Acceptable Use Policy Notifications

Related informationhttp://iweb.com/legal

If you have received a notice regarding a violation of our acceptable use policy, the first step is to contact our Security and Abuse department directly by replying to the email. Our Security and Abuse department will be able to guide you in the next step towards solving the current issue.

Your server may be suspended after 48 hours if we do not receive a response.

The letter you have received will provide you with the type of complaint relevant to your server. Here is a list of common problems and resolutions:

  • Intellectual Property - Copyright or trademarks violations
    • Description: We have received a complaint that your server was hosting protected/copyrighted content without proper licensing.
    • Solution: Remove the infringing content from your server.
  • Network Security - Hostile network activities
    • Description: Attempting to gain access to a third party server without authorization or any other type of hacking.
    • Solution: It is possible that your server is compromised or that a security fault is being exploited. You have to rectify the situation as soon as possible by applying the necessary fixes or by reinstalling your operating system.
  • Illegal pornography - Pedophilia, bestiality, violence
    • Description: Hosting illegal pornography such as pedophiliac content.
    • Solution: Remove the infringing content immediately.
  • Fraud - ID theft, fraud sites, phishing
    • Description: Comitting fraud or hosting a fraudulent website.
    • Solution: You need to rectify the situation in a timely manner and remove the infringing website.
  • Phishing - Identity theft
    • Description: Hosting a phishing website and stealing personal information such as bank account identification.
    • Solution: Remove the infringing content immediately.
  • SPAM Email - Unsolicited commercial email or unsolicited bulk email
    • Description: Your server was flagged sending unsolicited emails.
    • Solution: Rectify the problem by only using email lists (subscribers) from your own website and/or remove the plaintive from your future mailings.
  • SPAM List - Providing email addresses for SPAM purposes
    • Description: Providing email subscribers lists for spam purposes.
    • Solution: Remove any infringing content on your server.
  • SPAM Proxy - Distributing spam through a proxy
    • Description: Sending out unsolicited emails from behind a proxy.
    • Solution: Find the source of the spam, rectify the situation and/or remove the plaintive from your future mailings.
  • SPAM Referer - Providing fake referer information to weblogs
    • Description: Falsifying referer information through unsolicited emails.
    • Solution: Find the source of the spam, rectify the situation and/or remove the plaintive from your future mailings.
  • SPAM Relay - Hosting a mail server configured as an open relay
    • Description: Your server is configured as an open relay and is being exploited to send out unsolicited emails.
    • Solution: Tighten your SMTP configuration by changing the port and making authentication necessary.
  • SPAM Site - Hosting a site advertised via email or weblog spam
    • Description: Your server is hosting a site that is advertised through unsolicited emails.
    • Solution: Review the marketing methods of that website and/or remove the plaintive from your future mailings.
  • SPAMware- Providing software for unsolicited commercial email
    • Description: Your server is hosting software that is used to send out unsolicited emails.
    • Solution: Remove any infringing content from your server.
  • Others:
    • Description: May be applicable for cases not described above.

If applicable, you will receive a copy of the complaint that was initially received by iWeb.

If you cannot solve the issue yourself, please contact our Security and Abuse department, and they will be able to guide you. They can be reached simply by replying to the email, or you can contact them directly at abuse@iweb.com.


Have more questions? Submit a request

0 Comments

Article is closed for comments.
Powered by Zendesk