Acceptable Use Policy

Updated: February 11, 2025

This Acceptable Use Policy (“Policy”) is part of our Terms of Service (“Legal Terms”) and should be read in conjunction with them. By using our Services, you agree to these Legal Terms and this Policy. If you do not agree, do not use our Services.

Scope

This Policy applies to all uses of our Services (as defined in the Legal Terms) and all content available on the Services.

Who We Are

We are CharityHost.org LLC (“Company,” “we,” “us,” or “our”), a Wyoming, United States company with an address at 2150 Soldier Pass Ct, Reno, NV 89523. We operate the website https://charityhost.org (the “Site”) and other related products and services that link to this Policy (collectively, the “Services”).

Use of the Services

You warrant that you will comply with this Policy and all applicable laws when using the Services. You agree not to:

  • Systematically retrieve data or content from the Services without our written permission.
  • Make any unauthorized use of the Services, including collecting user information for unsolicited email or creating accounts by automated means or under false pretenses.
  • Interfere with security-related features of the Services.
  • Engage in unauthorized framing or linking to the Services.
  • Trick, defraud, or mislead us or other users.
  • Misuse our Services, including support services, or submit false abuse reports.
  • Engage in automated use of the Services, such as using scripts, data mining, robots, or similar tools.
  • Interfere with, disrupt, or burden the Services or connected networks.
  • Impersonate another user or person.
  • Use information from the Services to harass, abuse, or harm another person.
  • Use the Services to compete with us or damage our services.
  • Decipher, decompile, disassemble, or reverse engineer any software comprising the Services, except as permitted by law.
  • Bypass measures designed to prevent or restrict access to the Services.
  • Harass, annoy, intimidate, or threaten our employees or agents.
  • Delete copyright or other proprietary rights notices from any content.
  • Upload or transmit viruses, Trojan horses, or copyrighted material without rights, or engage in spamming.
  • Upload or transmit passive or active information collection mechanisms (e.g., spyware, web bugs).
  • Use, launch, develop, or distribute any automated system (e.g., spiders, robots) that accesses the Services, except for standard search engine or browser usage.
  • Disparage, tarnish, or harm us or the Services.
  • Use the Services in a manner inconsistent with applicable laws or regulations.

Fair Share Resource Abuse

Use of shared resources that negatively affects other clients or our network is considered abuse. This includes, but is not limited to: inodes, storage space, memory, CPU, bandwidth, and DDoS protection.

  • CPU:
    • VDS: 100% of available CPU resources.
    • VPS: Burst to 100% allowed. Sustained averaged usage of up to 50% CPU.  Exceeding sustained limits will result in rate limiting and revocation of bursting ability until the average CPU sustained percenetage used is below 50%.  The process of rate limiting and enabling burst again is automated by scripts and runs daily.
  • Network: Burst to 1 Gbps allowed. Private network burst to 10 Gbps allowed. Sustained public network use above 50 Mbps will be flagged and rate-limited. Bandwidth usage approaching or exceeding total VPS allocation may be checked and flagged manually.
  • Bandwidth: Total bandwidth allocated can be used as plans allow.  Once the bandwidth is depleted per month, the network speed is reduced to 4096 Kbps (512KB/s) until plan rolls over for the month.
  • Memory: Up to 100% RAM.
  • Disk Space: Up to 100%.
  • Swap Space: Permitted, but overuse (more than 25-30% of RAM) may lead to performance issues that can be flagged.

Disclaimer

We have sole discretion in determining acceptable use and may rate limit, suspend, or terminate accounts at any time for any reason. We strive to provide the best performance and stability, and fair share resource allocation is crucial. 

Subscriptions

Orders must include accurate identity and location information without proxy connections. Subscribers may not:

  • Use, modify, copy, redistribute, publish, display, perform, or retransmit any part of the Services without our written consent.
  • Intercept data not intended for them.
  • Engage in intentionally malicious activities.
  • Email spam.
  • Host adult content/pornographic material.
  • Cryptomine on Web Hosting or VDS/VPS.
  • Engage in hacking or malicious destructive activity.
  • Engage in systems abuse of any kind.
  • Use Web Hosting plans primarily for data storage and backups.

Email Sending Port Access and Usage

Access to email ports 25, 465, 587, and 2525 requires a one-time activation retainer fee of $25.00.  The $25 retainer fee is refundable by support ticket request once the service is cancelled if no abuse has been reported or found  on the customer’s services.  The $25 retainer refund will have a 30 day delay to make sure no abuse is reported in delay after cancellation. 

Following activation, the first confirmed abuse report related to email sent from your account using these ports will incur a $25.00 fee. “Per-incident” is defined as each distinct confirmed abuse report. Upon confirmation of the first abuse report, SMTP traffic will be temporarily blocked until the associated $25.00 fee is paid along with the block remaining in place for 14 days while Blacklist checking/removal takes place. Any fees associated with delisting will be passed on to the client.

Any subsequent confirmed abuse report(s) within 90 days will result in immediate termination of your account and a $50.00 termination fee. SMTP traffic will remain blocked, and all services associated with the account will be suspended.

Notification of the block or termination, the details of the abuse report, and the required payment will be sent to the account’s designated contact email address. For the initial abuse report, failure to remit payment and address the issue within 48 hours of the notification will result in suspension of all services associated with the account. Restoration of services will occur only after full payment of all outstanding fees, including any reactivation fees that may apply. For subsequent abuse reports resulting in termination, services will not be restored even with payment of the termination fee.

This policy is in place to ensure responsible use of email sending resources and to mitigate potential abuse. We must dedicate significant resources to managing abuse complaints and any necessary delisting procedures from email blacklists. This policy helps offset the costs associated with these activities.

To minimize the risk of abuse reports and potential account termination, we strongly recommend using a dedicated SMTP service such as smtp2go.com or a similar reputable provider for sending transactional or bulk emails. These services offer improved deliverability, abuse monitoring, and often provide better overall email management tools. Using an external SMTP service can significantly reduce the likelihood of your account being flagged for abuse.

*No refunds will be issued if there has been any abuse of this section within 180 Days.

Consequences of Breach

Violations may result in warnings, suspension, or termination of services. We may also notify law enforcement or take legal action. We are not liable for actions taken in response to breaches of this Policy.

Contact Us

Email: [email protected]
Online contact form: https://charityhost.org/account/submitticket.php

Scroll to Top