Acceptable Use Policy (AUP)

Effective Date: 9/1/2024

Last Updated: 1/1/2025

WHEREAS, KS Corporate LLC D.B.A SMC Server Solutions is in the business of providing Hosting Services; and

WHEREAS, Client wishes to engage KS Corporate LLC D.B.A SMC Server Solutions to provide Hosting Services

THEREFORE, for the consideration set forth below, the sufficiency of which is hereby acknowledged, the parties agree as follows:

a. Introduction
This Acceptable Use Policy (“Policy”) establishes the guidelines and responsibilities for using our VPS, Dedicated Server, and related services (“Services”). Our purpose is to ensure that all activities conducted via our Services are legal, ethical, and do not compromise the integrity of our systems, networks, or the broader Internet community.

b. Definitions
Customer: Any individual or entity that registers for or uses our Services.
Services: VPS, Dedicated Server, and any additional products, features, or support services provided by our company.
Content: All data, files, software, and other materials transmitted, stored, or processed through our Services.
Network: The infrastructure provided by our company, including hardware, software, and associated services

c. Scope
This Policy applies to all Customers and any users accessing or utilizing our Services. By using our Services, you agree to comply with this Policy and all applicable local, state, federal, and international laws and regulations.

d. Acceptable Use Guidelines
Customers are expected to:

Use Responsibly: Utilize our Services for legitimate personal, business, or non-commercial activities.
Maintain Security: Protect your account credentials and secure any data processed or stored on our systems.
Respect Others: Ensure that your actions do not disrupt or negatively impact other users, networks, or systems.

e. Rules and Regulations
The following activities are strictly prohibited on any of our Servers/Services. Any violation of these rules may result in immediate suspension or termination of Services:

Proxyless Cracking/Botting: Using our services to perform unauthorized access or to bypass security measures.
Launching DDoS Attacks: Initiating or participating in distributed denial-of-service attacks.
Carding & Fraud Activities: Engaging in fraudulent activities or credit card fraud.
Serving Piracy Content: Hosting, distributing, or otherwise serving copyrighted or pirated content.
RAT/Phishing/Botnet Hosting/Activities: Hosting or engaging in remote access trojan (RAT) activities, phishing schemes, or botnet operations.
Arms Dealing: Involvement in the sale, distribution, or promotion of weapons or related materials.
Phishing Content: Creating or distributing content intended to deceive users and obtain sensitive information.
Email Spam: Sending unsolicited emails or operating unauthorized mail servers. (Please Reach out to us to unblock Mail Ports)
Accessing Remote Computers without Authorization: Engaging in cracking, hacking, or any form of unauthorized access to remote computers.
Violation of Intellectual Rights: Infringing upon copyrights, trademarks, or other intellectual property rights.
Unlawful Pornography: Hosting or transmitting pornographic material that violates laws or regulations.
Faking Origin Packet/Email Headers: Manipulating packet or email headers to conceal true origins.
Avoiding Restrictions: Attempting to bypass or evade any network, security, or usage restrictions implemented by our company.
Breaks any US City, State, or Federal Law: Engaging in activities that violate any applicable laws within US jurisdictions.
Live Streaming: Using our Services to live stream content without permission from the content owner.
Tor Exit Nodes: Operating or facilitating Tor exit nodes through our network infrastructure.
Illegal Torrenting: Employing torrenting protocols for file sharing, especially when used to distribute unauthorized or copyrighted content.
Malware: Hosting, storing, or distributing viruses, worms, trojans, ransomware, spyware, or any malicious software
Any attempt to circumvent these restrictions will be met with strict enforcement measures.

f. Monitoring and Enforcement
Monitoring: We reserve the right to monitor all activities on our network to ensure compliance with this Policy.
Enforcement: Violations may result in immediate suspension or termination of Services without prior notice. We reserve the right to report any illegal activities to the appropriate authorities.
Investigation: We may conduct investigations into any suspected policy violations and take necessary action based on our findings.

g. Customer Responsibilities
Security: Customers are responsible for safeguarding their account credentials and all activities performed under their accounts.
Compliance: It is the customer’s responsibility to ensure that all use of our Services complies with this Policy and with all applicable laws.
Cooperation: In cases of investigation, customers are expected to cooperate with our support and legal teams.

h. Policy Modifications
Updates: We reserve the right to modify this Policy at any time. Significant changes will be communicated through our official channels.
Continued Use: Continued use of our Services after modifications constitutes acceptance of the updated Policy.

i. Disclaimer
Limited Liability: Our company is not liable for any indirect, incidental, or consequential damages arising from the use or misuse of our Services.
Non-Exhaustive: This Policy does not cover every possible scenario; customers are expected to use common sense and exercise due diligence.
By using our Services, you acknowledge that you have read, understood, and agree to be bound by the terms and conditions set forth in this Acceptable Use Policy.

For any questions, concerns, or to report policy violations, please Contact Us