What do you mean “Unlimited”?

What we mean is, you don’t have to worry about disk storage or network transfer when your site gets popular.

You DO still have to worry about plenty of other things though… if your site isn’t well optimized and is causing issues for others on your shared server (either because it’s pounding the CPU, hogging RAM, or doing tons of disk I/O), you may be asked to sign up for your own Virtual Private Server or Dedicated Server.

Trust us, every host out there has exactly the same limitations… we’re just trying to be up front about them!

What about VPS and Vision 4 Marketing?

The Unlimited Policy will no longer apply to any Vision 4 Marketing accounts, nor to VPS machines provisioned on or after November 12th, 2016. The specified disk allotment will be listed on the sign-up page for each VPS and Vision 4 Marketing plan offered.

It should be noted that the Unlimited Policy still applies to any existing VPS machines provisioned before November 12th, 2016! For machines that were provisioned before November 12th, 2016, the unlimited plan will remain in effect, even during renewals. Vision 4 Marketing reserves the right to change pricing with notice to customers 30 days prior to renewal. Amount of network transfer is unlimited on all VPS services.

What about databases?

You’re certainly allowed an unlimited number of MySQL databases, but in the interest of server stability we request that you try to keep them optimized and no larger than a few GB in size.

…and email?

The Unlimited Policy doesn’t apply to email. Any new email addresses will have a 2GB limit, and we’ll be enforcing these limits on all accounts if it gets out of hand!

What’s not allowed in “Unlimited”?

Basically, sites whose essential purpose is to use disk or bandwidth. When making a website, you should be thinking about “How can I make an interesting site for my visitors while minimizing my server storage, bandwidth, file system, memory, and cpu impact as much as possible?”

The result will be a better experience for your visitors, your web host, and yourself!

Here are some specific examples of things not allowed:

  • Copyrighted content to which you do not hold usage or distribution rights.
  • File upload / sharing / archive / backup / mirroring / distribution sites.
  • A site created primarily to drive traffic to another site.
  • Making your account resources available (whether for free or pay) to the general public.

Vision 4 Marketing reserves the right to delete data stored on our servers that violates any of the terms in the Unlimited Policy, and, generally, in our Terms of Service. Vision 4 Marketing has sole discretion to determine what does, and does not violate either policy.

Hey, that doesn’t sound very “Unlimited” to me!

Actually, for you, my dear Legitimate Website Owner, it is unlimited.

This whole page is just to announce to the <.1% of people who want to try and run free porn affiliate sites or anime video trading forums or host pirated rips of The Dark Knight on Vision 4 Marketing that we’re not having any.

But our pledge to you is to do our best to always keep your website, with the content you created, UP… no matter how many times you get Slashdotted or Reddited.

Greetings! The Internet Security Research Group (ISRG) that manages Let’s Encrypt now requires Vision 4 Marketing to act as the named party in their certificate agreements. ISRG has published a new Let’s Encrypt Subscriber Agreement, which we accept on behalf of our customers.

Not so fast, though! We’re in this together, so we ask that you review and accept all of the terms in the Subscriber Agreement that ISRG provides. By installing and using Let’s Encrypt through Vision 4 Marketing, you agree to be bound by the entire Subscriber Agreement (especially Section 3.1!), and understand that Vision 4 Marketing reserves the right to take any and all action to remedy violations to the Subscriber Agreement or any other Vision 4 Marketing terms of service.

If you are already using Let’s Encrypt, your continued use of these services indicates that you have read and accepted these terms and the Let’s Encrypt Subscriber Agreement. If you do not agree with any of these terms, your only remedies are to contact Tech Support to have your certificates revoked, or close your Vision 4 Marketing account.

Please note that all Vision 4 Marketing Terms of Service protections, such as our indemnification and liability waivers, still apply.

The Let’s Encrypt Subscriber Agreement is updated by ISRG, and is provided through the following link: https://letsencrypt.org/repository/. For convenience, we have provided the updated agreement below. While Vision 4 Marketing will update this page whenever there is a change to the agreement, it is your responsibility to check both this page and Let’s Encrypt’s repository for updates. Your continued use of Let’s Encrypt means that you agree to be bound by all of the contractual terms and any changes to both ISRG’s and Vision 4 Marketing’s programs. We also reserve the right to modify or cancel this agreement at any time without notice.

Let’s Encrypt Subscriber Agreement
Version 1.1.1
Effective: August 1, 2016

LET’S ENCRYPT
SUBSCRIBER AGREEMENT

This Subscriber Agreement (“Agreement”) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf of which you are acting (collectively, “You” or “Your”) and Internet Security Research Group (“ISRG,” “We,” or “Our”) regarding Your and Our rights and duties relating to Your acquisition and use of SSL/TLS digital certificates issued by ISRG. If you are acting on behalf of a company, organization or other entity, You represent that you have the authority to bind such entity to this Agreement.

1. Definitions and Terms

“ACME Client Software” — A software application that uses the ACME protocol to request, accept, use or manage Let’s Encrypt Certificates.

“Certificate” — A computer-based record or electronic message issued by an entity that associates a “Public Key” with an Internet domain name or other technical identifiers and is Digitally Signed by the issuing entity.

“CRL” — A database or other list of Certificates that have been revoked prior to the expiration of their Validity Period.

“Digital Signature/Digitally Sign” — The transformation of an electronic record by one person, using a Private Key and Public Key Cryptography, so that another person having the transformed record and the corresponding Public Key can accurately determine (i) whether the transformation was created using the Private Key that corresponds to the Public Key, and (ii) whether the record has been altered since the transformation was made. A Digital Signature need not incorporate a handwritten signature.

“Key Pair” — Two mathematically-related keys (a Private Key and its corresponding Public Key), having the properties that (i) one key can be used to encrypt a message (i.e., create a Digital Signature) that can only be decrypted using the other key (i.e., verify the Digital Signature), and (ii) even while knowing or possessing one key (e.g., the Public Key), it is computationally difficult or infeasible to discover the other key (e.g., the Private Key).

“Let’s Encrypt Certificate” — A Certificate issued by ISRG under the Let’s Encrypt name.

“Private Key” — A key kept secret by its holder and which is used in Public Key Cryptography to create Digital Signatures and to decrypt messages or files that were encrypted with the corresponding Public Key.

“Public Key” — In Public Key Cryptography, this is the publicly-disclosed key that is used by the recipient to (i) validate Digital Signatures created with the corresponding Private Key and (ii) encrypt messages or files to be decrypted with the corresponding Private Key.

“Key Compromise” — A Private Key is said to be compromised if its value has been disclosed to an unauthorized person, an unauthorized person has had access to it, or there exists a practical technique by which an unauthorized person may discover its value. A Private Key is also considered compromised if methods have been developed that can easily calculate it based on the Public Key or if there is clear evidence that the specific method used to generate the Private Key was flawed.

“Public Key Cryptography” — A type of cryptography that uses a Key Pair to securely encrypt and decrypt messages. One key encrypts a message, and the other key decrypts the message. One key is kept secret (the Private Key), and one is made available to others (the Public Key). These keys are, in essence, large mathematically-related numbers that form a unique pair. Either key may be used to encrypt a message, but only the other corresponding key may be used to decrypt the message.

“Repository” — An online system maintained by ISRG for storing and retrieving Let’s Encrypt Certificates and other information relevant to Let’s Encrypt Certificates, including information relating validity or revocation.

“Validity Period” — The intended term of validity of a Certificate, beginning with the date of issuance (“Valid From” or “Activation” date), and ending on the expiration date indicated in such Certificate (“Valid To” or “Expiry” date).

“Your Certificate” — A Let’s Encrypt Certificate issued to You.

2. Effective Date, Term, and Survival

2.1 Effective Date of Agreement

This Agreement is effective once You request that ISRG issue a Let’s Encrypt Certificate to You.

2.2 Term

Each of Your Certificates will be valid for the Validity Period indicated in such Certificate unless revoked earlier. This Agreement will remain in force during the entire period during which any of Your Certificates are valid, continuously so as to include any renewal periods (including automatic renewals). Once You no longer possess any valid Let’s Encrypt Certificate, this Agreement will terminate.

2.3 Survival

Sections in this Agreement concerning privacy, indemnification, disclaimer of warranties, limitations of liability, governing law, choice of forum, limitations on claims against ISRG, and prohibitions on the use of fraudulently-obtained Certificates and expired Certificates shall survive any termination or expiration of this Agreement.

3. Your Warranties and Responsibilities

3.1 Warranties

By requesting, accepting, or using a Let’s Encrypt Certificate:

  • You warrant to ISRG and the public-at-large that You are the legitimate registrant of the Internet domain name that is, or is going to be, the subject of Your Certificate, or that You are the duly authorized agent of such registrant.
  • You warrant to ISRG and the public-at-large that either (1) You did not obtain control of such domain name as the result of a seizure of such domain name, or (2) such domain name had no ongoing lawful uses at the time of such seizure.
  • You warrant to ISRG and the public-at-large that all information in Your Certificate regarding You or Your domain name is accurate, current, reliable, complete, and not misleading.
  • You warrant to ISRG and the public-at-large that all information You have provided to ISRG is, and You agree that all information you will provide to ISRG at any time will be, accurate, current, complete, reliable, and not misleading.
  • You warrant to ISRG and the public-at-large that You rightfully hold the Private Key corresponding to the Public Key listed in Your Certificate.
  • You warrant to ISRG and the public-at-large that You have taken, and You agree that at all times You will take, all appropriate, reasonable, and necessary steps to maintain sole control of, secure, properly protect and keep secret and confidential the Private Key corresponding to the Public Key in Your Certificate (and any associated activation data or device, e.g. password or token).

3.2 Changes in Certificate Information

If at any time You no longer control the Internet domain names associated with any of Your Certificates, or if any of the warranties in Section 3.1 above are no longer true with respect to any of Your Certificates in any other way, You will immediately request that ISRG revoke the affected Certificates. You may request replacement Let’s Encrypt Certificates before revoking the affected Certificates, provided that the warranties in Section 3.1 above are true with respect to the replacement Certificates.

3.3 Certificate Issuance

The contents of Your Certificates will be based on the information You or Your ACME Client Software sends to ISRG.

If ISRG accepts your request for a Let’s Encrypt Certificate, ISRG will create Your Certificate and it will be provided to You through the ACME protocol. If ISRG is unable to confirm your identity or authorization, Your request may be denied.

ISRG may, in its sole discretion, refuse to grant Your request for a Let’s Encrypt Certificate, including for any lawful reason stated or not stated in this Agreement.

3.4 Key Pair Generation

Your Key Pair (Public and Private Keys) will be generated by You or Your ACME Client Software on Your systems. You will submit the corresponding Public Key to ISRG and it will be incorporated into Your Certificate. ISRG will store Your Certificate in its Repository. ISRG will not have access to Your Private Key. Your Private and Public Keys will remain Your property.

We will use technical methods and protocols to verify that You have exclusive control over the subject Internet domain name. This verification is done solely to assist ISRG in determining whether to issue a Let’s Encrypt Certificate and is not a service being performed for Your benefit or on Your behalf.

3.5 Inspection and Acceptance of Certificates

You warrant to ISRG and the public-at-large, and You agree, that You will immediately inspect the contents of Your Certificate (“Initial Inspection”), and to immediately request revocation if you become aware of any inaccuracies, errors, defects, or other problems (collectively, “Certificate Problems”) with Your Certificate. Your ACME Client Software may perform this task for You. You agree that You will have accepted Your Certificate when You first use Your Certificate or the corresponding Private Key after obtaining Your Certificate, or if You fail to request revocation of Your Certificate immediately following Initial Inspection.

3.6 Installation and Use of Your Certificate

You may reproduce and distribute Your Certificate on a nonexclusive and royalty-free basis, provided that it is reproduced and distributed in full and in compliance with this Agreement. You warrant to ISRG and the public-at-large, and You agree, that You will install Your Certificate only on servers that are accessible at the subjectAltName(s) listed in Your Certificate, and that you will use Your Certificate solely in compliance with all applicable laws and solely in accordance with this Agreement. Your Certificate will remain the property of ISRG, subject to Your right to use it as set forth in this Agreement.

The purpose of Your Certificate is to authenticate and encrypt Internet communications. ISRG is not responsible for any legal or other consequences resulting from or associated with the use of Your Certificate. You agree that You will not use Your Certificate for any purpose requiring fail-safe performance, such as the operation of public utilities or power facilities, air traffic control or navigation systems, weapons systems, or any other systems, the failure of which would reasonably be expected to lead to bodily injury, death or property damage.

3.7. When to Revoke Your Certificate

You warrant to ISRG and the public-at-large, and You agree, that You will immediately request that Your Certificate be revoked if: (i) there is any actual or suspected misuse or Key Compromise of the Private Key associated with the Public Key included in Your Certificate, or (ii) any information in Your Certificate is, or becomes, misleading, incorrect or inaccurate. You may make a revocation request to ISRG using ACME Client Software. You should also notify anyone who may have relied upon Your use of Your Certificate that Your encrypted communications may have been subject to compromise.

3.8 When to Cease Using Your Certificate

You warrant to ISRG and the public-at-large, and You agree, that You will promptly cease using Your Certificate (i) if any information in Your Certificate is, or becomes, misleading, incorrect or inaccurate, or (ii) upon the revocation or expiration of Your Certificate.

3.9 When to Cease Using Your Private Key

You warrant to ISRG and the public-at-large, and You agree, that You will promptly cease all use of the Private Key corresponding to the Public Key included in Your Certificate upon revocation of Your Certificate for reasons of known or suspected Key Compromise.

3.10 Indemnification

You agree to indemnify and hold harmless ISRG and its directors, officers, employees, agents, and affiliates from any and all liabilities, claims, demands, damages, losses, costs, and expenses, including attorneys’ fees, arising out of or related to: (i) any misrepresentation or omission of material fact by You to ISRG, irrespective of whether such misrepresentation or omission was intentional, (ii) your violation of this Agreement, (iii) any compromise or unauthorized use of Your Certificate or corresponding Private Key, or (iv) Your misuse of Your Certificate. If applicable law prohibits a party from providing indemnification for another party’s negligence or acts, such restriction, or any other restriction required by law for this indemnification provision to be enforceable, shall be deemed to be part of this indemnification provision.

4. ISRG’s Rights and Responsibilities

4.1 Privacy

Because others may rely on your use of Your Certificates to encrypt Internet communications, much of the information You send to ISRG will be published by ISRG and will become a matter of public record. ISRG’s collection, storage, use and disclosure of such information are governed by the Let’s Encrypt Privacy Policy at: https://letsencrypt.org/privacy/.

4.2 Certificate Repository

During the term of the Agreement, ISRG will operate and maintain a secure online Repository that is available to authorized relying parties that contains: (i) all past and current Let’s Encrypt Certificates (including, as applicable, Your Certificate) and (ii) a CRL or similar online database indicating whether Let’s Encrypt Certificates are valid, suspended, and/or revoked. ISRG will publish Your Certificate in the Repository and will indicate whether it is valid, suspended, revoked, and/or expired. ISRG will allow the public to access this information.

4.3 Suspension and Revocation

You acknowledge and accept that ISRG may immediately suspend Your Certificate if any party notifies ISRG that Your Certificate is invalid or has been compromised. ISRG will determine, in its sole discretion, whether to revoke Your Certificate. If You or Your agent requests that Your Certificate be revoked, ISRG will revoke Your Certificate and update the Repository as soon as practical. If a request for revocation is signed by your Private Key, then ISRG will automatically deem the request to be valid. You also acknowledge and accept that ISRG may, without advance notice, immediately revoke Your Certificate if ISRG determines, in its sole discretion, that: (i) Your Certificate was not properly issued or was obtained through misrepresentation, concealment, or fraud; (ii) Your Certificate has become, or appears to have become, unreliable; (iii) the security of the Private Key corresponding to Your Certificate has been or may be stolen, lost, or otherwise compromised, or subject to unauthorized use; (iv) any information in Your registration with ISRG or Your request for a Let’s Encrypt Certificate has changed or has become false or misleading; (v) You have violated any applicable law, agreement (including this Agreement), or other obligation; (vi) Your Certificate is being used, or has been used, to enable any criminal activity (such as phishing attacks, fraud or the distribution of malware); (vii) Your Certificate is being used, or has been used, to intercept the traffic of others; (viii) You request revocation; (ix) ISRG is legally required to revoke Your Certificate pursuant to a valid court order issued by a court of competent jurisdiction; (x) this Agreement has terminated; or (xi) there are other reasonable and lawful grounds for revocation. ISRG will provide notice of revocation via email to the email address of record.

4.4 IMPORTANT DISCLAIMER OF WARRANTIES AND LIMITATION OF LIABILITY

EXCEPT AS EXPRESSLY SET FORTH IN ISRG’S CERTIFICATE POLICY AND CERTIFICATE PRACTICE STATEMENT, LET’S ENCRYPT CERTIFICATES AND SERVICES ARE PROVIDED “AS-IS” AND ISRG DISCLAIMS ANY AND ALL WARRANTIES OF ANY TYPE, WHETHER EXPRESS OR IMPLIED, INCLUDING AND WITHOUT LIMITATION ANY IMPLIED WARRANTY OF TITLE, NON-INFRINGEMENT, MERCHANTABILITY, OR FITNESS FOR A PARTICULAR PURPOSE, IN CONNECTION WITH ANY ISRG SERVICE OR LET’S ENCRYPT CERTIFICATE.

BECAUSE LET’S ENCRYPT CERTIFICATES ARE ISSUED FREE-OF-CHARGE AS A PUBLIC SERVICE, ISRG CANNOT ACCEPT ANY LIABILITY FOR ANY LOSS, HARM, CLAIM, OR ATTORNEY’S FEES IN CONNECTION WITH SUCH CERTIFICATES. ACCORDINGLY, YOU AGREE THAT ISRG WILL NOT BE LIABLE FOR ANY DAMAGES, ATTORNEY’S FEES, OR RECOVERY, REGARDLESS OF WHETHER SUCH DAMAGES ARE DIRECT, CONSEQUENTIAL, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, PUNITIVE, OR COMPENSATORY, EVEN IF ISRG HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION ON LIABILITY APPLIES IRRESPECTIVE OF THE THEORY OF LIABILITY, I.E., WHETHER THE THEORY OF LIABILITY IS BASED UPON CONTRACT, WARRANTY, INDEMNIFICATION, CONTRIBUTION, TORT, EQUITY, STATUTE OR REGULATION, COMMON LAW, OR ANY OTHER SOURCE OF LAW, STANDARD OF CARE, CATEGORY OF CLAIM, NOTION OF FAULT OR RESPONSIBILITY, OR THEORY OF RECOVERY. THE PARTIES AGREE THAT THIS DISCLAIMER IS INTENDED TO BE CONSTRUED TO THE FULLEST EXTENT ALLOWED BY APPLICABLE LAW.

BY WAY OF FURTHER EXPLANATION REGARDING THE SCOPE OF THE DISCLAIMER, AND WITHOUT WAIVING OR LIMITING THE FOREGOING IN ANY WAY, ISRG DOES NOT MAKE, AND ISRG EXPRESSLY DISCLAIMS, ANY WARRANTY REGARDING ITS RIGHT TO USE ANY TECHNOLOGY, INVENTION, TECHNICAL DESIGN, PROCESS, OR BUSINESS METHOD USED IN EITHER ISSUING LET’S ENCRYPT CERTIFICATES OR PROVIDING ANY OF ISRG’S SERVICES. YOU AFFIRMATIVELY AND EXPRESSLY WAIVE THE RIGHT TO HOLD ISRG RESPONSIBLE IN ANY WAY, OR SEEK INDEMNIFICATION AGAINST ISRG, FOR ANY INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS, INCLUDING PATENT, TRADEMARK, TRADE SECRET, OR COPYRIGHT.

5. Additional Terms

5.1 Governing Law

The parties agree that the laws of the State of California govern this Agreement, irrespective of California’s choice of law and conflicts of law principles.

5.2. Choice of Forum

Any claim, suit or proceeding arising out of this Agreement must be brought in a state or federal court located in San Jose, California.

5.3 Limitation on Claims against ISRG

Any claim, suit or proceeding against ISRG arising out of this Agreement must be commenced within one year of any alleged harm, loss, or wrongful act having occurred.

5.4 No Third-Party Beneficiary

This Agreement does not create rights in favor of any third parties. Furthermore, it is the express intent of the parties that this Agreement shall not be construed to confer any rights on any third party.

5.5 Entire Agreement

This Agreement, together with any documents incorporated by reference in any of the foregoing, constitutes the entire Agreement between You and ISRG concerning the subject matter hereof.

5.6 Amendment

ISRG may modify this Agreement from time to time. Each modified version of this Agreement will be posted to ISRG’s Let’s Encrypt website (letsencrypt.org) at least fourteen (14) days before it becomes effective. If such new version contains material changes and You have provided ISRG with an email address, ISRG will send an email to such address notifying You of such new version at least fourteen (14) days before it becomes effective. In addition, major changes will be flagged with a new Subscriber Agreement version number in the ACME protocol, so You may be able to configure Your ACME Client Software to notify You of such changes.

5.7 Severability

If any provision of this Agreement is found to be invalid, unenforceable, or contrary to law, then the Agreement will be deemed amended by modifying such provision to the extent necessary to make it valid and enforceable while preserving its intent or, if that is not possible, by striking the provision and enforcing the remainder of this Agreement.

5.8 Authorization of ISRG to Send Emails

By requesting, accepting or using a Let’s Encrypt Certificate, You authorize ISRG to send You emails relating to the renewal or revocation of Your Certificates, or to Your request, acceptance, or use of Let’s Encrypt Certificates.

ISRG may send You such emails using any email address You provide to ISRG or any commonly-accepted contact email address for the domain names associated with Your Certificates, such as WHOIS domain contacts or common administrative email addresses.

PROHIBITED CONTENT AND ACTIVITIES

The following statements pertain to all products and services offered by Vision 4 Marketing.

Illegal Activity

Customer may only use Vision 4 Marketing Web Hosting’s Server for lawful purpose. Transmission of any material in violation of any Country, Federal, State or Local regulation is prohibited. To this effect, child pornography is strictly prohibited as well as housing any copyrighted information (to which the customer does not hold the copyright or an appropriate license) on Vision 4 Marketing Web Hosting’s Server. Also, using Vision 4 Marketing’s servers or network to conspire to commit or support the commission of illegal activities is forbidden as well.

Hacking

Websites dedicated to the discussion of hacking activities or the distribution of hacking tools are prohibited. Also, the usage of Vision 4 Marketing’s computer systems or network to access any system, service, or network without the owner’s consent is expressly forbidden.

Service Interruptions

Any activity which causes service interruptions to either Vision 4 Marketing’s network/servers or any outside network. This includes, but is not limited to, the execution of Denial of Service attacks or other maliciously configured software.

Anonymous Proxies

Anonymous proxies are easily abused and often cause a negative impact on both the servers and the network they are connected to. As such, they’re prohibited on Vision 4 Marketing’s network and servers.

Spamming

Customer agrees to not have any content on their site that advocates, sells or in any way makes available tools or methods to send unsolicited e-mail or usenet postings (spam), or to use Vision 4 Marketing Web Hosting’s Servers for relaying unsolicited e-mail or usenet postings, or to use unsolicited e-mail or usenet postings to advertise for their site hosted at Vision 4 Marketing. Any complaint we receive about a violation of this or the preceding two points will be taken very seriously and will result in immediate account cancellation without a refund. More details about our anti-spam policy can be found at http://www.internetmarketing-consultants.com/legal/

Personal Information Harvesting

Collecting or using email addresses, screen names or other personal identifiers without the consent of the person identified (including, without limitation, phishing, Internet scamming, password robbery, spidering, and harvesting).

Blacklisting

You agree that if the Vision 4 Marketing IP numbers assigned to your account are listed on an abuse database or blacklist like Spamhaus, you will be in violation of this AUP, and Vision 4 Marketing may take reasonable action to protect its IP numbers, including suspension and/or termination of your service, regardless of whether the IP numbers were listed as a result of your actions.

Investment sites

FOREX, egold exchange, etc.

Spoofing/Impersonation

Usage of the Vision 4 Marketing network to impersonate another person or entity, be it through Email, Internet Forums, or any other means, is strictly prohibited. This includes spoofing email or network packet headers whether or not it is done for malicious purposes.

Spamdexing

Customer agrees to not engage in activities pertaining to Black Hat SEO, Spamdexing, and so-called “Scraper sites.” These can all have a severely detrimental effect on server performance and are not permitted.

Any conduct that is likely to result in retaliation against Vision 4 Marketing’s network or website, or Vision 4 Marketing’s employees, officers or other agents, including engaging in behavior that results in any server being the target of a denial of service attack (DoS).

Personal Backups

With the exception of Vision 4 Marketing Dedicated Server products, the customer agrees to make use of Vision 4 Marketing Web Hosting servers primarily for the purpose of hosting a website, and associated email functions. Data uploaded must be primarily for this purpose.

Vision 4 Marketing Web Hosting services are not intended to be used for data backup or archiving purposes. For example, you are not allowed to import or store personal mail archives. Forwarding all emails from another fully-hosted email address for archival purposes is no longer allowed. Further, mail accounts cannot be used for file storage, such as for security cameras, storage of emails used to transfer files, etc.

NOTE: We reserve the right to delete your mail archives if they get out of hand!

We also reserve the right to negotiate additional charges with the Customer and/or the discontinuation of the backups/archives at their discretion. If you exceed your allocated transfer bandwidth for a month, you will be billed at the rate of $1 per additional 10GB.

Shared Hosting Addendum

The following statements pertain exclusively to shared web hosting products and services offered by Vision 4 Marketing.

PROHIBITED CONTENT AND ACTIVITIES

Adult Thumbnail Galleries/Banner Exchanges

You agree not to run a banner exchange, free adult tgp (thumbnail gallery post), or free adult image galleries on your website.

Abusive Scripts/Processes

Any script/process/etc that adversely affects the ability of any other customer to satisfactorily use their provided services is forbidden. This includes, but is not limited to, CPU-intensive CGI/PHP scripts and websites for which the scale of traffic has exceeded the acceptable limits of a shared hosting environment.

IRC Bots/Bouncers

All IRC bots and “bouncers” (bnc, etc) are forbidden.

BitTorrent software

While we recognize the value in the BitTorrent protocol as a distribution method, it is far too easily (and often accidentally) abused/misused and therefore not allowed on Vision 4 Marketing Shared Hosting services.

Proxy Software

All proxy software, anonymous or otherwise, is forbidden on Vision 4 Marketing Shared Hosting services.

Network Daemons

Any process that opens a network socket to accept connections from external networks is forbidden. Processes are allowed to bind to the local host only, but are held to the limitations placed on all other processes. They must not use up more than their fair share of resources and they must not interfere with any other customers’ activities.

Anti-Spam Policy

In the past, several years, the Internet has exploded with commercial activity. The breaking down of barriers between businesses and consumers has been facilitated by the rapid development of new technology, removal of ‘middlemen’, and tax rates favorable to online entrepreneurship.

We at Vision 4 Marketing are proud to support responsible commerce on the Internet – this is represented in our service offerings and unparalleled support. However, it has become apparent that the same environment that has helped this trend take off has also contributed to numerous cases of fraud and abuse of network resources.

“spam” has proven to be a major problem for many of our customers and the Internet at large. Spam is a common slang term referring to the sending of unsolicited email, instant messaging, or other communication to a large group of people at once. Variations on this practice include off topic (and usually promotional) messages on bulletin boards, guestbooks, Usenet newsgroups, or chat rooms.

Spam is strictly against our Terms of Service, and will result in the immediate disablement without refund of any customers who are found to have used spam in conjunction with their Vision 4 Marketing account.

The following policy dictates in specific terms what is considered acceptable use of bulk email/messaging by Vision 4 Marketing:

Subscriptions

Mailing list subscribers must specifically opt-into the list they are subscribed to. This applies to both new subscriptions and the bulk addition of addresses already subscribed via other means. Confirmation is handled using a single confirmation message sent to the subscriber’s email address. This mailing must contain a URL to the site’s privacy policy, a brief description of the mailing list, and a URL that the user must follow to confirm the subscription.

Mailing list subscriber information must include the date and time that the subscription was confirmed, as well as the IP address of the subscriber at the time of the confirmation. The user must be able to present this information at Vision 4 Marketing’s request.

The nature of email address use must be fully disclosed, either on the page the subscription is made from or with a prominent link to the site’s Privacy Policy. It must be made reasonably clear how a user’s email address will be used and in what circumstances it will be shared.

Lists cannot be procured from outside parties unless the email sender has procured a list from an organization that sells or otherwise shares email distribution lists, and all the following conditions are met:

  • The selling organization maintains a publicly viewable privacy policy disclosing that such sales may occur.
  • The privacy policy is prominently linked to from the page the subscriber signed up from.
  • The privacy policy has not changed substantially since the user signed up.
  • Records are kept of the date, time, IP address, and form location where the subscribing user signed up from.
  • Lists procured from outside parties must have been consistently handled in a manner comparable to Vision 4 Marketing policies.
  • Users cannot populate lists with addresses obtained for a substantially different purpose than was originally disclosed to the user.
  • All subscriptions must be re-confirmed in the manner described in Subscriptions (Section 1) before being sent bulk email messages.

Mailing Practices

Users must not modify the headers of any message in such a way that purposefully obfuscates the origin of the message.

Undeliverable addresses must be removed from all future mailings after no more than 5 bounces.

Users are responsible for the practices of any affiliate program members they solicit the help of, as if they were hiring an outside advertising agency.

Users using either outside advertising companies or 3rd party mailing programs must abide by the same policies and practices as those using Vision 4 Marketing’s own bulk mailing list tools.

All mailings must provide clear and simple to follow instructions for opting-out of future mailings, and all reasonable attempts must be made to facilitate the removal of a mailing list subscriber at their request.

The user is advised and acknowledges that Vision 4 Marketing’s electronic mail service equipment is in Florida. In no event, shall the user use Vision 4 Marketing’s equipment in violation of Florida’s anti-spam laws including Florida Business & Professions Code sections 175 Section 455.275(1)

Spamware

It is strictly prohibited in conjunction with your Vision 4 Marketing account to sell software designed specifically to facilitate the practice of spamming.

Other

Predominately promotional messages must not be posted to bulletin boards, discussion forums, guestbooks, Usenet newsgroups, or any other similar service unless the operator of that service explicitly allows such messages. In the case of Usenet newsgroups, such messages must be specifically allowed in that group’s charter.

Disablement

Vision 4 Marketing reserves the right to disable any account at any time should it feel there is a reasonable suspicion that it is being used in conjunction with the practice of spamming.

Customers must substantially address all spam related inquiries by Vision 4 Marketing personnel within 72 hours. Failure to respond within a reasonable period of time may result in the disablement of the user’s account.

By following these guidelines and respecting the privacy of your visitors, you can gain much from the responsible practice of commerce online. Of course, should you have any questions regarding the proper way to use bulk email with your web site, please contact us for more information.

Last Updated:

Feb 15th, 2017.

Collected Information

When you provide personally identifiable information to Vision 4 Marketing we collect a variety of data from you. That includes, but is not limited to you, your name, e-mail address, billing address, security question (and answer), credit card or other payment information, social security number (in limited instances) and a password.

We may also collect the URL from which you linked into our site, your IP address, your browser type and version, and a history of your actions on our website.

We also, as a manner of course, collect information from you which is required to establish and maintain an account with us, some of which may be personally identifiable, depending on your needs and the needs of your hosted data.

Use of Collected Information

Privacy is something we take very seriously at Vision 4 Marketing. With the exception of trusted business affiliates and/or associates who work on behalf of or in connection with Vision 4 Marketing, Vision 4 Marketing will not provide or sell to any third party your personal information and will keep all such data confidential.

Vision 4 Marketing customers with established accounts may review and alter the contact information associated with their Vision 4 Marketing account(s) at the following URL: Billing.Vision4Marketing.com/.

Vision 4 Marketing’s primary business operations are located in the state of Florida in the United States. As such, Vision 4 Marketing is subject to obey the laws of this jurisdiction and may be called upon by various law enforcement agencies to comply with ongoing investigations. Compliance may include the secure handover of customer data to a legally-authorized government agency.

When permitted by law Vision 4 Marketing will disclose to any customer that is the subject of a government investigation and any data requests pertaining to customers’ personally identifiable information and/or hosted data.

We may change this Privacy Policy from time to time. If we make changes, we will notify you by revising the date at the top of the policy and, in some cases, we may provide you with additional notice (such as adding a statement to our websites’ homepages or sending you a notification).

Vision 4 Marketing may utilize third party platforms to provide web-based and email-based advertisements for Vision 4 Marketing services after a user has visited and left Vision 4 Marketing’s website. Vision 4 Marketing and its advertising partners comply with “opt out” signals provided either by a user’s web browser automatically, by a user manually opting-out of web-based advertisements at http://www.networkadvertising.org/choices/, or by a user clicking the “unsubscribe” link in any promotional email.

Web Analytics Service

Vision 4 Marketing uses web analytics services to improve the usability and design of our customer experience. These services may record anonymous mouse clicks, mouse movements, and scrolling activity, but we’ll never use them to collect personally identifiable information from you. We only use this data internally to help us understand and enhance your Vision 4 Marketing experience.

LOOK AT OUR DEDICATED SERVERS

  • Dual Intel Xeon for speed and reliability.
  • SSd Drives or SATA Enterprise Hard Drives
  • Ram from 16GB to over 192GB

LEARN MORE
  • Web Design
  • Internet Marketing
  • VPS Hosting
  • Dedicated Hosting
  • Plesk Hosting

CONTACT INFO

247 Gonyo Lane, Richmond TX. 77469

+1 877-505-0006

hosting@internetmarketing-consultants.com

USEFUL LINKS

Users

  • Login

Order

  • Renew your solutions
  • Create an account

Support

  • 24/7/365 support