1.1. These rules define the procedure for providing services by the Provider, the procedure for the Subscriber's use of such services, the interaction between the Provider and the Subscriber, as well as other matters not covered in the Agreement.
1.2. The availability of the Provider's infrastructure is ensured according to the following scheme: 24x7x365 (24 hours a day, 7 days a week, 365 days a year). For a leap year, the scheme is 24x7x366 (24 hours a day, 7 days a week, 366 days a year).
1.3. The Provider has the right to carry out preventive work, independently determining the start time and duration.
1.4. During the term of the Agreement, the Subscriber is provided with basic technical support by the Provider. Basic technical support is provided only upon request submitted through the Provider's support system (Ticket system).
1.5. Basic technical support includes consultation on matters related to the provision of services, the order of access, configuration, and use of computing environments.
1.6. The overall response time to a Subscriber's request within the framework of basic technical support is 72 hours from the time of submission.
1.7. The services of basic technical support do not include services related to:
1.7.1. Data and object recovery created by the Subscriber on the Provider's platform;
1.7.2. System administration of data and objects created by the Subscriber on the Provider's platform;
1.7.3. Issues related to the construction and administration of the Subscriber's IT infrastructure;
1.7.4. Theoretical questions of IT technologies;
1.7.5. Training of Subscriber's representatives;
1.7.6. Configuration of software and/or hardware of third-party manufacturers;
1.8. The Provider has the right to refuse technical support and close the request without resolving the substance in cases where the Subscriber's inquiry is not constructive, delayed, or does not provide the requested information, or involves offensive, disrespectful communication. In case of repeated improper behavior by the Subscriber, the Provider has the right to restrict access to the technical support section in the Subscriber's Personal account.
Rules for Providing Computing Environments
2.1. The provider offers computing environments using various virtualization technologies that differ in their capabilities.
2.2. When technically feasible, the Subscriber can independently choose the virtualization technology based on the provisions of the Agreement, these Rules, and the characteristics of the computing environments provided by the Provider.
2.3. The Subscriber is fully responsible for organizing and operating backup tools for data and objects created by the Subscriber using the Provider's services.
2.4. The Provider does not control the content of data and objects created by the Subscriber using the Provider's services (hereinafter referred to as "Content") and assumes no responsibility for the accuracy, quality, and content of such Content. If necessary, the Provider has the right to check the content of the Subscriber's computing environments or its users.
2.5. The Subscriber is prohibited from:
2.5.1. Using the services provided by the Provider to disseminate and/or publish information that violates Russian and international legislation, including placing content or links to content that is fully or partially protected by copyright and related or other rights without the permission of the rights holder;
2.5.2. Posting and/or promoting pornography, child erotica, intimate services;
2.5.3. Posting content that is malicious, defamatory; promoting hatred (discrimination) based on race, ethnicity, gender, religion, social status, and other characteristics; containing threats and/or insults; contributing to the incitement of interethnic discord; inciting violence and/or inhumane treatment of any person, group of people, animals; containing calls for unlawful activities; describing the manufacture and/or use of weapons, explosives, etc.;
2.5.4. Distributing and/or using in any way the identification and/or personal data of third parties (names, addresses, phone numbers, etc.);
2.5.5. Distributing and/or using in any way software designed to work with file-sharing networks, including, but not limited to: eDonkey, qBittorrent, BitTorrent, etc.;
2.5.6. Distributing and/or using in any way software that, by its action, is equivalent to computer viruses, hacking programs, trojans, and spyware, etc.; intended to disrupt, destroy, or limit the functionality of any computer or telecommunication software or hardware; for unauthorized access; posting information on the procedure for actions aimed at unauthorized obtaining of information, access, or disruption of the functionality of computer or telecommunication equipment;
2.5.7. Prohibited from using the Provider's Services for placing systems or elements of systems for servicing, calculating, and operating digital currencies (mining, cryptocurrency mining, "mining," distributed platforms, creating new blocks with the possibility of receiving rewards in the form of new units and commissions, etc.);
2.5.8. Violating the intellectual property rights of the Provider and/or third parties;
2.5.9. Organizing and using open (not requiring authorization and/or intended for an indefinite circle of persons) mail servers, anonymous proxy servers, teleconference servers, etc.
2.5.10. Conduct unauthorized access and network attacks, including (but not limited to):
220.127.116.11. Actions that, in the Provider's opinion, may cause damage and/or failure of the Provider's and/or third parties' hardware and software;
18.104.22.168. Actions aimed at disrupting the normal communication in the Network, including the use of settings that hinder real-time information exchange, such as "scrolling" the screen at a speed not consistent with the usual input capabilities of users, opening additional browser windows, etc.;
22.214.171.124. Transmitting meaningless and/or useless information to the software and hardware of the Provider and/or third parties, creating non-productive (parasitic) load on said equipment and/or intermediate segments of the Network;
126.96.36.199. Scanning network nodes to identify the internal structure of networks, vulnerabilities, lists of open ports, etc.;
2.5.11. Impersonate another natural person or representative of an organization, community, including providing data (names, addresses, phone numbers, logins, passwords, email addresses, etc.) that do not belong to the Subscriber or are non-existent, except in cases where the owners of this data have authorized the Subscriber to use them;
2.5.12. Falsify their IP address and other means of identification used when transmitting any data over the Internet;
2.5.13. Spread information containing advertisements in any way;
2.5.14. Advertise goods and/or services whose distribution is restricted or prohibited by the current legislation of the Russian Federation;
2.5.15. Establish and use connectivity of data and objects created by the Subscriber on the Provider's platform with sites, servers, subnets used for activities prohibited by the legislation of the Russian Federation, the European Union, or these Rules;
2.5.16. Engage in other dishonest actions, abuse the rights granted.
2.6. In case of the Subscriber's violation of the provisions of these Rules, the Provider has the right to immediately suspend the provision of services to the Subscriber, disconnect and/or delete data and objects created by the Subscriber using the Provider's services, and cancel the Subscriber's access to the Personal Account.
2.7. The Provider is not responsible for:
2.7.1. Actions (inaction) of third parties, including:
188.8.131.52. Attempts by third parties to unauthorized access to data and objects created by the Subscriber using the Provider's services;
184.108.40.206. Consequences of DDoS and other network attacks on data and objects created by the Subscriber using the Provider's services;
2.7.2. Direct or indirect damage caused to the Subscriber as a result of using (inability to use) the Provider's services, as well as for damage incurred due to errors, omissions, interruptions in operation, file deletions, defects, delays in operation or data transmission, or changes in functions and other reasons.
2.7.3. Delays, failures, incorrect or untimely delivery, loss of any information of the Subscriber.
2.7.4. The quality of the connection to the Internet network, associated with the quality of the functioning of Internet network elements, objects owned by third parties, the functioning of the equipment and software of the Subscriber, and other circumstances beyond the competence, influence, and control of the Provider.
2.8. While maintaining the established quality of services, the Provider does not guarantee their absolute uninterrupted or error-free operation and does not guarantee that the software and/or hardware produced by third parties, any other elements used to provide services, are absolutely protected from computer viruses and other malicious components.
2.9. The Provider may use means developed by third parties to counteract unauthorized access attempts, network attacks, viruses, malicious programs; however, these measures, due to objective reasons, cannot be considered by the Parties as measures guaranteeing the prevention of such phenomena and cannot be the basis for filing corresponding claims against the Provider by the Subscriber.
2.10. Upon the Provider's discovery of a DDoS or other network attacks on data and/or objects created by the Subscriber on the Provider's platform, if this attack significantly affects the performance of the Provider's hardware and software, the Provider has the right to block access to the Subscriber's computing environment for 24 hours.
2.11. When providing services, the Provider provides computing environments for the placement of Subscriber's data and/or objects and is not the initiator of information transmission, does not choose the recipient, does not affect the integrity and/or content of the transmitted information, and is not responsible for the accuracy, quality, and content of such information.
Rules for Providing Services for the Use of Third-Party Software
3.1. Services for the use of third-party software (hereinafter - Software) are provided on the terms of licensing rules established by the respective Copyright Holder. Such rules may be additionally posted in the Document section on the Provider's website. Before placing an order, the Subscriber undertakes to familiarize themselves with these rules.
3.2. Unless otherwise specified for specific software, the Subscriber is granted a non-exclusive right to use the software by reproducing it in the computer memory and using it for its functional purpose.
3.3. The Subscriber acknowledges and agrees that:
Neither the Copyright Holder nor its affiliated entities are responsible and do not compensate for losses caused by the use or inability to use the software, including data loss;
The software is provided "as is" and "as available" without any explicit or implied warranties of conformity to the Subscriber's expectations, without warranties of absence of errors, failures, vulnerabilities;
The software is not fault-tolerant;
The software is not intended for use in situations where a failure may lead to death or serious bodily harm to any person or cause serious physical harm or harm to the environment.
3.4. The Subscriber agrees to disclose information about its name and details regarding End Users - legal entities or personal data regarding End Users - individuals to the Copyright Holder and its affiliated entities.
3.5. The Copyright Holder and its affiliated entities do not provide technical support for the software.
3.6. The use of Provider's services may be restricted based on the licensing policy for specific software. The software may only be used in the Provider's computing environments.
3.7. The Subscriber is not entitled to:
Sublicense or otherwise grant the right to use the software;
Copy the software and provide copies of the software to others;
Carry out processing, decompile, disassemble, or any actions aimed at recovering (extracting) the source code, hacking technology, modifying the software;
Modify the structure of the software and/or its components;
Remove any intellectual property marks and means of identification;
Block the operation of technical means for protecting copyright;
Modify or create derivative works based on the software or any of its elements, including audio-visual content and source code;
Divide the software into component parts;
Use the software for purposes other than its intended purpose or in violation of applicable laws and granted rights.
These rules establish the basic principles of using third-party software and the subscriber's obligations when using it.
Termination Procedure of Services
4.1. The Provider may terminate the provision of services to the Subscriber or terminate contractual relations with the Subscriber unilaterally, simultaneously sending an electronic notification, regarding the services or any additional service within the framework of the main service, if the Subscriber is involved in actions that violate the rules and norms of using the service outlined in the Agreement, its Appendices, and Additions.
4.2. In case of termination of the provision of services, its part, and any additional service within the framework of the main service based on clause 4.1 of this Agreement, the subscription fee is non-refundable and is directed towards penalty retention.
4.3. When terminating the provision of services, the Provider is not responsible for notifying or not notifying the Subscriber about the termination of services and for the possible consequences arising from such notification or its absence.
4.4. In case the Subscriber does not make a timely payment for the computing environment, the Provider suspends the provision of services to the Subscriber for a period not exceeding 3 days. After the specified period from the suspension of services, if the Subscriber does not settle the outstanding debt, the Provider has the right to delete data and objects created by the Subscriber using the Provider's services, without the possibility of recovery.
5.1. The Provider has the right to prohibit automatic access to its services at any time and cease receiving any information.
5.2. The Provider has the right to transmit service information sent by the web server to the Subscriber's computer and/or its user for storage in the browser ("cookie") and subsequently use it. The Provider also allows some companies, partners, or advertising services to use "cookies" on Provider's projects. In this case, the use of "cookies" by these companies is not subject to these Rules but is regulated by the respective company.
5.3. The Provider has the right to send informational messages to Subscribers and display advertisements in the Personal account.
5.4. The court's recognition of any provision of these Rules as invalid or unenforceable does not invalidate or render unenforceable other provisions of the Rules.
5.5. The Provider's inaction in the event of a Subscriber's violation of these Rules does not deprive the Provider of the right to take corresponding actions to protect its interests later, nor does it constitute a waiver of the Provider's rights in the event of subsequent similar or similar violations.