Acceptable Use Policy
Updated: 22 August 2025
This Acceptable Use Policy (“Policy”) outlines prohibited activities on Noiz’s (“we,” “us,” or “our”) network and forms an integral part of our Hosting Terms of Service. We reserve the right, at our sole discretion, to request modifications or disable any website, account, database, or other component that violates this Policy, including in emergency situations. To accommodate evolving client needs, business requirements, the Internet landscape, and legal developments, we may revise this Policy at any time. We encourage you to review it periodically. Continued use of our services following revisions constitutes your acceptance of the changes.
If you identify a potential violation of this Policy, please report it promptly by emailing abuse@noiz.ie.
Table of Contents
SPAM and Unsolicited Email » Noiz maintains a zero-tolerance policy toward SPAM. |
Offensive Content » Certain types of content are prohibited on Noiz’s network. |
Misuse of Account Features » Account features are intended solely for use with your sites. |
Shared Systems and Resource Usage » Excessive resource consumption may impair performance and stability. |
Server-Side Processes » Specific processes are restricted on shared systems. |
Internet Abuse » Engaging in illegal, abusive, or irresponsible behavior via our network is prohibited. |
Security » Negligence may compromise Noiz’s network. |
Disk Usage » Disk space is monitored, with automated billing for overages. |
Traffic Usage » While generous, traffic usage is subject to fair use guidelines. |
1. SPAM and Unsolicited Email
Sending unsolicited commercial communications (including, but not limited to, email, instant messaging, SMS, chat rooms, discussion boards, and newsgroups) via Noiz’s network is strictly prohibited.
Communications qualify as unsolicited if the recipient’s email address was obtained without explicit consent or request, or if the recipient would not reasonably anticipate such communication based on an existing relationship. This applies to both personal and business email addresses (e.g., sales@companyxyz.ie). Communications that do not clearly identify a consensual sender or that appear to originate from a third party or affiliate are also deemed unsolicited.
Examples of Unsolicited Communications:
- Purchased mailing lists, “safe lists,” or harvested email addresses where recipients have not explicitly consented to receive communications from a specified sender.
- Emails requiring recipients to opt out of further unsolicited messages they did not initially request.
- One-time invitations for additional information that were not explicitly requested or consented to by the recipient.
- Emails sent to mailing lists containing unwilling recipients or those who have requested removal but continue to receive messages after a reasonable period.
Mailing list operators must maintain verifiable records of recipient consent and provide an unsubscribe option for future communications.
Upon receiving a SPAM complaint, Noiz may require verification of recipient consent, including when and how the email address was obtained.
We reserve the right to suspend or terminate accounts sending unsolicited email (SPAM) with or without notice, in accordance with our Terms of Service.
Violators will be liable for any costs incurred by Noiz, including monetary damages and reputational harm. We may impose cleanup fees or charges for blacklist removal, determined at our discretion.
Using Noiz services (e.g., mailboxes, autoresponders, webpages) to send SPAM, even indirectly, constitutes grounds for suspension or termination. If a website is compromised and used for unsolicited communications, we may apply leniency for first incidents but reserve the right to suspend or terminate for repeat occurrences.
For additional details, refer to our FAQ on Spam Abuse.
2. Offensive Content
Noiz prohibits the publication of, or links to, the following content on its hosting systems:
- Pornographic, sexually explicit, or violent material.
- “Hate” sites or content reasonably deemed discriminatory based on sex, race, age, or other protected characteristics.
- Illegal content, including stolen copyrighted material.
- Defamatory content or material violating personal privacy.
- Content involving theft, fraud, drug trafficking, money laundering, or terrorism.
- Pirated software distribution sites.
- Illegal gambling sites.
If, in our sole discretion, client content violates any law (including the Film and Publications Act, 65 of 1996) or this Policy, we may:
- Require immediate removal or modification of the content;
- Suspend or terminate access to services without notice;
- Delete the offending content without notice;
- Notify relevant authorities if required, provide backups or copies as requested, disclose client data, and take further actions as mandated.
3. Misuse of Account Features
Account features must be used exclusively for developing and implementing your associated websites. Providing these features to third parties for purposes other than normal website access is prohibited. Services enabling or assisting anonymous or abusive third-party behavior are forbidden. Any service degrading server stability, network components, or quality of service is prohibited.
Reselling multiple domains on Noiz’s Shared Hosting packages to third parties is not permitted. Multiple domains are intended solely for the profile owner’s websites.
4. Shared Systems and Resource Usage
Clients on shared environments must not interfere with system operations or disproportionately consume resources. Excessive server hits, bandwidth, disk usage, inefficient scripts, or database queries may impact other users. We may suspend accounts exhibiting such usage to protect the shared environment. These restrictions generally do not apply to Managed Virtual or Dedicated Servers unless they affect our management capabilities.
- Users may not initiate, via cron job, CGI script, or other means, processes on shared servers that:
- Require more than 50MB of memory;
- Consume more than 30 CPU seconds;
- Run more than 10 simultaneous processes;
- Send mail to more than 500 recipients per hour (e.g., 500 recipients for one email or 500 individual emails);
- Send or receive emails larger than 20MB.
- Bulk mail exceeding these limits, even if non-SPAM, will result in account deactivation.
- Custom CGI scripts are permitted only on Shared Hosting Personal packages or higher and must not benefit external sites. Resource limits prevent runaway scripts.
- Interactive “chat” applications are prohibited on shared systems and are better suited for Managed Virtual or Dedicated Servers.
- MySQL databases (available on Shared Hosting Personal or higher):
- Are limited to published quotas;
- Each database is capped at 5GB;
- May not store websites or circumvent disk allowances;
- Are for use with Noiz-hosted packages only; external access is for development;
- Allow 10 concurrent connections per user;
- May not store binary files (e.g., images) directly—use links instead;
- We may require changes or relocation if impacting performance.
- Cron jobs (on Shared Hosting Personal or higher):
- Must not execute more frequently than every two hours;
- Should use lower CPU priority if resource-intensive.
- Automated monitoring enforces resource limits.
5. Server-Side Processes
Installation or operation of standalone, unattended server-side processes (daemons) on Noiz servers is prohibited, except for permitted cron jobs. Violations may result in immediate account termination without warning. This does not apply to Managed Virtual or Dedicated Servers unless interfering with our management.
This restriction protects CPU/memory resources and enhances security by preventing unapproved programs from accepting external connections.
Managed Virtual or Dedicated Server disks at high load risk stability. We monitor and notify clients, providing guidance. After three unaddressed notifications, alerts are deactivated, potentially leading to unresponsive services.
The following are prohibited on Cloud and Self-Managed Server products:
- Cryptocurrency mining activities.
6. Internet Abuse
You may not use our network for illegal, abusive, or irresponsible activities, including:
- Unauthorized access, probing, scanning, or testing of systems/networks;
- Unauthorized monitoring of data/traffic;
- Interference with services (e.g., mail bombing, flooding, overload attempts);
- Using accounts/computers without owner authorization;
- Deceptive information collection (e.g., phishing, password robbery, port scanning);
- Distributing software that covertly gathers/transmits user information;
- Activities likely to provoke retaliation against our network;
- Breaches of applicable laws, including the Electronic Communications and Transactions Act 25 of 2002 (ECT Act), which may result in fines or imprisonment;
- Introducing viruses or failing to use updated virus-scanning software;
- Forging messages, trafficking pirated software, or port scanning;
- Publishing information on illegal material availability, including links.
Compliance with connected networks’ policies is required. Detected inappropriate activity may lead to account deactivation pending investigation, potentially involving law enforcement without prior notice.
7. Security
Clients must implement reasonable security measures. Negligence may lead to compromised websites/mailboxes, affecting others via blacklisting, phishing, or spamming.
- You are responsible for securing scripts/programs (using latest versions) and directory permissions. All account actions are your responsibility, including credential compromises. Secure passwords (at least 11 mixed alphanumeric characters with case variations, changed regularly, avoiding common words) are required. We may notify and require changes for weak passwords; failure may lead to suspension/termination if compromising the site.
- We reserve the right to reset passwords in abuse cases.
For guidance, review our FAQ on Secure Passwords.
8. Disk Usage
- Accounts with excessive files impact performance: Limit is 200,000 files total or 50,000 per directory. Exceeding this excludes files/directories from backups.
- Servers are not for personal storage; content must relate directly to your website(s).
- Large unaccessed mailboxes (e.g., catchalls) are prohibited, as they cause excessive usage.
- Email older than five years must not be stored on servers.
- Emails 5MB or larger must not be stored longer than one month.
- Shared Hosting packages have disk quotas; we notify overages monthly via email, allowing reduction or upgrades. Monitor usage via the Client Area (Home > My Dashboard > My Products & Services > Product Details).
- Automated systems track, notify, and charge for overages. For details, see our Billing and Payment Policy.
- Managed Virtual/Dedicated Server disks near capacity risk stability. We notify and guide; after three unaddressed notifications, alerts deactivate, potentially causing unresponsiveness.
9. Traffic Usage
9.1. Shared Hosting and Reseller
- These packages, including add-ons like CDN and WAF, have no fixed traffic quotas but are for shared website hosting, not primary file storage, archiving, high-volume video streaming, or multimedia.
- Learn more about our unlimited traffic policy here.
9.2. Managed Virtual or Dedicated Servers, Self-Managed Virtual or Dedicated Servers, Cloud, and Colocation
- Certain services require prior consultation, including:
- Public mirroring accessible to the general public;
- Websites/services redirecting traffic;
- Reselling bandwidth/network capacity for end-user internet access;
- Routing Colocation traffic via Self-Managed/Cloud servers to the internet.
- No fixed quotas, but we monitor patterns; disproportionate usage may trigger rate limiting to preserve network integrity (affecting speed, not volume or time). We are not liable for losses from such restrictions.
- Traffic usage is provided per IP; aggregation across servers is unavailable. Excessive usage is flagged for discussion.
All clients must adhere to this Policy to maintain server and network performance for the benefit of all users. To discuss specific requirements, contact support@noiz.ie.
Our Acceptable Use Policy is a description of the types of activities that are not allowed on our network and, as such, forms part of Noiz’s Hosting Terms.
Noiz reserves the right to request changes or disable, as necessary, any website, account, database, or any other component that does not comply with our established policies or to make any such modifications in an emergency at our sole discretion. To meet the changing needs of our clients, our business, the Internet environment and the legal landscape, this policy may be revised at any time and we encourage our clients to review this policy regularly.
If you feel you have discovered a violation of any area of this policy, please let us know by sending an email to abuse@noiz.ie.
Table of Contents
SPAM and Unsolicited Email » Noiz has a zero tolerance SPAM policy. |
Offensive Content » Certain content is not permitted on Noiz’s network. |
Misuse of Account Features » Your account features are for use with your sites only. |
Shared Systems and Resource Usage » Excessive resource usage will cause performance and stability problems. |
Server Side Processes » Certain processes are not permitted on our shared systems. |
Internet Abuse » Using our network to engage in illegal, abusive, or irresponsible behaviour is a violation. |
Security » Negligence will put Noiz’s network at risk. |
Disk Usage » Disk space usage is monitored with automated billing for over-usage. |
Traffic Usage » While our traffic usage is generous, it is regulated and is subject to reasonable use. |
1. SPAM and Unsolicited Email
Last updated: December 2024.
Sending unsolicited commercial communication (including, but not limited to email, instant messaging, SMS, chat rooms, discussion boards and newsgroups) is not permitted via Noiz’s network.
Regardless of how the recipient’s email address was acquired, if email communication was not explicitly requested or consented to by the recipient or if the recipient would not expect to receive it as a result of an existing relationship, the communication is considered unsolicited (this applies to communication sent to both personal email addresses and company email addresses e.g. sales@companyxyz.co.za). Email communication that does not clearly originate from a consensual sender or which appears to come from a 3rd party or affiliate is considered unsolicited.
Examples of unsolicited communication:
- Purchased mailing lists, “safe lists” and harvesting of email addresses, where the users of those email addresses have not explicitly agreed to receive communication from a specified consensual sender is considered unsolicited.
Sending emails where the recipient must opt-out of receiving further emails that they didn’t originally request is considered unsolicited.
Sending a once-off invitation to receive further information, which was not explicitly requested or consented to by the recipient is considered unsolicited.
Email communication to a mailing list including addresses of unwilling recipients or a recipient who has indicated that they wish to be removed from such list, yet continues to receive unwanted emails after a reasonable period, is considered unsolicited. - Mailing list operators should maintain meaningful records of recipient requests and their consent to receive said email communications. There should also be an option for the recipient to unsubscribe from receiving further email communications.
- When Noiz receives a spam complaint, in order to establish if the communication was unsolicited, we may ask you to verify whether the recipient agreed to receive communications from you and if so, when and where you recorded their email address.
- Noiz reserves the right to suspend or terminate the account of any user who sends out unsolicited email otherwise known as Spam with or without notice in accordance with its General Terms and Conditions.
- As a Noiz client, should you infringe this policy, you will be held liable for any costs incurred by Noiz, both monetary and in reputation. Noiz reserves the right to charge the client of the account used to send any unsolicited email a clean-up fee or any charges incurred for blacklist removal. This cost of the clean-up fee is entirely at the discretion of Noiz.
- The use of any other service for the purposes of sending SPAM with any reference to Noiz services (including but not limited to mailboxes, autoresponders, and Web pages), will also be grounds for suspension/termination as described above. If your website was compromised and exploited for the purpose of sending unsolicited communications, Noiz will be more lenient in resolving the issue. However, repeat exploitations of the same website and/or client account would be grounds for suspension/termination. For further information, please read our FAQ on Spam Abuse.
2. Offensive Content
Last updated: December 7, 2024.
- Noiz does not allow any of the following content or links to such content, to be published on its Hosting Systems:
- Content of a pornographic, sexually explicit or violent nature.
- “Hate” sites or content that could be reasonably considered as discriminatory in any way including by way of sex, race or age discrimination.
- Content of an illegal nature (including stolen copyrighted material).
- Content that is defamatory or violates a person’s privacy.
- Content that involves theft, fraud, drug-trafficking, money laundering or terrorism.
- Pirated software sites.
- Illegal gambling sites.
- If Noiz in its sole discretion determines that any client content violates any law, including the Film and Publications Act, 65 of 1966 or this policy, it may:
- Request the client to immediately remove such content; and/or
- Require the client to modify such content; and/or
- Without notice, suspend or terminate access to any services; and/or
- Without notice, delete the offending content; and/or
- Notify the relevant authorities of the existence of such content (if required by law or otherwise), make any backup, archive or other copies of such material as may be required by such authorities, disclose such elements of the client’s data as may be requested by the authorities and take such further steps as may be required by such authorities.
3. Misuse of account features
Last updated: December 7, 2024.
- Operating any service which makes an account feature available to third parties for any use other than normal access to that account’s Web site is forbidden. Operating any service which enables or assists anonymous or abusive behaviour by third parties is forbidden. Operating any service which affects the stability or reliability of any Noiz server or network component, impacts other users or the company negatively, or degrades quality of service is forbidden. All account features are to be used solely in order to develop and implement the Web site(s) associated with that account.
- Reselling Multiple Domains on Noiz’s Shared Hosting packages to a third party is not allowed. Multiple Domains are to be used solely for the Profile Owner’s own websites.
4. Shared Systems and Resource Usage
Last updated: December 7, 2024.
Clients hosting on our shared environment may not use any shared system provided by Noiz in a way that interferes with the normal operation of the shared system, or that consumes a disproportionate share of the system’s resources. For example, excessive server hits, excessive bandwidth usage, excessive disk usage, inefficient scripts or database queries may compromise other users of the shared hosting environment. Noiz is authorised to suspend a user’s account should it be found that excessive resource usage is negatively impacting on other clients of our shared hosting environment. In most cases, the examples below do not apply to Noiz Managed Virtual or Dedicated Servers.
- Users may not, through a cron job, CGI script, interactive command, or any other means, initiate the following on Noiz’s shared servers:
- Run any process that requires more than 50MB of memory space.
- Run any program that requires more than 30 CPU seconds.
- Run more than 10 simultaneous processes.
- Send out mail to more than 500 recipients (email addresses) within one hour. 500 recipients represent one of the following: 500 recipients for one email, 500 individual emails or a combination of the two.
- Send or receive, through mail, any file larger than 20MB.
- Should we discover that a client is performing bulk mail runs on our shared systems that exceeds the limit communicated in 3.1.4 above, regardless of whether it constitutes SPAM or not, Noiz will deactivate the user’s account.
- Custom server-side CGI scripts are to be run only by users with the appropriate package types (in Noiz’s case the Shared Hosting Personal package or higher). No user may run CGI scripts for the benefit of external sites or services. The use of system resource limits is intended to prevent runaway CGI scripts on an unattended server. Also, processes with large memory footprints or hungry CPU requirements will incur swapping and other slowdowns that cause problems for every site on the server.
- Interactive Web applications, commonly known as “chat”, are not allowed on Noiz’s shared systems. These applications are better placed on Managed Virtual or Dedicated Servers.
- MySQL databases are provided to users of the Shared Hosting Personal package and higher:
- Each qualifying individual package is limited to the allocated quota as published in the product matrix.
- Each individual database is allocated a maximum of 5GB disk space.
- Databases may not be used for circumventing package disk allowances by storing web sites within the database.
- Databases may only be used in conjunction with Noiz hosted packages. Access to databases from outside our local network is provided strictly for site and database development.
- Only 10 concurrent MySQL connections per database user are allowed.
- Databases may not be used to store binary files (including but not limited to image and application files). The database needs to reference the image on the user’s site rather than actually storing the image i.e. these files should be stored within the user account and referred to in the database by using a link.
- Noiz reserves the right to require changes to databases and database usage should they have an adverse impact on a database server and/or other user databases on that server. Noiz may move the database to a new server, or in extreme cases, Noiz reserves the right to disable any database determined to be harming performance of a database server.
- The use of “cron jobs” (processes that are run automatically at certain times, in accordance with a “crontab” file set up by each user), are allowed on Noiz servers, subject to the following conditions and restrictions:
- To be used only by clients of the Shared Hosting Personal package and higher.
- The job must not execute more often than every two hours.
- If a cron job is likely to consume excessive CPU usage, it should be given a lower CPU priority.
- Resource limits are enforced by automatic monitoring systems. This is not applicable to Managed Virtual or Dedicated Servers, providing that it does not interfere with Noiz’s ability to manage the server on the client’s behalf.
5. Server side processes
Last updated: December 7, 2024.
- The installation or operation of any stand-alone, unattended server-side process (daemons) on Noiz servers, with the exception of cron jobs as per point 4 above, is not possible. Violation of this policy will result in immediate account termination without warning. This is not applicable to Noiz’s Managed Virtual or Dedicated Servers, providing that it does not interfere with Noiz’s ability to manage the server on the client’s behalf.
- This policy exists for several reasons:
- To protect the CPU and memory resources available on each server.
- To protect and enhance system security by not allowing unapproved third-party programs to accept connections from the outside world.
- Managed Virtual or Dedicated Servers disks running at continued high load poses a serious risk to the stability and ongoing operation of the servers. Our internal automated monitoring system alerts us to such instances. We will notify you once we receive these alerts and provide guidance on what approach to take to remedy the situation. Noiz will stop escalations to the client and deactivate alerts on the server in question after three notifications have been sent and if there is a lack of evidence that steps have been taken by the client to reduce load on the server. This means, after three notifications, you will not continue to be notified that the server has run out of system resources. More importantly, your website and/or email might become unresponsive and stop working if system resources are not freed up.
- The following actions are prohibited on Cloud and Self-Managed Server products:
- Using servers or Cloud resources for any activities related to cryptocurrency mining.
6. Internet Abuse
Last updated: December 7, 2024.
You may not use our network to engage in illegal, abusive, or irresponsible behaviour, including:
- Unauthorised access to or use of data, services, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to break security or authentication measures without express authorisation of the owner of the system or network;
- Monitoring data or traffic on any network or system without the authorisation of the owner of the system or network;
- Interference with service to any user, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks;
- Use of an Internet account or computer without the owner’s authorisation;
- Collecting information by deceit, including, but not limited to Internet scamming (tricking other people into releasing their passwords), password robbery, phishing, security hole scanning, and port scanning;
- Use of Noiz’s service to distribute software that covertly gathers information about a user or covertly transmits information about the user;
- Any activity or conduct that is likely to result in retaliation against our network;
- Any activity or conduct that is likely to be in breach of any applicable laws, codes or regulations including the Electronic Communications and Transactions Act 25 of 2002 (see ECT Act) which renders you liable to a fine or imprisonment;
- Introducing intentionally or knowingly into Noiz’s service any virus or other contaminating program or fail to use an up to date virus-scanning program on all material downloaded from the Web;
- Forging email or other messages is forbidden. Trafficking in pirated software is forbidden. Port scanning or the use of similar tools is forbidden.
- Use of Noiz services to publish or otherwise disseminate information about the availability of pirated software or other material that is being made available illegally, including the publication of a list of links to such material, regardless of disclaimers, is specifically forbidden. We do not condone any illegal material or behaviour.
Compliance with the acceptable use policies of any network or system with which you connect through our service is required. If inappropriate activity is detected, all accounts of the user in question will be deactivated until the investigation is complete. Prior notification to the user is not assured. In extreme cases, law enforcement will be contacted regarding the activity.
7. Security
Last updated: December 7, 2024.
Noiz clients must take reasonable security precautions. Negligence could result in the hacking of websites as well as compromised mailboxes due to vulnerable PCs, website software or the use of weak passwords, which could affect other Noiz clients through blacklisting, phishing or spamming.
- It is the client’s responsibility to ensure that scripts/programs installed under their account are secure (using the latest version) and permissions of directories are set properly, regardless of installation method. Users are ultimately responsible for all actions taken under their account. This includes the compromise of credentials such as user name and password. It is required that clients use a secure password. If a password is found to be weak, Noiz will notify the user and allow time for the user to change/update the password. Failure to make a password change that inadvertently leads to the website being compromised could result in the user’s account being suspended / terminated.
- Passwords should consist of at least 11 mixed alpha and numeric characters with case variations. Clients should not use a common word as a password and should change their passwords regularly. In the event of abuse Noiz reserves the right to reset a password.
For further information, please read our FAQ on Secure Passwords.
8. Disk usage
Last updated: December 7, 2024.
- Accounts with many files can have an adverse effect on server performance. Noiz has the following limit: 200 000 files (i.e. an email, webpage, image file, directory etc.), or 50 000 files per directory. Accounts exceeding the above limit will have those files and/or directories excluded from our backup system.
- Using our servers as a personal storage facility is not permitted. Any content stored must be directly related to the website(s) in question.
- Mailboxes that build up large volumes of email without being accessed are not allowed (e.g. catchall mailboxes or bounce message mailboxes). The primary cause of excessive disk usage can be due to clients having their catchall address enabled, yet never checking their primary account mailbox. Over time, tens of thousands of messages build up, pushing the account past our file limit.
- Email older than five years may not be stored on the server.
- Individual emails that are 5 MB or larger may not be stored on the server for more than 1 month.
- Noiz has a disk usage quota in place for its Shared Hosting packages. Where applicable, clients are sent monthly emails from Noiz notifying them of domains that have exceeded the allocated quota, providing an opportunity to reduce disk space or upgrade to a higher package in order to avoid unnecessary charges for over-usage. Clients can regularly monitor their disk usage via the Noiz Client Area by viewing the ‘Disk Usage’ under Home > My Dashboard > My Products & Services > Product Details, which will give clients a reading of the total size of the package together with a summary of individual directory sizes.
- In order for Noiz to operate with greater efficiencies and for our clients to have the flexibility and control of actively managing their disk space, an automated system tracks, notifies and charges for over-usage.
- Managed Virtual and Dedicated Server disks running at near full capacity poses a serious risk to the stability and ongoing operation of the servers. Our internal automated monitoring system alerts us to such instances. We will notify you once we receive these alerts and provide guidance on what approach to take to remedy the situation. Noiz will stop sending escalations to the client and deactivate alerts, on the server in question, after three notifications have been sent and if there is a lack of evidence that steps have been taken by the client to free up adequate disk space. This means, after three notifications, you will not continue to be notified that the server’s disk space has reached full capacity. More importantly, your website and/or email will become unresponsive once your disk is full.
9. Traffic Usage
Last updated: December 7, 2024.
9.1. Shared Hosting and Reseller
- Our Shared Hosting and Reseller packages, including add-ons such as CDN and WAF, do not have fixed traffic quotas. However, these products are intended for shared website hosting purposes and are not to be used primarily for online file storage, archiving electronic files, high-volume video streaming, or multimedia.
- Learn more about our unlimited traffic policy for Shared Hosting and Reseller packages here.
9.2. Managed Virtual or Dedicated Servers, Self-Managed Virtual or Dedicated Servers, Cloud and Colocation
- Certain services may not be hosted on our Managed Virtual or Dedicated Servers, Self-Managed Virtual or Dedicated Servers, Cloud and Colocation offerings without prior consultation. Examples of restricted services include, but are not limited to:
- Public mirroring services accessible to the general public.
- Websites or services are primarily designed to redirect traffic from one network to another.
- Resale of bandwidth or network capacity to provide internet access to end-users.
- Traffic generated from a Colocation network that is destined for the internet should not be routed via a Self-Managed or Cloud server.
- While Self-Managed Virtual and Dedicated Servers, Cloud, and Colocation offerings do not have fixed traffic quotas, we monitor upload and download volumes to identify disproportionate traffic patterns.
- Where applicable, rate limiting may be imposed to maintain optimal network integrity.
- This restriction only affects connection speed and does not limit overall upload and download volumes or connection time.
- Note that Noiz is not liable for any loss or damages due to connection speed restrictions applied per this policy.
- Noiz will provide traffic usage per IP address for Managed Virtual or Dedicated Servers, Self-Managed Virtual or Dedicated Servers and Colocation, and any excessive usage will be flagged with the client. It is, therefore, not possible to apply an aggregated traffic usage model across multiple servers.
All clients are required to comply with this policy to preserve Noiz’s server and network performance for the benefit of all our clients.
To discuss your specific requirements, please contact us at support@noiz.ie.