Acceptable Use Policy

The use of services from EndLayer.com constitutes agreement to the terms below as well as all terms located at the following link: /policies

Acceptable Use

EndLayer’s services may be used only for lawful purposes. The laws of the Commonwealth of Massachusetts and the United States of America apply.

EndLayer is not responsible for legal claims or lawsuits resulting from the use of any of our services.

EndLayer’s services may not be used for copyright or trademark infringement purposes, including unauthorized copying or downloading of music, text, images or any other copyrighted content. Offering counterfeit merchandise for sale on an EndLayer hosted site will result in immediate account termination.

If your account is found in violation of another individual’s copyright, the account will be removed and your access to the material disabled immediately. If any account violates copyright laws repeatedly, it will be permanently terminated from EndLayer hosting. If you believe your trademark or copyright is being violated by an EndLayer hosted account, contact us here.

You may not use a shared account as a backup/storage device. EndLayer will automatically backup your website at least 4 times daily to a secure, off-site location. Most hosts only backup the base server, we backup everything. We also don’t charge you to restore your backup files!

Here is a list of unacceptable material that may not be used on our Shared and Reseller servers.

  • Topsites
  • Pirated Software
  • IRC Bots/Scripts
  • Proxy Anonymizers/Scripts
  • Image Hosting Scripts (e.g., Tinypic, Photobucket)
  • IP Scanners
  • AutoSurf/PPC/PTS/PTC Sites
  • Spam Scripts/Mail Bombers
  • Bruteforce Applications/Scripts/Programs
  • Mirror Scripts/file Dump (e.g., rapidshare)
  • Multiple (more than one or two) Commercial Audio Streams
  • Commercial Banner Ad Rotation Services
  • Bank Debentures/Escrow
  • HYIP (High-Yield Interest Programs)
  • Investment Sites (MLM/Pyramid Schemes, Ponzi, E-gold Exchange, Second Life/Linden Exchange, FOREX)
  • Prime Banks Programs
  • Controlled substance sales (without proof of permit)
  • PBBGs/MUDs/RPGs
  • Gambling/Lottery Sites
  • Sites promoting illegal actions
  • Links to pirated or illegal content
  • Sites/archives/forums targeted to hackers
  • Fraudulent Sites (e.g., sites listed on aa419.org & escrow-fraud.com)
  • Bank Debentures/Bank Debenture Trading Programs
  • Push-Button Mail Scripts
  • “Tell A Friend” Scripts
  • Bulk SMS or Anonymous Gateways
  • BitCoin Miners
  • Illegal Broadcast or Streaming of Live, Syndicated Sports Events (e.g., NFL, MLB, WWE, NASCAR, etc.)
  • PayDay Loan Sites (including sites related to PayDay loan affiliate programs)

Here is a list of unacceptable material that may not be hosted on our Dedicated servers:

  • IRC Bots/Scripts
  • IRCD (IRC servers)
  • IP Scanners
  • Pirated Software
  • Spam Scripts/Mailbombers
  • Bruteforce Programs/Scripts/Applications
  • Escrow
  • Investment Sites (MLM/Pyramid Schemes, Ponzi, E-gold Exchange, Second Life/Linden Exchange, FOREX)
  • HYIP (High-Yield Interest Programs)
  • Prime Banks Programs
  • Gambling/Lottery Sites
  • Controlled substance sales (without proof of permit)
  • Sites promoting illegal actions
  • Links to pirated or illegal content
  • Sites/archives/forums targeted to hackers
  • Mailer Pro
  • Bank Debentures/Trading Programs
  • Fraudulent Sites (e.g., sites listed on aa419.org & escrow-fraud.com)
  • Illegal Broadcast or Streaming of Live, Syndicated Sports Events (e.g., NFL, MLB, WWE, NASCAR, etc.)

All EndLayer services (networks, equipment and related devices) are intended solely for use by authorized customers. We reserve the right to monitor EndLayer systems at all times to ensure authorized use, to protect against illegal accessing attempts, and to maintain security. During the monitoring process, we may examine, record, copy and/or use information as we deem necessary. As an EndLayer systems user, you have consented to monitoring for these purposes.

If any EndLayer account connects to a third party system or network without express written permission from the third party, we reserve the right to suspend the account. EndLayer may require documentation to prove authorized access to a third party system, if the occasion requires.

We can and will refuse service at our discretion. If we deem any material on an EndLayer-hosted site to be illegal, threatening or obscene, or to violate our terms of service, we reserve the right to disable or remove the site with or without prior notice.

If you receive an email from our abuse department, you must respond within 48 hours. Otherwise your services may be suspended or terminated.

In accordance with Section 230(c) of the Communications Decency Act, EndLayer serves as a republisher of content and a platform provider, and we are not liable for any allegedly offensive, harassing or defamatory content. We are regulated only by U.S. law, and we do not engage in legal investigations to determine the truth or accuracy of individual defamation claims. We leave these processes up to the courts and the legal system. If a US court or a court order has determined that any material hosted on an EndLayer site is injurious in any manner, we will remove and disable the site.

We will not tolerate any potential harm to minors, and if we find any site that host or links to child pornography or other abusive material, we will suspend that site and terminate the account with or without notice. Violations will be reported immediately to law enforcement.

Resource Usage

EndLayer users may not misuse resources in the following ways:

  • Use CGI scripts, HTTP, PHP FTP or any other activities that occupy 25% or more of system resources for over 90 seconds.
  • Use CGI scripts, HTTP PHP, FTP or any other activities that run longer than 300 seconds on a single process.
  • Shared accounts (Shared Performance Cloud and Shared Performance Metal) may not exceed an inode usage of 300,000 inodes (hard limit). EndLayer will not back up accounts exceeding 200,000 inodes (soft limit).
  • Run unattended, standalone server-side processes, including daemons like IRCD, on the server.
  • Run indexers or web spiders (e.g., AdSpy/Google Cash) on shared EndLayer servers.
  • Run software interfacing with any Internet Relay Chat (IRC) network.
  • Run bit torrent clients, trackers or applications (you may provide links to off-site legal torrents, but may not host them on EndLayer servers).
  • Engage in peer-to-peer/file-sharing activities.
  • Run gaming servers (e.g., battlefield1942, half-life, counter-strike).
  • Run cron entries in less than 5-minute intervals.
  • Run MySQL queries that exceed 15 seconds.
  • Run inappropriately indexed MySQL tables.
  • Force HTML to handle server-side code (e.g., PHP, SHTML).
  • Use unnecessary https protocol (encrypted communications are extremely CPU-intensive).

If you have questions about the acceptability of content on an EndLayer site, contact us here.