Policies and legal docs

We provide you with keys to a powerful computing platform. Use our services in a considerate and professional way. Make fair use of this. This document outlines what is not allowed here.

The source of this document is here: github.com/fortrabbit/legal/blob/master/acceptable-use-policy.md.

Acceptable use policy of fortrabbit

last reviewed on June 1st, 2018

fortrabbit is intended to be used to host websites, web-applications, and web-APIs. This policy describes forbidden uses. The examples described here are not exhaustive. We may modify this policy at any time.

Prohibited content

It is not allowed to use, encourage, facilitate, promote or instruct others to use the services for any illegal, harmful, fraudulent, infringing or offensive use, or to transmit, store, display, distribute or otherwise make available "evil" content. This includes:

  • Illegal or harmful: Illegal contents, that violate the rights of others, or that may be harmful to others, reputation, including disseminating, promoting or facilitating child pornography, offering or disseminating fraudulent goods, services, schemes, promotions, make-money-fast schemes, ponzi and pyramid schemes, phishing, pharming, crypto-currency mining.
  • Infringing: Content that infringes or misappropriates the intellectual property or proprietary rights of others.
  • Harmful: Content or other computer technology that may damage, interfere with, surreptitiously intercept, or expropriate any system, program, or data, including trojan horses, cancelbots, viruses, worms, time bombs, Facebook friend bots.
  • Offensive: Content that is defamatory, obscene, abusive, invasive of privacy, or otherwise objectionable, including content that constitutes child pornography, relates to bestiality, or depicts non-consensual sex acts.

Prohibited actions

It is not allowed to use the services to violate the security or integrity of any network, computer or communications system, software application, or network or computing device. This includes:

  • Interception: Monitoring of data or traffic on a computer system without permission.
  • Unauthorized access: Accessing or using any system without permission, including attempting to probe, scan, or test the vulnerability of a computer system or to breach any security or authentication measures.
  • Origin falsification: Forging TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route. The legitimate use of aliases and anonymous remailers is not prohibited by this provision.

It is also not allowed to make network connections to any users, hosts, or networks without permission to communicate. This includes:

  • Monitoring or crawling: Monitoring or crawling of a computer system that impairs or disrupts the computer system being monitored or crawled.
  • Denial of service (DoS): Inundating a target with communications requests so the target either cannot respond to legitimate traffic or responds so slowly that it becomes ineffective.
  • Intentional interference: Interfering with the proper functioning of any System, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, or flooding techniques.
  • Operation of certain network services: Operating network services like open proxies, open mail relays, or open recursive domain name servers.
  • Avoiding System Restrictions: Using manual or electronic means to avoid any use limitations placed on a System, such as access and storage restrictions.

Prohibited messaging

It is not allowed to distribute, publish, send, or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations (SPAM), including advertising and informational announcements. It is not allowed alter or obscure mail headers or assume a sender's identity without the sender's explicit permission. It is not allowed to collect replies to messages sent from another internet service provider if those messages violate this policy or the acceptable use policy of that provider.

Quota and limits

The fortrabbit platform has certain soft and hard limits. Hard limits are automatically enforced by the service. Soft limits are consumable resources that you agree not to exceed. More on those limits can be found here: help.fortrabbit.com/limits and here: www.fortrabbit.com/specs

Monitoring and enforcement

We reserve the right, but do not assume the obligation, to investigate any violation of this policy. In consequence we may: remove, disable access, or even modify content; report any activity that we suspect violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. This reporting may include disclosing appropriate client information.

Print and download a PDF of this

Do you like our policies, or wonder about changes, or found a typo? See the fortrabbit legal repo on GitHub.

The greylist

The official acceptable use policy is basically a blacklist. But there is great diversity in this space and not everything is black and white. We are aware that there are huge grey areas. Examples are medical marijuana or dating. Please understand that our monitoring and enforcement is done by humans. We make mistakes and we have to act on suspicion. If your business is in the grey area, contact us upfront.

Reporting violations

Please notify us if you become aware of any violation of this policy. Provide us with assistance to stop or remedy the violation. Please follow our abuse reporting process.