Enterprises Network to be blocked by other network providers; generating unresolved third party complaints or complaints which, in the discretion of ExcellentHost Enterprises, impose an unreasonable administrative burden on ExcellentHost Enterprises; etc.), or
3.13 violates the prohibition on terrorist content and activities described below.
Terrorist Content Prohibited.

3.13.1. The United States Homeland Security Act of 2002 defines “terrorism” as

“any activity that—

(A) involves an act that—

(i) is dangerous to human life or potentially destructive of critical infrastructure or key resources; and

(ii) is a violation of the criminal laws of the United States or of any State or other subdivision of the United States ; and

(B) appears to be intended—

(i) to intimidate or coerce a civilian population;

(ii) to influence the policy of a government by intimidation or coercion; or

(iii) to affect the conduct of a government by mass destruction, assassination, or kidnapping.”

(Pub. L. 107-296 (2002) § 2(15)).

3.13.2. You may not use ExcellentHost Enterprises services to do any of the following acts by any means, or resell ExcellentHost Enterprises services to any individual or organization that you know to be doing any of the following acts by any means: engage in terrorism, solicit any other individual or organization to engage in terrorism, conspire with any other individual or organization to engage in terrorism, help any other individual or organization to engage in terrorism, or knowingly engage in commerce with any of the following individuals or organizations those persons listed in the Annex to the Executive Order No. 13225 of President George W. Bush (September 25, 2001) (referred to in this AUP as “the Executive Order”), as it may be amended from time to time, a copy of which is available online at the following Web page:

http://www.ustreas.gov/offices/enforcement/ofac/legal/eo/13224.pdf foreign persons that the Secretary of State of the United States of America has determined have committed or pose a significant risk of committing acts of terrorism against the United States or its people; businesses and organizations that the Secretary of State of the United States of America has determined are owned, controlled by, or acting on behalf of terrorists or persons suspected of terrorism; and persons whom the Secretary of the Treasury of the United States of America , in consultation with the Secretary of State and the Attorney General of the United States of America , has determined are: helping terrorists or suspected terrorists by giving them money, material, or technology; or associated otherwise with terrorists or suspected terrorists.

3.13 .2.5.5. transactions that avoid or attempt to avoid the prohibitions of the Executive Order; and

3.13 .2.5.6. conspiracies to violate the Executive Order; knowingly engage in transactions or dealings in money, goods, or services with terrorists, suspected terrorists, or terrorist organizations; or make donations to terrorists and suspected terrorists.

3.13.3. While ExcellentHost Enterprises is not giving you legal advice or a consulting recommendation about how to comply with this no-terrorism policy or with the applicable laws that prohibit terrorism in the United States of America or in other countries, you may find the following general strategies helpful in complying with these requirements. Verify the identity of any person who wants to buy goods, services, or information through your Web site. This includes, but is not limited to, the resale of ExcellentHost Enterprises hosting services. Check the names of any persons or organizations attempting to buy from your Web site against the Annex in the Executive Order. Work with the company that provides transaction payment and fraud-prevention services for your e-commerce Web sites. The provider may be able to automate the identity checking for you.

4. System and Network Security.

Violations of system or network security are strictly prohibited, and may result in criminal and civil liability as well as termination of services from ExcellentHost Enterprises. ExcellentHost Enterprises investigates all incidents involving such violations and will cooperate with law enforcement if a violation of the criminal law is suspected.

You are responsible for any misuse of your account, even if a friend, family member, guest, agent, or employee committed the inappropriate activity while using your account. Therefore, you must take steps to ensure that others do not gain unauthorized access to your account. In addition, you may not use your account to breach the security of another ExcellentHost Enterprises account or attempt to gain unauthorized access to another network or server.

Examples of system or network security violations include, without limitation, the following:

4.1. Introduction into the network or server of any malicious program (examples: viruses, worms, Trojan Horses, logic bombs, and other executables intended to inflict harm).
4.2. Introduction into the network or server of any self-extracting file or program containing any malicious program as specified in Section 4.1 of this AUP.
4.3. Introduction into the networkor server of any data, parameter, configuration,template, or control files for software applicationsthat contain destructive macros or other maliciouscode.
4.4. Introduction into the network orserver of any encrypted or compressed file orarchive such as .zip or .gz files that containsany malicious program as specified in paragraphs4.1 through 4.3 of this AUP.
4.5. Effecting security breaches ordisruptions of Internet communication and/orconnectivity. Security breaches include, butare not limited to, accessing data of which theCustomer is not an intended recipient, logginginto a server or account that the Customer isnot expressly authorized to access, or exceedingthe access to a server or account that has beengranted to the Customer. For purposes of thissection, “disruption” includes,but is not limited to port scans, flood pings,email-bombing, packet spoofing, IP spoofing,and forged routing information.
4.6. Executing any form of network activitythat will intercept data not intended for theCustomer.
4.7. Circumventing user authenticationor security of any host, network or account.
4.8. Interfering with or denying serviceto any user other than users of the Customer’shost (examples: denial of service attack or distributeddenial of service attack).
4.9. Using any program script/command,or sending messages of any kind such as a punter,designed to interfere with or to disable, a user’sterminal session, via any means, locally or viathe Internet.
4.10. Attempting to use or gain unauthorizedaccess to data, accounts, hosts, servers, systemsor networks of this site, or to probe, scan ortest the vulnerability of a system or networkof this site, any ExcellentHost Enterprises Services or thoseof any other party.
4.11. Interfering with service to anyuser, host or network including, without limitation,mail-bombing, flooding, or attempting to overloadthe system.
4.12. Forging any TCP-IP packet headeror any part of the header information in an e-mailor a newsgroup posting.
4.13. Falsifying address informationor otherwise modifying e-mail headers to concealthe sender’s or the recipient’s identity.
5. Internet Etiquette.
The Customer agrees to observe and abide by reasonable Internet etiquette (Netiquette). The Customer shall comply with the rules appropriate to any network to which ExcellentHost Enterprises may provide access. The Customer should not post, transmit, or permit Internet access to information the Customer desires to keep confidential. The Customer shall not post any material that is illegal, is libelous, is otherwise tortious, indecently depicts children, or is likely to result in retaliation against ExcellentHost Enterprises by offended users. ExcellentHost Enterprises reserves the right to refuse or terminate service at any time for violation of this section. This includes, but is not limited to, advertising services or sites via Internet Relay Chat (IRC) or USENET in clear violation of the policies of the IRC channel or USENET group.
6. Child Pornography.

ExcellentHost Enterprises will cooperate fully with any criminal investigation into a Customer’s violation of the Child Protection Act of 1984 concerning child pornography, or any other applicable international, federal, state, or local law that prohibits child pornography. Customers are ultimately responsible for the actions of their clients over ExcellentHost Enterprises network, and shall be liable for illegal material posted by their clients.

According to the Child Protection Act, child pornography includes photographs, films, video, or any other type of visual presentation that shows a person who is or is depicted as being under the age of eighteen years and is engaged in or is depicted as engaged in explicit sexual activity, or the dominant characteristic of which is the depiction, for a sexual purpose, of a sexual organ or the anal region of a person under the age of eighteen years or any written material or visual representation that advocates or counsels sexual activity with a person under the age of eighteen years.

Violations of the Child Protection Act may be reported to the U.S. Customs Agency at 1-800-BEALERT

7.1. Customer shall comply with all the terms and conditions of ExcellentHost Enterprises No-Spam Policy (NSP) as described in this Section 7. Violation of the NSP shall be deemed a violation of this AUP and of the Customer’s Agreement with ExcellentHost Enterprises.
7.2. At ExcellentHost Enterprises, we are committed to providing valuable hosting services to our valued customers.
7.3. An important part of ExcellentHost Enterprises mission is to be a respected and responsible member of the business and Internet communities. We take seriously our role in protecting our customers and the general public from nuisances such as “spam.” This section describes our NO-SPAM Policy. Please read it carefully, because it contains important information and because it is a material part of your Agreement with ExcellentHost Enterprises.
7.4. To report any spam you receive that identifies itself as coming from the excellenthost.com servers or claims to be related to ExcellentHost Enterprises in any way, please send an e-mail message to us at support@excellenthost.com. In your message to us, please include a complete and accurate copy of the message that you consider to be spam, along with full message headers and routing information for e-mail, a message board provided by a Web site or an online service, Usenet, interactive chat message, or instant message service, as the case may be.
7.5. Definition of Spam.

Unsolicited commercial e-mail and electronic messages are colloquially referred to as “spam.” Other common names for spam include “spam e-mail,” “junk e-mail,” “bulk e-mail,” “direct e-mail,” and “mass e-mail.” Spam is the electronic equivalent of the direct mail you receive in your postal mailbox frequently.

In its most general terms, and as used in this NO-SPAM Policy (the “Policy”), spam is:

a commercial e-mail message or other electronic message, including, but not limited to, messages that are:
posted to an electronic mailing list (other than an “opt-in” e-mail list as described below),
posted on an online bulletin board system or Web-based message board system or “guest book”,
  • posted to a Usenet newsgroup,
  • posted to the common area of an online community,group, or club,
  • posted in a chat room,
  • posted in a message board of a commercial onlineservice (such as America Online),
  • posted to a Weblog (“blog”),
  • sent via an instant message system (such asICQ, Yahoo! Pager, Yahoo! Instant Messenger,or AOL Instant Messenger),
  • sent through e-mail or another Internet meansof communication when the message’s ultimatedestination is a facsimile (“fax”)machine, cellular or wireless telephone, or wirelessdevice,
  • a commercial e-mail message or other electronic message that is addressed to one or more recipients with whom you do not have an preexisting business or personal relationship
  • a commercial e-mail message or other electronic message that is sent to a mailing list of addresses that you purchased or that were otherwise distributed, or any list of e-mail addresses whose owners did not sign up for your specific mailing list, including without limitation lists commonly known as “affiliate lists,”
  • a commercial e-mail message or other electronic message that is not sent at the request of, or with the express consent of, the recipient(s),
  • a commercial e-mail message or other electronic message that is sent to a recipient who has opted out of receiving further commercial electronic messages from you, or
  • a commercial e-mail message or other electronic message that contains forged headers, compromised mail server relays, or false contact information.
  • For purposes of thisPolicy, spam also includes any e-mail or otherelectronic message that is sent in violationof any applicable Federal, state, or local lawregulating unsolicited commercial e-mail, unsolicitedfax transmissions, or any other type of unsolicitedcommercial electronic message, regardless ofwhether that message fits the definition of “spam” providedabove.
    “Opt-in” E-mail Lists.
    Please note: messagessent to “opt-in” e-mail lists arenot spam, for purposes of this Policy, providedthat those messages meet all of the followingcriteria:
    the messages are sent to an “opt-in” e-mail list in which ALL subscribers have VOLUNTARILY agreed to receive announcements and advertisements about products and services;
    the messages STRICTLY COMPLY with ALL the requirements and regulations of the “opt-in” e-mail list; and
    upon request of any subscriber to the “opt-in” e-mail list, you immediately stop sending that subscriber any e-mail regarding your products and services.

    If you choose to use an “opt-in” e-mail list, please be aware that ExcellentHost Enterprises will consider ANY violation of the requirements or regulations of such any third party provider of software or services for such a list to be a violation of this NO SPAM Policy.

    Furthermore, ExcellentHost Enterprises reserves the right to prohibit “opt-in” e-mail lists in the future if such a prohibition is reasonably necessary to keep its hosting service operating efficiently for all users.

    Zero Tolerance for Spam.

    ExcellentHost Enterprises will not tolerate any spamming by any of its Customers. This prohibition of spam extends to the sending of unsolicited mass mailings from another service, which in any way implicates the use of ExcellentHost Enterprises services whether or not the message actually originated from our network.

    Violation of this NO-SPAM policy will result in ExcellentHost Enterprises taking one or more of the following actions:

    A warning via e-mail or telephone,

    Suspension of your site until furthur notice,

    Removal of DNS for the advertised/originating site, or

    Temporarily blocking outgoing mail from your site.

    Repeated violation of this NO-SPAM policy will result in immediate disconnection of service with no re-activation.

    ExcellentHost Enterprises reserves the right to take all legal and technical steps available to prevent unsolicited bulk e-mail or other unauthorized e-mail from being sent from or transmitted through the ExcellentHost Enterprises Network.

    PLEASE NOTE: The transmission of spam, including the transmission of counterfeit e-mail, may result in civil and criminal penalties against the sender, under various federal, state, and local laws and regulations, including the federal CAN-SPAM Act of 2003.

    “Indemnification of ExcellentHost Enterprises
    You agree to defend, hold harmless, and indemnify ExcellentHost Enterprises from any harm or damages whatsoever resulting directly or indirectly from your engaging in any spamming practices or from your violation of any of the terms of this NO SPAM Policy.
    Mail Usage Resource Limits
    You agree not exceed the following mail usage limits for shared, reseller and Windows accounts:
    Per Hour Maximum: 100-150 email messages
    Per Day Maximum: 200-250 email messages
    Any mail usage exceeding the above limits or approaching limits are subject to policy enforcement by our Abuse Department. Mailing lists, email newsletters, single emails, and other types of messages are all counted in the global quota. These scripts MUST be setup to throttle amount of emails sent in a defined period, and MUST be significantly below the above limits. The nature of emails sent must also comply with all guidelines and requirements outlined on our policies. Your account may be suspended, or terminated, at our discretion without prior notice if any of these policies are violated. These limits are in place to allow for fair usage for all our customers on our shared servers, therefore it is in your best interests as a customer to rigourously adhere to these policies. If you require higher email usage we strongly recommend looking into one of our VPS or dedicated server plans, or using a third-party mailing list/newsletter service to dispatch larger amounts of emails. Contact our sales department for more information regarding options
    This policy is subject to change without notice and may be adjusted at any time or under any circumstances at our discretion, to ensure continued reliability and performance of all our services.
    8. No Editing, Censoring, or Control of Communications; Reservation of Rights.
    Your participation in online communication or use of any ExcellentHost Enterprises service is not edited, censored, or otherwise controlled by ExcellentHost Enterprises. However, ExcellentHost Enterprises reserves the right to monitor content on this site and on any ExcellentHost Enterprises servers, networks, or systems and to remove content, disable sites, or suspend or terminate services if ExcellentHost Enterprises, in its sole discretion, determines such content or user practices are harmful, offensive, or otherwise in violation of this Acceptable Use Policy.
    9. Export Control Laws.

    Exporting encryption software over the Internet from the United States of America to countries other than the United States of America and Canada violates United States law, unless you have a license to do so from the Bureau of Industry and Security in the United States Department of Commerce. You are solely responsible for determining whether any of your software or other information contains encryption software and whether you require a license to export your software or information. You are also solely responsible for complying with all applicable laws governing the export of encryption products. For additional information, you may wish to visit the Bureau of Industry and Security’s Web site at:


    10. International Use.
    ExcellentHost Enterprises makes no representation that materials available on this site or any or through any ExcellentHost Enterprises service are appropriate or available for use in locations outside the United States, and accessing them or using them from territories where their contents are illegal is prohibited. Customers and their users who access this site or any site hosted by ExcellentHost Enterprises from locations outside the United States of America are solely responsible for compliance with all applicable local laws and regulations. Moreover, to the extent allowed by law, Customers agree to defend, indemnify, and hold harmless ExcellentHost Enterprises, its parents, subsidiaries, partners, joint venturers, employees and agents, and all their respective heirs, successors, and assigns for any acts of Customer or Customer’s users that may violate any applicable law.
    11. Intellectual Property Rights.
    All ExcellentHost Enterprises Web site design, text, graphics and the selection and arrangement thereof are the copyrighted work of ExcellentHost Enterprises © 2006. All rights reserved. If any page, information, or content is copied, it may only be copied for non-commercial uses that are explicitly allowed under the Customer’s Agreement with ExcellentHost Enterprises or by law, and ExcellentHost Enterprises shall, in any event, retain all copyright and other proprietary interests in said page, information, or content.
    You acknowledge and agree that copyrights, trademarks, service marks, patents, trade secrets, and other proprietary rights and laws protect all content and materials available on this site or through any ExcellentHost Enterprises service. Nothing on any ExcellentHost Enterprises Web site shall be interpreted or implied in such a way as conferring any license or right to any intellectual property rights or license to any intellectual property, content, technology, system, process, or related material belonging to ExcellentHost Enterprises by virtue of it being displayed or made accessible on any ExcellentHost Enterprises Web site. Except as expressly authorized, you agree not to use this site or any ExcellentHost Enterprises Services in any manner that would infringe, violate, dilute or misappropriate any such rights, with respect to any material, which you may access, receive or make available through this site or any ExcellentHost Enterprises Services.
    If you use a domain name or content in connection with the ExcellentHost Enterprises Web hosting, or any other Web hosting service, you agree not to use that domain name or content in any way which violates any trademark, service mark, or similar rights of any third party. Specifically, and without limitation, you agree that you will not engage in, attempt to engage in, or conspire with others or solicit others to engage in any cybersquatting or domain name hijacking,
    ExcellentHost Enterprises data center infrastructure including all hardware, software, and telecommunications facilities located in its data center may only be used for lawful purposes. Transmission, distribution, or storage of any information, data or material in violation of any United States or state regulation or law or the common law, or any applicable foreign or international law is prohibited. This includes, but is not limited to, material protected by copyright, trademark, patent, trade secret, or other intellectual property rights.
    1.5. Creating, utilizing, or distributing unauthorized copies of software or other information content is a violation of international, federal, and state law. If you copy, distribute, or install software or other information content in ways that the license to use that content does not allow, you are violating federal copyright law and international copyright law. ExcellentHost Enterprises will cooperate with all law enforcement agencies in relation to alleged copyright infringement based on content housed in our data centers.
    1.6. Please see Copyright Infringement Reporting on the ExcellentHost Enterprises Web site for procedures on disclosing alleged copyright infringement.
    12. Customer’s Grant of Limited License to ExcellentHost Enterprises; Warranties on Content.
    By posting or submitting content to any ExcellentHost Enterprises Web site or server, you:
    Grant ExcellentHost Enterprises a limited license to transmit, copy, store, back up, and retrieve the content, solely for the purpose of providing you with the services you are purchasing under your Agreement with ExcellentHost Enterprises;

    Acknowledge that you are placing data on servers, networks, and systems that reside physically in the United States. Such servers, networks, and systems are governed by United States law and not by the laws of other jurisdiction. As such, your rights to privacy are governed by United States law and the ExcellentHost Enterprises privacy policy. By ordering or using ExcellentHost Enterprises services, you explicitly consent to this provision regarding privacy.


    Warrant and represent that you own or otherwise control all of the rights to the content and that public posting and use of your content by ExcellentHost Enterprises does not and will not infringe or violate the rights of any third party; and
    Agree to defend, hold harmless, and indemnify ExcellentHost Enterprises for any claims of any third party resulting from the public posting or use of your content.
    13. IP Allocation.
    ExcellentHost Enterprises administers an Internet network on which multiple Customer servers reside. Customers shall NOT use Internet protocol (IP) addresses that were not assigned to them by ExcellentHost Enterprises staff or network administrators.
    14. Restrictions on Use of ExcellentHost Enterprises Services.
    You may not operate Internet Relay Chat (“IRC”) servers using ExcellentHost Enterprises services.
    You may not run any IRC robot on any IRC server that might interfere with the Services or otherwise violate this AUP. When logged into any IRC server, you must comply with the rules and policies established by that IRC’s service administrator.
    You must not use any programs that may or will interfere with another’s use of this site or any ExcellentHost Enterprises Services.
    You may not run any background processes on the ExcellentHost Enterprises servers, networks, or systems without prior written authorization from ExcellentHost Enterprises.
    You may not use any ExcellentHost Enterprises services to send denial-of-service (DOS) attacks to any computer or network, or to “flood” any computer or network.
    ExcellentHost Enterprises reserves the right to add further restrictions to Customers’use of the ExcellentHost Enterprises Services if such further restrictions are reasonably necessary to keep its hosting service operating efficiently for all users.
    15. Suspension and Cancellation.
    ExcellentHost Enterprises reserves the right to suspend, terminate or cancel any service to any Customer or individuals using our network or services for violation of the AUP, the NSP, the Privacy Policy, or the TOS. ExcellentHost Enterprises will use reasonable care in notifying the Customer and in resolving the problem in a method resulting in the least amount of service interference as reasonably possible. However, it is ultimately the affected individual's responsibility to make contact as we reserve the right to perform any actions without notice at our discretion. ExcellentHost Enterprises's Abuse Department may take up to 72 hours or more to conduct research and decide on appropriate actions or consequences to regulate any problem(s) encountered before making contact if deemed necessary. ExcellentHost Enterprises reserves the right to terminate service without notice for continued and repeated violations of the AUP, the NSP, the Privacy Policy, or the TOS.
    16. Notices Regarding Violations of AUP and Intellectual Property Rights.
    The ExcellentHost Enterprises Agreement and all its components prohibit acts of copyright and trademark infringement and other unlawful behavior by ExcellentHost Enterprises Customers. ExcellentHost Enterprises takes Customer violations seriously and will investigate complaints and, where appropriate, may remove content, disable sites, suspend or terminate services, or take other action as necessary.
    General Complaints: Please send reports of any activity in violation of this Acceptable Use Policy to support@excellenthost.com. If possible, please provide the IP address used to commit the violation, the date and time of the violation, and evidence of the violation. ExcellentHost Enterprises will reasonably investigate incidents involving such alleged violations. ExcellentHost Enterprises may involve and will cooperate with law enforcement officials if any criminal activity is suspected. Violations may result in criminal and civil liability.
    Copyright/Trademark Infringement Complaints: If you believe that your copyright or trademark has been used by a ExcellentHost Enterprises subscriber without permission, such that the use may constitute infringement of your intellectual property rights, please contact our Abuse & Policy Department at abuse@nsglobalhost.net

    17. Resource Usage.
    You agree to not use excessive amounts of resources. Any violations may result in us taking corrective action in order maintain server stability by killing any processes, disabling and/or suspending your account.

  • Shared/reseller customers may not use more than 2% CPU daily, 2% memory daily, run more than 4 simultaneous processes per user, allow any process to run for longer than 15 CPU seconds, run any process that consumes more than 5% of available CPU at any time, or run any process that consumes more than 16 MB of memory. Databases are limited to 20 max user connections with a max query time of 5 seconds. Cron jobs must not execute more than once every hour and will be niced to 15 or greater.

    System resource limits are intended for runaway scripts, processes requiring large CPU and memory requirements from slowing down the server and causing a drop in performance. ExcellentHost Enterprises reserves the right to make adjustments to these limits at our sole discretion. If ExcellentHost Enterprises takes corrrective action, including suspension, cancelation or termination, the Customer shall not be entitled to a refund of any fees paid in advance.
  • ExcellentHost Enterprises strives to ensure the sustainability of our infrastructure and provide services as reliably as possible. Under no circumstances will ExcellentHost Enterprises allow for abuse, extortion or threats directed at our company, organization, employees, staff or customers. We will enforce our zero-tolerance policy on disruptive and negative behaviour, which may include libel, slander, bashing, written and verbal insults or threats, actions of legal nature, psychological or physical abuse.

    Furthermore, all forms of communication with our staff, customers or third-parties may NOT be shared nor transmitted under any abrogating circumstances on websites, blogs, reviews, discussion forums, by phone, in person or otherwise unless prior written consent was given by our administration. A violation of this clause will result in any action deemed necessary at our sole discretion, including suspension, termination, cancelation, legal action or other means necessary to enforce the confidentiality policy.

    19. Miscellaneous.
    All monetary amounts to which this Agreement refers shall be in United States dollars, unless otherwise noted.