Zone Media’s Acceptable Use Policy

Welcome, dear customer!

Thank you, for choosing us as your service provider! We appreciate your business and hope to live up to your expectations.

As you may already know, it is our mission to help entrepreneurs and businesses online in a secure, economic and reliable manner.

With us, you can:

  • register domain names
  • host e-mail addresses
  • host websites
  • host web-based applications
  • host e-commerce stores
  • etc.

This document forms an integral part of our Terms of Service (ToS).

It is the purpose of this document to make sure, that we have a common understanding regarding what is and is not acceptable or expected behaviour in our relationship with you.

We strongly believe that the Internet performs best when everyone is respectful of each other.

So, let’s get down to defining the “house rules” or our Terms of Service.

Mutual commitment to proper and respectful behaviour

First, let’s clear some air regarding our behaviour towards you and your data.

We run an old-fashioned business, we provide you with a service and you pay for said service. We do not take advantage of our relationship in a way that might be modern, but which might be deemed nefarious by reasonable people.

WE WILL NOT:

  • sell your data to third parties
  • sell data about you to third parties
  • ambush you with hidden fees
  • unexpectedly lock you into service
  • overtly aggressively up-sell you stuff, that you don’t actually need.

In return, we ask you to BE CONSIDERATE towards your fellow customers and to us, your service provider. The Internet and our platform are shared resources, selfishness and greed usually cause more problems when they are worth.

Act lawful

YOU ARE RESPONSIBLE for everything that you store, run or process on our servers.

You MUST NOT use our services for:

  • anything considered illegal in the European Union or its member states
  • anything that violates our rights or the rights of third parties.

Don’t damage anyone or anything

Your action (or inaction) MUST NOT disturb or hinder the normal operation of our services or cause damage to anyone or their property.

Do not abuse our services

As the party holding the relevant technical information, we reserve the right to decide whether your action (or inaction) may count as abusive toward others.

You MAY NOT use or store applications or scripts on our platform that are used to:

  • compromise our security
  • compromise the security of others
  • send Spam (Junk) e-mail (remember, it is the recipient who determines what is Spam)
  • provide services that raise the risk, that our platform can be used for illegal purposes by third parties (open proxies, TOR nodes, DDoS amplifiers etc)
  • mine blockchain
  • hinder Zone’s ability to offer our services in any other way.

Our right to suspend your services

If your actions are in breach of the rules above, we have the right to suspend services offered to you, until the issue has been corrected.

Be secure

Please maintain a good information security posture, appropriate for our digital age. We will try to help you as much as possible, by keeping our platform secure by default.

Keep your applications up-to-date. We vigilantly monitor the layers of the software stack under our management for security and functionality related updates and deploy them regularly, according to our risk assessments, we suggest you do the same.

Regularly back up the data, you host on our servers. Most of our services include a backup component, which means that we make regular backups of your data. However, we maintain that you also back your important data, so that you are able to recover if our backups are not available for whatever reason.

Backups

While we are on the subject of backups, maybe it is a good time to explain how our backups work.

There are two types of backup schemes in use by us.

Regular backups are included with most of our managed services, including web hosting and the following applies to our backup policy:

  • one backup must be created of a customer resource in a 24H time window;
  • the backup must remain usable for restoration for 14 days;
  • the backup must be stored at a separate physical location;
  • the backup must be destroyed after 14 days.

Advanced backups are used for services that are based on distributed data storage:

  • a copy of the data must exist in storage at two physical locations (minimum);
  • a copy of the data must remain usable for restoration in storage for 14 days, even if the customer deletes it at the application level;
  • after 14 days the deleted data must be destroyed.

Your service plan will include a set amount of storage for backed up data, but you can purchase more if needed.

Acceptable resource use limits

Limits Value
Recipients via SMTP within 24 hours 2000
Forwarding via SMTP within 24 hours 10000
Automatic replies within 24 hours 2000
Number of recipients per letter 400
Number of messages sent to a unique recipient within 1 hour 100
Number of incoming messages per minute 60
Failed logins per second 12
Number of IMAP concurrent connections 25
POP3 maximum number of messages 250
Volume of data downloaded via IMAP within 24 hours 10 GiB
Volume of data downloaded via POP3 in 24 hours 10 GiB
The volume of data uploaded via IMAP within 24 hours 5 GiB

Limits in web browsing SQL

Limits Väärtus
Maximum number of rows in a MySQL/MariaDB database 50 000 000