Effective as of March 9, 2021
Thank you for using our website. We look forward to building a long lasting relationship.
This is an agreement between LINK Host LTD and you, and is effective as of the date of your use of the above specified website (“Site”). It sets forth the general terms and conditions of your use of the Site and each product or service you purchase or access through this Site (each and together “Services”). Depending on the Services you have purchased certain additional provisions indicated below (“Service-Specific Provisions”) may be included and applicable. These are in addition to (not in lieu of) these general terms and, together with any referenced agreements and policies, form an integral part of this Agreement. In the event of a conflict between any particular Service-Specific Provision and any particular provision of these General Terms, the additional Service-Specific Provisions shall control.
We are a British corporation located at: 4 Wadsworth Road, Perivale, UB6 7JJ, United Kingdom. Unless otherwise indicated, “we”, “us” and “our” refer to LINK Host LTD and its brands, subsidiaries and sister companies (collectively, LINK Host LTD.). Our official details are:
|Identification number: 12590213|
|VAT number: 17846 26724|
We may refer to you using such terms as “you”, “your”, “customer”, or “User”. If you are acting on behalf of an entity, then “you” will refer to the entity and you represent and warrant to us that you have full authority to bind the entity to this Agreement. In any case “you” will also include any individual or entity who accepts this Agreement, uses the Site, acquires or uses Services, or acts on your behalf, whether or not authorized by you. It also includes anyone who has access to your account, which means that we will, without liability, rely on any action they take regarding your account. Please carefully guard your access credentials, including your passwords.
This Site and the Services are available only to individuals/entities who can form legally binding contracts under applicable law. By using this Site and/or Services, you are representing and warrantying to us that you are (1) at least of the age of majority; (2) able to form legally binding contracts under applicable law; and, (3) are not a person barred from purchasing or receiving Services under the laws of any applicable jurisdiction.
Your continuing to use the Site and/or any Services constitutes your acceptance of this Agreement. If you do not agree with the terms of this Agreement or any applicable Services Agreement you may not use the Site or Services.
You agree that we may modify this Agreement and/or the Services and any policies or agreements which are incorporated herein from time to time in our sole discretion. Such changes or modifications shall be effective immediately upon posting to this Site. Your use of this Site or the Services after such changes or modifications have been made shall constitute your acceptance of this Agreement as last revised. We may (but are not obligated to) occasionally notify you of changes or modifications to this Agreement by email. It is therefore
You must create an Account in order to access some features of the Site or use some of the Services. You represent and warrant to us that all information you submit when you create your Account is accurate, current and complete, and that you will keep your Account information accurate, current and complete. You agree to notify us within five (5) business days if there has been a change in any previously provided information and your failure to do so will, at our election, be a material breach of this Agreement and we will thereafter have the absolute right, in our sole discretion, to terminate any Services and close your account. If we have reason to believe that any part of the Account information you provide is untrue, inaccurate, out-of-date or incomplete, we reserve the right, in our sole and absolute discretion, to suspend or terminate your Account. You are solely responsible for the activity that occurs regarding your Account, whether authorized by you or not, and you must keep your Account information secure, including without limitation your customer number/login, password, payment method(s), payment providers, and any password. For security purposes, we recommend that you use a secure password, change it regularly, and keep it secure and undisclosed. You must notify us immediately of any breach of security or unauthorized use of your Account. Notwithstanding your notification to us, we will not be liable for any loss you incur due to unauthorized use of your Account. You, however, may be liable for any loss to us or to others as a result of unauthorized use of your Account, regardless of the manner or means used by anyone to gain unauthorized access to your Account.
4.1 You agree to use the Site and Services in compliance with this Agreement (and policies or agreements which are incorporated herein) and will not use, promote or encourage the use of the Site or Services:
In the event we, in our sole discretion determine you have, directly or indirectly, violated the provisions of this Section, we may, in addition to all other remedies, suspend or terminate your access and/or Services, without refund or liability.
We typically do not pre-screen or review content you may have posted on our Site or that is posted on a website hosted using our Services. However, we do reserve the right (but undertake no duty) to do so. If we review such content we may decide (in our sole discretion) that any such content is not appropriate and/or does not comply with this Agreement. In such a case we may, again in our sole discretion, take any action deemed appropriate, including, without limitation, removing any item we deem inappropriate and/or suspending or terminating your access to this Site or to all or any specific Service (including those not related to the content at issue). If we terminate your access to this Site or any Services, we may, in our sole and absolute discretion, remove and destroy any data and files associated with the Service, including, without limitation, that stored by you on any servers. No refunds are provided if we limit, suspend or terminate your Account/Services for violations of this Agreement.
Any content or software made available to you by way of a non-exclusive, non-transferable license for your personal use only in connection with Services you have purchased from us and only for as long as your subscription remains valid.
Any content or software, together with any copyright and other intellectual property rights embodied therein, are owned by us or by a third party from whom we have licensed same. Such content and software was not (and is not) sold nor distributed to you. We (or our licensee) reserve all rights to the software. Any license granted to you is a limited, non-exclusive, non-transferable and non-assignable license to use the software for such purposes as are ordinary and customary and consistent with the Services. You may not remove, modify, or obscure any copyright, trademark, or other proprietary rights notices that are contained in or on any content or software. You may use the software on any single computer but may not use it on multiple computer devices simultaneously. You agree to not reverse engineer, decompile (or otherwise attempt to discover the source code), alter or modify the software. You agree you are not authorized to (and will not) combine the software with any other software program, create derivative works based upon the software and are not
authorized to integrate any plug-in or enhancement which uses or relies upon the software except those we provide to you for such use. You acknowledge and agree that your use of content or software that is owned or controlled by third parties is subject to our agreement(s) with the third-party providers. If this Agreement or our Site requires or requests that you consent to any agreement with a third party regarding your use of any content or software, agree to honor any such agreement. We may provide your personal information to third- party providers as required to provide you with access to the content or software. Any software and services
are provided to you “as is” without warranty of any kind either express or implied, including but not limited to the implied warranties or conditions of merchantability or fitness for a particular purpose.
We may, acting at any time and in our sole discretion, modify, change or discontinue the use of any content or software operating on our Site or used in connection with any Services. In connection with any modification of software, you agree that you will faithfully cooperate in performing all steps necessary to install updates and that this Agreement (together with any third party software license agreement as to which your consent is required or requested) will continue to apply notwithstanding any update.
Subject to the terms of this Agreement or any applicable Services Agreement, we undertake to use commercially reasonable efforts to provide this Site and the Services on a continuous basis (24/7). However, you acknowledge and agree that this Site and applicable Services may, from time to time, be inaccessible or inoperable for any reason including, but not limited to, equipment malfunctions; periodic maintenance, repairs or replacements; or causes beyond our reasonable control or that we do not reasonably anticipate such as telecommunication or digital transmission congestion, interruptions or failures, hostile network attacks, or other failures. You acknowledge and agree that we have no control over the availability of this Site or the Service on a continuous or uninterrupted basis, and that we therefor assume no liability to you or any other person or entity with regard thereto.
EMPLOYEES, AND AGENTS MAKE ANY REPRESENTATION OR WARRANTY AS TO (1) WHETHER OUR SITE OR SERVICES WILL MEET YOUR REQUIREMENTS, FUNCTION AS INTENDED, OR THAT THE USE OF THE PROVIDED SERVICES WILL BE UNINTERRUPTED OR ERROR FREE. THE ACCURACY, COMPLETENESS, OR CONTENT OF THIS SITE OR ANY WEBSITE LINKED OR OTHERWISE ACCESSIBLE FROM THE SITE OR SERVICES; (2) ANY ADVERTISEMENT PUBLISHED ON THE SITE OR VIA THE SERVICES; AND/OR (3) ACCESSABILITY OR FUNCTION OF ANY SERVICES, WHETHER LOCATED AT OUR SITE OR ANY THIRD PARTY WEBSITE, AND WE ASSUME NO LIABILITY OR RESPONSIBILITY THEREFOR.
NO ORAL OR WRITTEN INFORMATION PROVIDED BY US, ITS OFFICERS, DIRECTORS, EMPLOYEES, OR AGENTS (INCLUDING WITHOUT LIMITATION ITS CALL CENTER OR CUSTOMER SERVICE REPRESENTATIVES), AND THIRD PARTY SERVICE PROVIDERS WILL CREATE A WARRANTY OF ANY KIND WITH RESPECT TO THIS SITE OR THE SERVICES FOUND AT THIS SITE, AND USERS SHOULD NOT RELY ON ANY SUCH INFORMATION OR ADVICE.
THE FOREGOING DISCLAIMER OF REPRESENTATIONS AND WARRANTIES SHALL APPLY TO THE FULLEST EXTENT PERMITTED BY LAW, AND SHALL SURVIVE ANY TERMINATION OR EXPIRATION OF THIS AGREEMENT OR YOUR USE OF THIS SITE OR THE SERVICES FOUND AT THIS SITE.
IN ADDITION, YOU ACKNOWLEDGE AND AGREE THAT IN NO EVENT SHALL OUR TOTAL AGGREGATE LIABILITY, DIRECTLY OR INDIRECTLY, EXCEED THE LESSER OF (A) THE AMOUNT WE HAVE RECEIVED FROM YOU DURING THE PAST TWELVE (12) CALENDAR MONTHS IN CONNECTIONWITH SERVICES YOU HAVE PURCHASED, OR (B) $1,000.00.
THE FOREGOING LIMITATION OF LIABILITY SHALL APPLY TO THE FULLEST EXTENT PERMITTED BY LAW, AND SHALL SURVIVE ANY TERMINATION OR EXPIRATION OF, THIS AGREEMENT OR YOUR USE OF THIS SITE OR THE SERVICES FOUND AT THIS SITE.
You agree to protect, defend, indemnify and hold harmless us and our officers, directors, employees, agents, and third party service providers (collectively “Indemnitees”) from and against any and all claims, demands, costs, expenses, losses, liabilities and damages of every kind and nature (including, without limitation,
reasonable attorneys’ fees) imposed upon or incurred by any Indemnitee directly or indirectly arising from (A) your use of and access to this Site or any Services; (B) your violation of any provision of this Agreement or the policies or agreements which are incorporated herein; (C) your violation of any third-party right, including without limitation any intellectual property or other proprietary right; and/or (D) any violation of any law, rule or regulation in any applicable jurisdiction. The indemnification obligations under this section shall survive any termination or expiration of this Agreement or your use of this Site or any Services.
We make no representation or warranty that the content available on this Site or the Services are appropriate or legally compliant in every country or jurisdiction, and access to this Site or the Services from countries or jurisdictions where the Site’s content or Services is illegal is prohibited. Users who choose to access this Site or the Services found at this Site are responsible for compliance with all local laws, rules and regulations and we will not be liable to you or any third party for your failure to comply with such laws, rules or regulations.
You agree that you will be responsible for notifying us should you desire to terminate your use of the Site or any of our Services. Notification of your intent to terminate must be provided no earlier than 30 days prior to your billing date but no later than three days prior to your billing date. If you terminate during your subscription period no amount will be refunded to you. Upon termination all unused credits will become and void.
You agree that any notices required to be given under this Agreement by us to you will be deemed to have been given if delivered in accordance with the information you have provided in connection with your account/Services.
This Agreement, together with all regulations and policies incorporated herein, as may be modified from time to time, constitutes the complete and exclusive agreement between you and us, and supersedes and governs all prior proposals, agreements, or other communications. This Agreement may not be amended or modified by you except by means of a written document signed by both you and an authorized representative of us that specifically references this Agreement and contains an express intention to amend same. For this reason you are cautioned that statements or comments that may be made to you, orally or in writing, in connection with the provision of Services, including communications from our help-desk, are not amendments and do not act to modify this Agreement.
Nothing contained in this Agreement shall be construed as creating any agency, partnership, or other form of joint enterprise between the parties hereto. Each party shall ensure that the foregoing persons shall not represent to the contrary, either expressly, implicitly, by appearance or otherwise.
Any provision of this Agreement may be waived if, but only if, such waiver is in writing and is signed by the party against whom the waiver is to be effective. The failure of us to require your performance of any provision hereof shall not affect the full right to require such performance at any time thereafter; nor shall the waiver by us of a breach of any provision hereof be taken or held to be a waiver of the provision itself.
In the event that any provision of this Agreement shall be declared by a court of competent jurisdiction to be unenforceable or invalid under any applicable law it shall not affect or impair the validity or enforcement of any other provision of this Agreement and the offending provision shall be limited to the least extent possible to render it enforceable or otherwise give effect to the parties’ intentions
Nothing in this Agreement or any rules, regulations or policies incorporated herein, shall be deemed to confer any third-party rights or benefits.
This Agreement shall be binding upon and inure to the benefit of the parties hereto and their respective and valid heirs, successors and assigns.
Except as otherwise may be expressly set forth in this Agreement, you may not assign your rights or obligations and any attempt to do so (including by levy or operation of law) shall be void and without effect, and at our election constitute a breach of this Agreement. We may freely assign all or any of our rights and obligations under this Agreement without notice and without your consent.
Neither party shall be deemed in default hereunder, nor shall it hold the other party responsible for, any cessation, interruption or delay in the performance of its obligations hereunder due to causes beyond its control including, but not limited to: earthquake; flood; fire; storm; natural disaster; act of God; war; terrorism; armed conflict; labour strike; lockout; boycott; supplier failures, shortages, breaches, or delays; or any law, order regulation, direction, action or request of the government, including any governmental authority (whether federal, state or local or any agency, division or department thereof) governments having or claiming jurisdiction over us; or any other cause or circumstance, whether of a similar or dissimilar nature to the foregoing, beyond the reasonable control of the affected party, provided that the party relying upon this section
immediately terminate this Agreement. Force majeure events shall not apply to difficulties in your tendering payment when otherwise due.
The section headings appearing in this Agreement are inserted only as a matter of convenience and in no way define, limit, construe or describe the scope or extent of such section or in any way affect such section.
This Site and the Services may contain links to websites that we neither own nor control and we assume no responsibility (and will incur no liability) for the content, terms and conditions, privacy policies, or practices of any such websites. We encourage you to review the terms and conditions, privacy policies, and other governing documents of each other website that you may visit. By using this Site or the Services, you are expressly releasing us and our officers, directors, employees, agents, affiliates, or service providers from any and all liability arising from your use of any third-party website.
Except for any content that you provide or store in connection with any Services, the content on this Site and any Services , including but not limited to, software, scripts, source code, API, text, graphics, photos, sounds, music, videos and interactive features and the trademarks, service marks and logos contained therein
(“LINK Host LTD Content”), are owned by or licensed to us for our use, and are subject to copyright, trademark, and/or patent protection in the United States and foreign countries, and other intellectual property rights under the laws of UK and other jurisdictions.
Any LINK Host LTD Content is provided to you “as is”, “as available” and “with all faults” for your information and personal, non-commercial use only in connection with the Site and Services, and may not be, directly or indirectly, downloaded, copied, reproduced, distributed, transmitted, broadcast, displayed, sold, licensed, or otherwise exploited by you for any purposes whatsoever without our express prior written consent. Nothing in this Agreement, or in any regulations or policies incorporated herein, acts to grant to you any license under any copyright, trademark, patent, or other proprietary right or license. We reserve all rights not expressly granted in and to any LINK Host LTD Content, this Site and the Services, and this Agreement does not transfer ownership of or any license to any of these rights.
This Agreement, along with all rules, regulations and policies and any applicable agreements required for any specific Service (collectively, “Agreement”), is executed and enforceable in the English language. Any translation provided to you is for convenience purposes only, and, to the fullest extent permitted by applicable law, in the event of any conflict between the English and translated version, the English version will control and prevail. Where the translated version is required to be provided to you and is to be considered binding by law (1) both language versions shall have equal validity; (2) you acknowledge that you have reviewed both language versions and agree that they are substantially the same in all material respects; and, (3) in the event of any discrepancy between the two versions, while the translated version may prevail to the extent required by law, its interpretation shall be consistent with the intent of both you and us as expressed in the English.
We may, from time to time, offer new Services in a “beta” version (a pre-release version not yet available to the general public) (“Beta Services. If you opt to use any of our Beta Services, your use is subject to the additional terms and conditions set out in this Section.
All Beta Services are pre-release versions and may not work properly. Your use of the Beta Services may result in operational failures. All Beta Services are provided as-is and without any form of warranty or representation and we do not recommend using them if you cannot sustain the risks of complete loss of functionality or loss or corruption of data. We reserve the absolute right to modify, change, or discontinue all or any part of any Beta Service at any time, without notice or liability therefor. If any Beta Service is subsequently released to the general public as a Service, you assume the risk that the commercial version may have changed substantially from the Beta Service and/or that the commercial version may not be compatible with the Beta Service or any programs used in connection therewith. We may limit or eliminate customer service for any Beta Service. In exchange for your access to the Beta Service, you agree to provide feedback regarding your experience in using the Beta Services, providing such feedback in the format and detail reasonably requested by us.
You agree that we can freely your all or any part of your feedback for any purpose, including product development purposes or inclusion within publicity, press materials and marketing collateral. Any agree that any intellectual property inherent in your feedback or arising from your use of any Beta Service shall be owned exclusively by us and you hereby assign to us all rights thereto. You that any information regarding your use of any Beta Service, including your experience with and opinions regarding the Beta Service(s), is confidential, and that although we may disclose same, you may not do so other than providing us with the feedback. Any
Beta Services are provided “as is”, “as available”, and “with all faults”. To the fullest extent permitted by law, we disclaim any and all warranties, statutory, express or implied, with respect to any Beta Services including, but not limited to, any implied warranties of title, merchantability, fitness for a particular purpose and non- infringement.
For any questions about this Agreement, please contact us by email or regular mail at the following address: LINK Host LTD – Legal Department
4 Wadsworth Road, Perivale, UB6 7JJ, United kingdom
Our DMCA agent is registered with the United States Copyright Offices and such other locations as may be required.
Our Data Control agent is, if required, registered with the appropriate authorities of the UK government and/or such other locations as may be required.
If you elect to sell or resell advertising or web space to a third party then you are responsible for the contents of that advertising and the actions of that third party. You may not sell, resell advertising or web space representing more than 20% of any webpage. You may not, directly or indirectly, sell or resell advertising or web space if the effective result (in our sole discretion) is that you are reselling any of our Services. If we determine in our discretion that you are engaging in such prohibited activities, we may suspend or close your Account and/or Services or require that you agree to and abide by our Reseller Agreement, the terms of which are incorporated by reference into this Agreement.
We have the absolute right to reject any advertising or other third party content that is illegal, offensive or otherwise in breach of this Agreement, any policy or regulation, or any applicable law. Such violation may result in the suspension or in the immediate termination of your account. You are responsible for monitoring all of your domain transfers, renewals and orders. In the event that an error occurs you must notify us immediately of the error. In no event shall we be liable to you for any damages resulting from or related to any failure or delay of domain registration, transfer or renewal. Other provisions of this Agreement, including warranty and liability limitations.
Any and all contractual agreements between us and you are exclusively governed by and construed in accordance with the laws of the country of UK, exclusive of the conflict of law provisions and the United Nations Convention on Contracts for the International Sale of Goods.
Effective as of June 6, 2019
If you elect to resell any of our Services a third party (your customers) then you must agree to our Reseller Agreement which can be found HERE , the terms of which are incorporated by reference into this Agreement. As a Reseller you will, in addition to those provisions in our Reseller Agreement, be responsible for the acts and omissions of the third party. Each of your customers must, as a condition of purchasing our Services through you, consent to this Agreement. We retain the absolute right to reject any of your customers if we find them to be objectionable or if, through act or omission, they breach any provision of this Agreement, any policy or regulation, or any applicable law. Additionally, we may suspend or terminate any of your customer’s Accounts or Services, if, through act or omission, they breach any provision of this Agreement, any policy or regulation, or any applicable law. Other provisions of this Agreement, including warranty and liability limitations, apply in addition to, and not in lieu of, the Reseller Agreement.
Effective as of June 6, 2019
We offer a variety of hosting and related support plans including the following:
Web Hosting. Web Hosting plans place your site within one or more of our servers. Resources are shared between many customers on the same servers; however, your site is given a unique address. Managed Hosting. Managed Hosting plans, you get all of the benefits of having your own VPS or Dedicated Server, but we will manage the server for you including setting up your control panel, patching cycles and back-ups.
Reseller Hosting. Reseller Hosting combines Managed Hosting and an integrated Web Host Manager license, which allows you to, among other things, resell, configure and manage both hosting accounts and domain names, and with WHMCS, it allows you to invoice and collect payments, and track communications and support issues with your customers. A separate Reseller Agreement may be required.
Managed WordPress Hosting. Managed WordPress Hosting plans give you a streamlined and optimized experience to build and manage WordPress sites. We handle the basic hosting administrative tasks, including: installing WordPress, automated daily backups (if included in your plan), WordPress core updates and server- level caching.
Virtual Private Server (“VPS”)u>. VPS plans place your site within a server shared with other customers, but you will have full control over your server space and the complete configuration of your virtual instance on the server. You will have administrator (root) access and a dedicated IP address.
Dedicated Server. Dedicated Server plans reserve an entire server exclusively for your account and usage. You will have exclusive rights to your server’s bandwidth, memory, and storage space, and your server’s performance will not be affected by traffic and the usage patterns of other customers.
Managed Support. Managed Support is a monthly subscription that provide you with root/administrative access to the service and Plesk or cPanel. We handle core patching, security, monitoring and backups.
Additional configurations and installations can be performed for an additional fee.
Bespoke Hosting Services. Bespoke Hosting Support and dedicated services provide you with custom support services available for a negotiated fee proposed after learning about your needs. Bespoke Hosting Services can provide you with an experienced server administrator for complicated tasks such as firewall and database configuration and complex migrations.
Hosting Backup. Hosting backup and restore services saves all your website files to the cloud once per day. These backup and restore services may be available for an additional fee depending on your hosting plan.
Use Restrictions. In addition to those restrictions described above, you agree that you will not:
We may (but undertake no obligation to) scan your hosted account and any website(s) for malicious content and, in the event we locate any such content, we may remove it in our discretion for security purposes, without notice or obligation as concerns the operability of your website or the preservation of any data contained therein. We also have the right to carry out a forensic examination in the event of a compromise to your server or account.
If you are in violation of this Agreement, or we determine that there are activities that threaten the stability of our network, we may remove or disable your website (and any other website you host with us) temporarily or permanently from our servers.
Storage and Security. Our servers are not an archive and we shall have no liability to you or any other person for loss, damage or destruction of any of your content. You are solely responsible for preventing any loss or damage to your website or server content; maintaining independent archival and backup copies of your website or server content; and ensuring the security, confidentiality and integrity of your website or server content that is transmitted through or stored on our servers. This remains true even if you have subscribed for backup services.
Our Hosting Services are not intended to provide a PCI (Payment Card Industry) or HIPAA (Health Insurance Portability and Accountability Act) compliant environment and should not be used or considered as one. You shall not use the Service in any way, in our sole discretion, that shall impair the functioning or operation of our services or equipment.
Website/Server Content. You shall be solely responsible for providing, updating, uploading and maintaining your website or server and any and all files, pages, data, works, information and/or materials on, within, displayed, linked or transmitted to, from or through your website or server. You agree that our support staff to modify, alter or remove the content of your hosted product in the course of providing you with support or technical services. If you have purchased our Backup Service, additional terms may apply. However, such terms do not remove your primary responsibility as noted above.
If you install (or request that we install) or use any computer software that we did not provide to you as a part of our Services, you represent and warrant to us, and our directors, officers, employees, agents and affiliates that (1) you have the right to install and use such software on the server and in connection with your website;
(2) you have paid any applicable licensing fee(s) relative to such installation and use; and (3) such software does not and will not infringe on the intellectual property or other rights of any other person or entity.
Storage and Plan Limits. All Web Hosting and WordPress Hosting plans, including the unlimited plans, are subject to limits.
Our basic Hosting Services are designed to host most personal, small business and organization websites, and thus we offer a reasonably unlimited bandwidth. This means that we do not set a limit on the amount of bandwidth, websites or disk space you may use in the operation of your website, provided it complies with this Service Agreement and does not act as a burden to our systems given other customer needs. Some of our plans offer more disk space and website capacity but at an added fee.
In the event the bandwidth, number of websites or disk space usage of your website presents, in our sole opinion, a risk to the stability, performance or uptime of our servers, data storage, networking or other infrastructure, you may be required to upgrade to a VPS or Dedicated Server, or we may take action to restrict the resources your website is utilizing.
Because of the space required for operating systems, system files and other supporting software, the total amount of usable storage capacity for your particular Hosting Service(s) may differ from the represented capacity. Backups and Add-Ons will also reduce the usable space available.
All Hosting plans, including unlimited plans, are subject to the following limits (as applicable): (1)no more
than 250,000 file entries (inodes) per account for Linux® hosting accounts; (2) no more than 500,000 files and folders per account for Windows® hosting accounts; and, (3) no more than 1,000 tables per database and no more than one gigabyte of storage per database. If you exceed these limits you may be issued a warning. Your subsequent failure to reduce your consumption to a level equal to or below the limits may result in a temporary or permanent suspension (as we deem appropriate) and no amounts will be refunded. All Linux hosting plans are subject to additional limitations. No Linux hosting plan may exceed: (1) 25% of one CPU core; (2) 512MB of RAM; (3) 100 website connections; (4) 100 active processes; and/or (5)( 1 MB/s disk IO. If you exceed these additional limits you may experience a slowing of site loading and response times. Additional resources are available for an additional fee.
You may only use WordPress Hosting for a WordPress website. Any non-WordPress site requires its own hosting plan. You may only install one instance of WordPress per website. If you violate these requirements, you may be issued a warning. Your subsequent failure to comply may result in a temporary or permanent suspension (as we deem appropriate) and no amounts will be refunded.
Website/Server Content. You may not include any of the following content on any hosted website: (1) image hosting scripts that allow an anonymous user to upload an image for display on another website; (2) banner ad services for display on other websites or devices (commercial providers of rotation-based banner advertisements); (3) file dump/mirror scripts that allow an anonymous user to upload a file for other to download; (4) commercial audio streaming (exceeding one or two streams); (5) push button mail scripts that allow the user to specify recipient email addresses; (6) anonymous or bulk SMS gateways; (7) backups of content from another computer or website; (8) Bittorrent trackers; or, (9) any script that causes a degradation in the performance of our server or network environment.
Content Delivery Networks (CDNs). We may, in our discretion, offer access to caching and distribution of website content using a network of dispersed servers. These servers may be located anywhere globally, including the United States. You acknowledge and agree that We may alter or discontinue your access to CDNs at our discretion.
WHMCS License. We operate a WHMCS environment which provides you (and us) with a wide variety of tools and dashboards. We feel WHMCS makes the hosting experience easier. As a part of your Hosting Services subscription you agree to be bound by WHMCS’s Terms of Service located HERE and WHMCS’s
End-User License Agreement located HERE, both of which are incorporated by reference into this Agreement. Your hosting plan may provide you with access to use ManageWP. ManageWP is a website management console which allows its users to administer any number of websites including, but not limited to, management, monitoring, backups, deployment, publishing, and security tools. You acknowledge and agree that your use of ManageWP is subject to the terms of service required by ManageWP, and incorporated herein by reference.
cPanel. If you have purchased or otherwise added cPanel to your server, you agree to be bound by the cPanel’s End-User License Agreement, which is incorporated by reference into this Agreement.
General. Our Dedicated Hosting allows you to operate your own specifically configured server to host your website. This server may be its own independent computer or may be a segregated area within a server used by others.
Server Access. If you purchase our Backup Service, you hereby authorize us to log into your server for purposes of installing and configuring the backup software.
IP Addresses. We may, from time to time, migrate our servers to new or different equipment as we may determine advisable, including without limitation, maintenance, equipment replacement or load balancing. As a result, even if you have a dedicated IP, you may be assigned a different IP number. We do not warrant that
you will be able to consistently maintain your given IP numbers. Also, if your Service Subscription includes multiple IP addresses it is important that you use them. Accordingly, you agree that we may reclaim unused IP addresses if you do not begin to use at least ninety percent (90%) of your subscribed IP addresses within thirty
(30) days of their assignment to you. You will not receive a refund for any reclaimed IP Addresses.
General. This section applies if you have subscribed to our Backup Services. We offer both FTP Backup and Database Backup Services, each for an extra fee. Our Backup Service may require that your server may be down, slow to respond, or unavailable to the public during installation and maintenance.
Backup Limitations. Backup Services are subject to disk-space limitations which are specific to the plan you have purchased. Different fees may apply as you use more capacity. It is your responsibility to ensure that your backups (including historical copies) do not exceed the applicable limits. If they do, we reserve the right, in our sole discretion to truncate your backups such that applicable limits are not exceeded, or increase the applicable limit and charge you any additional fee(s) applicable. In the event of the latter you agree to pay such additional fee and authorize us to immediately process payment with your payment provider.
Limitations of our Obligations. Subject to additional limitations found elsewhere in this Agreement, warranty exclusions and liability limitations, we agree only to use commercially reasonable efforts to provide FTP Backup and Database Backup services on a frequency applicable to the Backup Service plan you purchased. You agree that our Backup Services may be inaccessible or inoperable from time to time and for any reason, including, without limitation: (1) maintenance procedures or repairs we undertake; (2) equipment malfunctions; or (3) causes beyond our control or that are not reasonably foreseeable including, but not limited to, interruption or failure of telecommunication or digital transmission links, hostile network attacks, network congestion, security intrusions, or other failures. FTP Backup and Database Backup may not be available on all hosting plans. We reserve the right to store backups in any one or more of our servers and for this reason backup files may be stored at locations that differ from your website server. Please note that even if Backup Services are purchase, it remains your primary responsibility to ensure that your website along with all content and files are properly backed up and archived.
General. Support is provided as a part of your paid Services. Support is provided 24/7 but is available on an as- come, as-served basis and subject to the availability of our support personnel. Support is available on a “best
Premium Support. Premium Support is available on a subscription or pay-as-you-go basis. Premium Support Service is superior to our general support services but it is not unlimited. We reserve the right to charge any or all of the fees for Premium Support Services prior to the commencement of any work being performed. Our fees are subject to change at any time prior to commencement of any work. Premium Support generally applies to out-of-scope support such as problems that are not directly caused by our Services or software we have provided. Premium Support may require that you install a plug-in software application to allow our support personnel access to your systems so that we can attempt to diagnose, repair, automatically update files, software, and the like related to the maintenance of your site and server.
Expert Services. If we determine that any support request falls outside the scope of your purchased Services, we will let you know. We may agree to provide custom services for a fee, or on a per service basis. You will have the opportunity to approve any quoted fee. We reserve the right to charge such fees prior to commencement of work. If we do not agree to provide customer services we will not provide you with referrals. We are not responsible for and will not provide assistance with any issue(s) that arise beyond fourteen days of any Expert Services.
will have the opportunity to approve any quoted fee. We reserve the right to charge such fees prior to commencement of work. If we do not agree to provide customer services we will not provide you with referrals. We are not responsible for and will not provide assistance with any issue(s) that arise beyond fourteen days of any Expert Services.
We reserve the right to refuse to provide services if doing so will expose our personnel to harassment or what we deem unreasonable conduct. This includes objectionable materials such as pornographic, X-rated, sexually explicit, or otherwise tasteless text, materials, images, products or services (including, but not limited to: massage, dating, escort or prostitution services).
All Support is available on a “best efforts” basis. We provide no guaranty that we will be able to resolve your issues or that our assistance, if successful, will continue to work for you. Our support services are limited. In the case of an inoperable failure or defect, we will limit our technical support to restoring any applicable software program to its original state, assuming you have retained and provided copies to which you hold a fully-paid license. We will not undertake to re-configure or install data or undertake customized services.
Hosting Migrations. Migrations of websites and their related files can be difficult. Most hosting companies are is configured differently and store their data and file configurations in formats that are proprietary or incompatible with our systems. While we will try our best to assist you with any migration to or from our Hosting Services, we do as a courtesy service. Any assistance we may provide is on a best-commercial efforts basis and subject to availability of qualified personnel and the nature of the migration you desire.
We will not perform website backups or archives of your old website or files when we assist with a migration, and we strongly recommend that you back up your third-party hosted website before starting any migration process. If we do assist you with a migration, you agree that during the migration process you will not modify the website or any related files. You are solely responsible for ensuring that any migration was correctly completed.
reviewing the functionality and accuracy of migrated content in its new location following a Hosting Migration. If you are satisfied with the data migration, you will need to update the DNS record for the domain name in order to publish the website in its new location. We will not perform website backups or archives in connection with a Hosting Migration, and we recommend that you back up your third-party hosted website before migration to ensure that no data is lost. You agree not to make any changes or revisions to your website during the migration process.
We provide no express or implied warranty that any migration will be successful, even if we have assisted you in the process. In addition to the warranty exclusions and liability limitations stated elsewhere, you agree that we will not liable to you or any third party for any loss in connection with a delay, website resolution, or loss of data related to your Hosting Migration.
Termination. Your Hosting and other Services may be terminated at the earlier of (a) expiration of your relevant subscription period, or (b) your violation of this Agreement. In the event of termination you must stop using any Hosting or other Services and relinquish use of the IP addresses and server names that may have been assigned to you and you must alter any Name Server designation records in your domain name registration. Any images or other materials we have provided to you in connection with Services remains ours and were available for your use while you were our customer. You may not transfer any such images or other materials to any other location for use in conjunction with services provided by any third party. If Services are terminated you are responsible for migrating your website and all content to your new provider. We will not transfer files, including backups to another provider. Although we reserve the right to do so immediately upon termination, we reserve the right to delete any website and related content from our servers within ten (10) days following termination of your Services.
Third Party Software. Third Party Software means any software or application developed and owned by a third party provider with whom we may contract with from time to time.
Operating Systems. Hosting Services may be operated in both Linux® and Windows® environments. Each time you commission a server, we will provision the server with the operating system you choose.
Modifications, Changes, Discontinuations. We expressly reserve the right to modify, change, or discontinue any Service or software, including, Third-Party Software, at any time, and you agree to cooperate in performing such steps as may be necessary to install any updates, as applicable. Software is neither sold nor distributed to you, and you may use the software solely as part of your Hosting or other Services. You may not use any software outside of the Services for which you subscribed and paid. We may provide your personal information to third-party providers as required to provide any Third-Party Software. You acknowledge and agree that your use of software may be subject to our agreement(s) with the third-party providers. In addition, if any software is accompanied by, or requires consent to, a service or license agreement from us or any third- party provider, your use of the software is subject to such service or license agreement. You may not download, install, or use any software that is accompanied by or requires consent to a service or license agreement from us or any third-party provider unless you first agree to the terms and conditions of such service or license agreement. You may not remove, modify, or obscure any copyright, trademark, or other proprietary rights notices that are contained in or on any software. You may not reverse engineer, decompile, or disassemble any software, except and only to the extent that such activity is expressly permitted by applicable law. You acknowledge and agree that both we and any third-party providers (and our respective affiliates and suppliers) make no representations or warranties about any software offered in connection with any Services, and expressly disclaim any liability or damages (whether direct, indirect, or consequential) arising from the use of any software. You acknowledge and agree that any software will be supported by us and not by the third- party providers (or their affiliates or suppliers). Other terms and conditions stated elsewhere in this Agreement may apply, including warranty exclusions and liability limitations.
General. Your website will remain available to the public 99.9% of the time, measured on a per-month basis over the calendar year.
Exclusions. Our uptime guaranty does apply to periods of unavailability directly or indirectly caused by: (1) periodic scheduled maintenance or repairs we may perform; (2) interruptions caused by any act or omissions of you or any of your employees or agents, including, without limitation, scripting, coding or the installation errors; (3) errors caused by third-party software applications; (4) any period during which your website resolves publicly even though slowly or if all of your website may not be completely accessible, or accessible on a delayed or intermittent basis (for example, backup services, certain Add-Ons or email); (5) causes beyond our control or that are not reasonably foreseeable; and, (6) outages related to any defect in any third party software (whether or not installed by us). Other exclusions may apply as set forth in our warranty exclusions and liability limitations provisions found elsewhere in this Agreement.
General. We offer a number of Add-On Services that can be configured to work with your Hosting Services, including control panel, Backup Services (FTP & database backups), Monitoring, Site Builder, SEO, SSL Certificates, firewall, VPN, and RAID. Add-Ons are provided for an extra fee and generally provided on a periodic subscription basis. The specific Add-Ons available to you may depend on the particular Hosting Service to which you subscribed. Your Add-On services will continue only for as long as your subscription payments remain current. Add-on services may require you to download and periodically upgrade software and failure to maintain or upgrade may result in a degradation or loss of service, for which we will not be
responsible. Add-On services are provided in the form of a personal, limited, non-transferable, non-exclusive license to use the relevant Service and any related software solely for your personal, private and non- commercial purposes. You may not resell all or any part of any VPN Service or permit others to use or access same using your account. Please note that Add-Ons may consume some of your available storage and depending on the Add-On, may require installation services on our part, such as additional hardware or software to which additional fees may apply. Some Add-On services/software may not function properly or cause conflicts with other software you have installed on your server or to operate your website.
Add-On Service – End-User Agreements. Some or all Add-On Services may require that you consent to the specific End-User License/Use Agreement as required by the owner/provider of any software application provided as a part of any Add-On service. The relevant End-User License/Use Agreement will be presented to you upon check-out and your consent is required as a part of the check-out process for purchasing such Add- Ons. The terms of such End-User License Agreement are each incorporated by reference into this Agreement.
Domain Name Registration
Domain Names are available for registration. Registrations are subject to specific agreements depending upon the specific domain name and relevant domain name registry, some of which are referenced below in part. By registering any domain name using our Services you are agreeing to the terms of the relevant registrar and registry, each of which is incorporated by reference within this Agreement.
Domain names are registered under clients’ names and are managed by Hosting.uk on your behalf. Privacy protection may be available and if available can be enabled upon your request for an additional fee. At any time you will have the option of taking full control over the domain name.
Domain Names may also be available for lease but a separate leasing agreement is required. Please contact us if you are interested in domain name leasing.
Nominet: Terms & Conditions
LINK. and this Site is member of Nominet. When registering with us any domain names available through the Nominet registry, you agree on this Agreement, as well as the Nominet’s UK terms and conditions, and which (in addition to being provided in part below) are incorporated within this Agreement by reference.
We offer a Service Level Agreement of 3-4 business days for any issues with our customer’s domains registered through the Nominet registry. We aim to resolve the issue as fast as possible.
If you are not satisfied with our domain related service you can sent your complaint to us. Please describe the issue as detailed as possible. It will allow our team to proceed with your complaint immediately. We will acknowledge your complaint within 1 business day. We aim to resolve any problems within 4 business days.
You have the right to file a formal complaint about a registrar (the .uk registry).
In case you suffer from any abuse (phishing scams, spam emails), please contact us. We aim to resolve any issues within 4 business days.
LINK. is responsible for WHOIS data accuracy. We may require your cooperation when verifying domain contact.
We will typically send you invoices 10 days before domain’s expiration date. Emails will be sent to the email address in the account. It is the client’s responsibility to maintain their data up to date.
If a domain is not renewed before its expiration date, you will have up to 30 days to renew the domain name. After 30 days, another 60 day grace period may take place. You may be able to reactivate the domain, but you will need to pay a reactivation fee. If you do not renew your domain name timely it will be released back to the market and become available for registration by third parties.
You can transfer your domain away from us at any time without any charge. For transfer in fees may apply. Please note that a 90 day hold period (during which transfers may not be undertaken) may be applied in the event you change any information contained within your WHOIS registration data.
Effective as of June 6, 2019
This Refund Policy is incorporated within and not in lieu of the Agreement.
Subject to more specific refund policies stated below, Services that you purchase from us may be subject to a refund only if cancelled within the following timeframe:
Annual Plans: Within 30 days of the Transaction Date.
Monthly Plans (less than 1 year): Within 48 hours of the Transaction Date.
Security Services with remediation service cannot be refunded once a cleanup request has been submitted and services have begun (including automated scanning).
“Transaction Date”, means the date of purchase of any product or service, which includes the date any renewal is actually processed by us or via our Site.
No Refund After Account Closure: Accounts will be automatically closed upon cancellation/termination of all Services. You must make a request for refund before your account is closed. Even if otherwise eligible for a refund under our standard or specific policies, no refund will be made if notice is provided after the date your Service is cancelled or terminated for any reason.
The Standard Provisions are subject in all cases to the specific refund policies set forth below and in the case of a conflict the specific refund provision most favorable to us will apply. Some Services are not subject to refund.
Domain Name Registrations/Renewals
Registrations and renewals of domain names having of any type of extension (e.g. com/net/org, etc.) and renewals are not refundable. Any fees paid for pre-registration of any domain name is not refundable. Terms of individual registries may differ and any shorter period imposed by the domain name registry will control.
Subject to special provisions appearing on our Site at the time you purchased your subscription, refunds may be available for Hosting Services based upon the nature of your subscription, as follows: Monthly Subscriptions. A refund may be available if you terminate within 30 days of the Transaction Date and we have not yet made the Hosting Services available to you. No refunds are provided if we have already made Hosting Services available to you. Quarterly Subscriptions. A refund may be available if you terminate within 30 days of the Transaction Date and we have not yet made the Hosting Services available to you. No refunds are provided if we have already made Hosting Services available to you. Annual Subscriptions. A refund may be available if you terminate within 30 days of the Transaction Date and we have not yet made the Hosting Services available to you. If we have already made Hosting Services available to you, you will remain responsible for payment of Hosting Services for the first 6 months of the annual subscription period and if you have paid in you will receive a refund equal to six (6) months of your subscription fee, measured on a prorated basis. Exclusions. A refund of fees paid for Dedicated Servers. Hosting, VPS Server Hosting or Cloud-based Hosting Services may be available if you terminate within 30 days of the Transaction Date and we have not yet acquired or provisioned the dedicated or VPS server or otherwise made the Hosting Services available to you.
A refund may be available if you terminate within 30 days of the Transaction Date unless we have commenced security scans or malware has been otherwise identified and/or removed.
You may receive a refund may be available if you terminate within 30 days of the Transaction Date and we have not yet made the relevant Backup Service available to you. If we have made the Backup service available to you will not be entitled to a refund.
Mega™ Cloud Backup
Mega Backups are provided by way of purchased coupons issued by the supplier, Mega Limited. No refunds are provided.
Uptime, Full Page Load, Servers/VPN Monitoring and Custom Monitoring (“Monitoring Tools”) are provided on a periodic subscription basis. If you cancel Monitoring Tools, we will provide you may receive a refund may be available if you terminate within 30 days of the Transaction Date and we have not yet made the relevant Monitoring Tool available to you. No refunds are provided if we have already made relevant Monitoring Tool available to you or if we incur a charge from any third party in connection with your order.
We normally sell our SEO Services with a twelve (12) month commitment. Although you may cancel SEO Services at any time, your cancellation will only be effective as of the last day in the billing period for your subscription and we will stop billing you at the end of the billing period in which your cancellation was received. Any amounts related to the current or prior billing period(s) remain due and are not refundable.
Site Builder is a software tool and provided on a periodic subscription basis. Although you may cancel Site Builder at any time, your cancellation will only be effective as of the last day in the billing period for your
subscription and we will stop billing you at the end of the billing period in which your cancellation was received. Any amounts related to the current or prior billing period(s) remain due and are not refundable. Please note that because of the issues migration, your website may no longer be available should your Site Builder Service be cancelled or terminated.
Web Design Services
A refund may be available if you terminate within 30 days of the Transaction Date and we have not yet begun any work on your project. Once any work has commenced no amount is refundable.
SSL Certificates are provided on a periodic subscription basis. Although you may cancel your subscription at any time, your cancellation will only be effective as of the last day in the billing period for your subscription and we will stop billing you at the end of the billing period in which your cancellation was received. Any amounts related to the current or prior billing period(s) remain due and are not refundable.
VPN services are provided on a periodic subscription basis. You may cancel your VPN subscription at any time but your cancellation will only be effective as of the last day in the billing period for your subscription and we will stop billing you at the end of the billing period in which your cancellation was received. Any amounts related to the current or prior billing period(s) remain due and are not refundable.
Purchased Product w/ Domain Name or Additional Service
In the event any purchased Service includes a free domain name, if you cancel (or we terminate) the Service, the full list price for the domain name will be deducted from any amount otherwise refunded. If no amount is refundable control over the domain name will be provided to you upon our receipt of the full list price for the domain name registration covering the period for which it was registered to you. The list price is not subject to any promotion or discount. As of your cancellation (or termination) of the paid-for Service, your access to any additional Service that had been offered without charge will cease to become free and you must pay the normal subscription price for them to continue. Payment is for such formerly free Services will be due within five (5) days of our notice to you (by email or otherwise) and failure to timely pay will result in termination thereof.
Configuration or Expert Services
If we have already begun to provide you with any these Services then no part of the fee is refundable. If we have not yet begun services, refunds are provided if termination is received within 30 days of the Transaction Date.
Products/Services Not Eligible for Refunds
No refunds are available for Products/Services if such is provided via a third party (whether by license or otherwise) and a refund is not otherwise available to us from the third party.
The suspension, reduction of capacity or termination of any product or Service by us in accordance with this Agreement will not be subject to refund and all payments shall remain due and payable, including amounts related to the period of any suspension or capacity reduction.
End Refund Policy
Last updated: April 9th, 2020
Table of Contents
2.1- ACCEPTABLE USE OF INFORMATION SYSTEMS
2.2- CLEAN DESK
2.3 – FIREWALLS SECURITY
2.4 – INTERNET
2.5 – PASSWORDS
2.6 – SERVER SECURITY
2.7 – SERVER VIRTUALIZATION
2.8 – Website Policy
Information Technology (IT) is an integral and critical component of daily business. This policy seeks to ensure that IT resources efficiently serve the primary business functions, provide security for members’ electronic data, and comply with federal and other regulations.
IT resources typically include hardware (computers, servers, peripherals), software (licensed applications, operating systems), network equipment (routers, firewalls, wiring), and IT personnel.
The overriding goal of any IT security policy is to comply with all federal and other regulations and to protect the integrity of the private and confidential member and business data that resides within the business’s technology infrastructure.
Information Systems: All electronic means used to create, store, access, transmit, and use data, information, or communications in the conduct of administrative, instructional, research, or service activities.
Additionally, it is the procedures, equipment, facilities, software, and data that are designed, built, operated, and maintained to create, collect, record, process, store, retrieve, display, and transmit information.
Authorized User: An individual or automated application or process that is authorized access to the resource by the system owner, in accordance with the system owner’s procedures and rules.
Extranet: An intranet that is partially accessible to authorized persons outside of a company or organization.
Data, electronic file content, information systems, and computer systems at LINK must be managed as valuable organization resources.
Information Technology’s (IT) intentions are not to impose restrictions that are contrary to LINK’s established culture of openness, trust, and integrity. IT is committed to protecting LINK’s authorized users, customers, and the company from illegal or damaging actions by individuals either knowingly or unknowingly.
Internet/Intranet/Extranet-related systems, including, but not limited to, computer equipment, software, operating systems, storage media, network accounts providing electronic mail, WWW browsing, and File Transfer Protocol (FTP) are the property of LINK.
These systems are to be used for business purposes in serving the interests of LINK and of its clients and members during normal operations.
Effective security is a team effort involving the participation and support of every LINK employee, volunteer, and affiliate who deals with information and/or information systems.
It is the responsibility of every computer user to know these guidelines and to conduct activities accordingly.
The purpose of this policy is to outline the acceptable use of IT equipment at LINK. These rules are in place to protect the authorized user and LINK. Inappropriate use exposes LINK to risks including virus attacks, compromise of network systems and services, and legal issues.
This policy applies to the use of information, electronic and computing devices, and network resources to conduct LINK business or interacts with internal networks and business systems, whether owned or leased by LINK, the employee, or a third party.
All employees, volunteer/directors, contractors, consultants, temporaries, and other workers at LINK, including all personnel affiliated with third parties, are responsible for exercising good judgment regarding appropriate use of information, electronic devices, and network resources in accordance with LINK policies and standards, local laws, and regulations.
Ownership of Electronic Files
All electronic files created, sent, received, or stored on LINK owned, leased, or administered equipment or otherwise under the custody and control of LINK are the property of LINK.
General Use and Ownership
Access requests must be authorized and submitted from departmental supervisors for employees to gain access to computer systems. Authorized users are accountable for all activity that takes place under their username.
Authorized users should be aware that the data and files they create on the corporate systems immediately become the property of LINK. Because of the need to protect LINK’s network, there is no guarantee of privacy or confidentiality of any information stored on any network device belonging to LINK.
For security and network maintenance purposes, authorized individuals within the LINK IT Department may monitor equipment, systems, and network traffic at any time.
LINK’s IT Department reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy.
LINK’s IT Department reserves the right to remove any non-business-related software or files from any system.
Examples of non-business-related software or files include, but are not limited to; games, instant messengers, pop email, music files, image files, freeware, and shareware.
Security and Proprietary Information
All mobile and computing devices that connect to the internal network must comply with all the different parts of LINK’s security policy
System level and user level passwords must comply with the Password Policy. Authorized users must not share their LINK login ID(s), account(s), passwords, Personal Identification Numbers (PIN), Security Tokens (i.e., Smartcard), or similar information or devices used for identification and authentication purposes.
Providing access to another individual, either deliberately or through failure to secure its access, is prohibited.
Authorized users may access, use, or share LINK proprietary information only to the extent it is authorized and necessary to fulfill the users assigned job duties.
All PCs, laptops, and workstations should be secured with a password-protected screensaver with the automatic activation feature set at 10 minutes or less.
All users must lockdown their PCs, laptops, and workstations by locking (control-alt- delete) when the host will be unattended for any amount of time. Employees must log-off, or restart (but not shut down) their PC after their shift.
LINK proprietary information stored on electronic and computing devices, whether owned or leased by LINK, the employee, or a third party, remains the sole property of LINK. All proprietary information must be protected through legal or technical means.
All users are responsible for promptly reporting the theft, loss, or unauthorized disclosure of LINK proprietary information to their immediate supervisor and/or the IT Department.
All users must report any weaknesses in LINK computer security and any incidents of possible misuse or violation of this agreement to their immediate supervisor and/or the IT Department.
Users must not divulge dial-up or dial-back modem phone numbers to anyone without prior consent of the LINK IT Department.
Authorized users must use extreme caution when opening e-mail attachments received from unknown senders, which may contain viruses, e-mail bombs, or Trojan Horse codes.
Users must not intentionally access, create, store, or transmit material which LINK may deem to be offensive, indecent, or obscene.
Under no circumstances is an employee, volunteer/director, contractor, consultant, or temporary employee of LINK authorized to engage in any activity that is illegal under local, state, federal, or international law while utilizing LINK-owned resources.
System and Network Activities
The following activities are prohibited by users, with no exceptions:
o degrades the performance of information systems;
o deprives an authorized LINK user access to a LINK resource;
o obtains extra resources beyond those allocated; or
o circumvents LINK computer security measures.
Access to the Internet at home, from a LINK-owned computer, must adhere to all the same policies that apply to use from within LINK facilities. Authorized users must not allow family members or other non-authorized users to access LINK computer systems.
LINK information systems must not be used for personal benefit.
As a convenience to the LINK user community, incidental use of information systems is permitted. The following restrictions apply:
2.2 – CLEAN DESK
LINK is committed to protecting the privacy of its employees and members and shall protect the confidentiality of nonpublic information consistent with laws.
LINK has an obligation to ensure the security and confidentiality of its member records and to protect these records against unauthorized access that could result in any type of loss or inconvenience for its members.
The purpose and principle of a “clean desk” policy is to ensure that confidential data is not exposed to individuals who may pass through the area such as members, service personnel, and thieves. It encourages methodical management of one’s workspace.
Because of the risk of being compromised, confidential information should always be treated with care.
To maintain the security and privacy of employees’ and members’ personal information, LINK employees should observe the “clean desk” rule. All employees should take appropriate actions to prevent unauthorized persons from having access to member information, applications, or data. Employees are also required to make a conscientious check of their surrounding work environment to ensure that there will be no loss of confidentiality to data media or documents.
The clean desk policy applies to:
o an individual’s name
o IDs, Passports and Access door cards
o Driver’s license number or identification card number
o Account number, credit or debit card number, security code, access code,
or password that could permit access to an individual’s financial account
o Restricted data is divided into two categories:
o Personal data, that refers to any combination of information that identifies and describes an individual.
o Limited data, that refers to electronic information whose unauthorized access, modification, or loss could seriously or adversely affect LINK, its members, and non-members.
2.3 – FIREWALLS SECURITY
Firewall: Any hardware and/or software designed to examine network traffic using policy statements (ruleset) to block unauthorized access while permitting authorized communications to or from a network or electronic equipment.
Firewall configuration: The system setting affecting the operation of a firewall appliance.
Firewall ruleset: A set of policy statements or instructions used by a firewall to filter network traffic.
Host firewall: A firewall application that addresses a separate and distinct host, such as a personal computer.
Internet Protocol (IP): Primary network protocol used on the Internet.
Network firewall: A firewall appliance attached to a network for the purpose of controlling traffic flows to and from single or multiple hosts or subnet(s).
Network topology: The layout of connections (LINKs, nodes, etc.) of a computer network.
Simple Mail Transfer Protocol (SMTP): An Internet standard for electronic mail (e- mail) transmission across Internet Protocol (IP) networks.
Virtual private network (VPN): A network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with private, secure access to their organization’s network.
LINK operates network firewalls between the Internet and its private internal network to create a secure operating environment for LINK’s computer and network resources. A firewall is just one element of a layered approach to network security.
This policy governs how the firewalls will filter Internet traffic to mitigate the risks and losses associated with security threats to LINK’s network and information systems.
The firewall will (at minimum) perform the following security services:
All network firewalls, installed and implemented, must conform to the current standards as determined by LINK’s IT Department. Unauthorized or non-standard equipment is subject to immediate removal, confiscation, and/or termination of network connectivity without notice.
The approach adopted to define firewall rulesets is that all services will be denied by the firewall unless expressly permitted in this policy.
The firewalls will protect against:
A change control process is required before any firewall rules are modified. Prior to implementation, LINK network administrators are required to have the modifications approved by the Director of IT or the VP of IT.
All firewall implementations must adopt the position of “least privilege” and deny all inbound traffic by default. The ruleset should be opened incrementally to only allow permissible traffic.
Firewall rulesets and configurations require periodic review to ensure they afford the required levels of protection:
LINK must review all network firewall rulesets and configurations during the initial implementation process and periodically thereafter.
Firewall rulesets and configurations must be backed up frequently to alternate storage (not on the same device). Multiple generations must be captured and retained, to preserve the integrity of the data, should restoration be required.
Access to rulesets and configurations and backup media must be restricted to those responsible for administration and review.
The IT Department is responsible for implementing and maintaining LINK firewalls, as well as for enforcing and updating this policy. Logon access to the firewall will be restricted to a primary firewall administrator and designees as assigned. Password construction for the firewall will be consistent with the strong password creation practices outlined in the LINK Password Policy.
The specific guidance and direction for information systems security is the responsibility of IT. Accordingly, IT will manage the configuration of LINK firewalls and will be responsible for:
2.4 – INTERNET
Internet: A global system interconnecting computers and computer networks. The computers and networks are owned separately by a host of organizations, government agencies, companies, and colleges.
Intranet: A private network for communications and sharing of information that, like the Internet, is based on Transmission Control Protocol/Internet Protocol (TCP/IP), but is accessible only to authorized employees within an organization. An organization’s intranet is usually protected from external access by a firewall.
User: An individual or automated application or process that is authorized access to the resource by the system owner, in accordance with the system owner’s procedures and rules.
World Wide Web (www): A system of Internet hosts that supports documents formatted in Hypertext Markup Language (HTML) that contains links to other documents (hyperlinks) and to audio, video, and graphic images. Individuals can access the Web with special applications called browsers, such as Microsoft Internet Explorer.
Internet access and usage at LINK must be managed as valuable and mission critical resources. This policy is established to:
The purpose of this policy is to establish the rules for the use of LINK Internet for access to the Internet or the Intranet.
This policy applies equally to all individuals granted access privileges to any LINK information system or resource with the capacity to access the Internet, the Intranet, or both.
Accessing the Internet
Users are provided access to the Internet to assist them in the performance of their jobs. At any time, at the request of management, Internet access may be revoked. IT may restrict access to certain Internet sites that reduce network performance or are known or found to be compromised with and by malware. LINK will use internet filters to block high-risk content and deny access to any unwanted material or malware in support of the Acceptable Use Policy.
All software used to access the Internet must be part of the LINK standard software suite or approved by IT. Such software must incorporate all vendor provided security patches.
Users accessing the Internet through a computer connected to LINK’s network must do so through an approved Internet firewall or other security device. All software used to access the Internet shall be configured to use a proxy or other means of managing or controlling. Bypassing LINK’s network security, by accessing the Internet directly, is strictly prohibited.
Users are prohibited from using LINK Internet access for: unauthorized access to local and remote computer systems, software piracy, illegal activities, the transmission of threatening, obscene, or harassing materials, or personal solicitations.
Expectation of privacy
Users should have no expectation of privacy in anything they create, store, send, or receive using LINK’s Internet access.
Users expressly waive any right of privacy in anything they create, store, send, or receive using LINK’s Internet access.
File downloads and virus protection
Users are prohibited from downloading and installing software on their PC without proper authorization from IT. Technical controls may be utilized to limit the download and installation of software.
Downloaded software may be used only in ways that conform to its license and copyrights.
All files, downloaded from the Internet, must be scanned for viruses using LINK approved virus detection software. If a user suspects a file may be infected, he/she must notify IT immediately.
Users are prohibited from using the Internet to deliberately propagate any virus, worm, Trojan Horse, trap-door, or other malicious program.
Monitoring of computer and Internet usage
All user activity on LINK IT assets is subject to logging and review. LINK has the right to monitor and log all aspects of its systems including, but not limited to, monitoring Internet sites visited by users, monitoring chat and newsgroups, monitoring file downloads, and all communications sent and received by users.
Computer resources are not unlimited. Network bandwidth and storage capacity have finite limits, and all users connected to the network have a responsibility to conserve these resources. As such, the user must not deliberately perform acts that waste computer resources or unfairly monopolize resources to the exclusion of others. These acts include, but are not limited to, spending excessive amounts of time on the Internet, playing games, engaging in online chat groups, uploading or downloading large files, accessing streaming audio and/or video files, or otherwise creating unnecessary loads on network traffic associated with non-business-related uses of the Internet.
Personal use, beyond incidental use of the Internet, may be done only on break room PCs and only in compliance with this policy.
LINK utilizes software that makes it possible to identify and block access to Internet sites containing sexually explicit material or other material deemed inappropriate in the workplace. The display, storing, archiving, or editing of such content on any LINK PC is prohibited.
Users are prohibited from attempting to access or accessing inappropriate sites from any LINK PC. If a user accidentally connects to a site containing such material, the user must disconnect at once and report the incident immediately to IT. LINK Departments may not host their own websites or contract for the hosting of websites by a vendor without the permission of IT.
Content on all LINK hosted web sites must comply with the LINK Acceptable Use of Information Systems and Privacy Policies. No internal data will be made available to hosted Internet websites without approval of IT.
No personal or non-LINK commercial advertising may be made available via hosted LINK web sites.
All sensitive LINK material transmitted over the Internet or external network must be encrypted.
Electronic files are subject to the same records retention rules that apply to other documents and must be retained in accordance with departmental records retention schedules.
Incidental personal use of Internet access is restricted to LINK approved Users; it does not extend to family members or other acquaintances.
Incidental use must not result in direct costs to LINK.
Incidental use must not interfere with the normal performance of an employee’s work duties.
No files or documents may be sent or received that may cause legal liability for, or embarrassment to, LINK.
Storage of personal files and documents within LINK’s IT should be nominal.
All files and documents, including personal files and documents, are owned by LINK, may be subject to open records requests, and may be accessed in accordance with this policy.
An employee, whose position requires him/her to have remote access, will be reimbursed for his/her Internet expenses up to a reasonable amount. An Expense Report will need to be completed and submitted to his/her manager for approval.
2.5 – PASSWORDS
Application Administration Account: Any account that is for the administration of an application (i.e., SQL database administrator, etc.).
Password: A string of characters which serves as authentication of a person’s identity, which may be used to grant or deny access to private or shared data.
Strong Password: A strong password is a password that is not easily guessed. It is normally constructed of a sequence of characters, numbers, and special characters, depending on the capabilities of the operating system. Typically, the longer the password, the stronger it is. It should never be a name, dictionary word in any language, an acronym, a proper name, a number, or be linked to any personal information about the password owner such as a birth date, social security number, and so on.
Passwords are an important aspect of computer security. They are the front line of protection for user accounts. A poorly chosen password may result in the compromise of LINK’s entire corporate network. As such, all LINK employees or volunteers/directors (including contractors and vendors with access to LINK systems) are responsible for taking the appropriate steps, as outlined below, to select and secure their passwords.
The purpose of this policy is to establish a standard for the creation of strong passwords, the protection of those passwords, and the frequency of change.
This policy applies to all personnel or volunteers/directors who have, or are responsible for, an account (or any form of access that supports or requires a password) on any system that resides at any LINK facility, has access to the LINK network, or stores any non-public LINK information.
User Network Passwords
o Take control of the passwords and protect them
o Report the discovery to IT
o Take control of the passwords and protect them
o Report the discovery to IT
Application Development Standards
Application developers must ensure their programs follow security precautions in this policy and industry standards.
2.6 – SERVER SECURITY
File Transfer Protocol (FTP): Is a standard Internet protocol for transmitting files between computers on the Internet.
The servers at LINK provide a wide variety of services to internal and external users, and many servers also store or process sensitive information for LINK. These hardware devices are vulnerable to attacks from outside sources which require due diligence by the IT Department to secure the hardware against such attacks.
The purpose of this policy is to define standards and restrictions for the base configuration of internal server equipment owned and/or operated by or on LINK’s internal network(s) or related technology resources via any means. This can include, but is not limited to, the following:
This policy also covers any server device outsourced, co-located, or hosted at external/third-party service providers, if that equipment resides in the LINK.org domain or appears to be owned by LINK.
The overriding goal of this policy is to reduce operating risk. Adherence to the LINK Server Security Policy will:
Therefore, all server equipment that is owned and/or operated by LINK must be provisioned and operated in a manner that adheres to company defined processes for doing so.
This policy applies to all LINK company-owned, company operated, or company controlled server equipment. Addition of new servers, within LINK facilities, will be managed at the sole discretion of IT. Non-sanctioned server installations, or use of unauthorized equipment that manage networked resources on LINK property, is strictly forbidden.
LINK’s VP of IT has the overall responsibility for the confidentiality, integrity, and availability of LINK data.
Other IT staff members, under the direction of the Director of IT, are responsible for following the procedures and policies within IT.
All servers will be centrally managed by LINK’s IT Department and will utilize approved server configuration standards. Approved server configuration standards will be established and maintained by LINK’s IT Department.
All established standards and guidelines for the LINK IT environment are documented in an IT storage location.
This policy is complementary to any previously implemented policies dealing specifically with security and network access to LINK’s network.
It is the responsibility of any employee of LINK who is installing or operating server equipment to protect LINK’s technology-based resources (such as LINK data, computer systems, networks, databases, etc.) from unauthorized use and/or malicious attack that could result in the loss of member information, damage to critical applications, loss of revenue, and damage to LINK’s public image. Procedures will be followed to ensure resources are protected.
2.7 – SERVER VIRTUALIZATION
Virtualization: The creation of a virtual (rather than actual) version of something, such as an operating system, a server, a storage device, or network resources.
This policy encompasses all new and existing workloads.
The purpose of this policy is to establish server virtualization requirements that define the acquisition, use, and management of server virtualization technologies. This policy provides controls that ensure that Enterprise issues are considered, along with business objectives, when making server virtualization related decisions.
Platform Architecture policies, standards, and guidelines will be used to acquire, design, implement, and manage all server virtualization technologies.
LINK’s VP of IT has the overall responsibility for ensuring that policies are followed in order to establish contracts and the confidentiality, integrity, and availability of LINK data.
Other IT staff members, under the direction of the Director of IT, are responsible for following the procedures and policies within IT.
LINK’s legacy IT practice was to dedicate one physical server to a single workload. The result of this practice was excessive server underutilization, an ever- expanding data center footprint, and excessive data center power consumption.
Server virtualization software allows the consolidation of new and existing workloads onto high capacity x86 servers. Consolidating workloads onto high capacity x86 servers allows LINK to reduce the x86 server inventory, which in turn decreases the data center footprint and data center power consumption.
LINK will migrate all new and existing workloads from physical servers to virtual machines. Hardware will be retired at such time as planned by IT management or required by incompatibility with Operating Systems (OS) and/or workload specific software updates.
Server Virtualization Requirements:
2.8 – Websites
The internet contains over 1.7 billion websites, and every one of them is hosted by at least one web server. A web server can host hundreds of sites on one physical machine, but depending on the way it’s hosted, just one hacked website can be the downfall for all sites on the server. Security for web hosters is more important than ever as more customers depend on your cybersecurity best practices and monitoring to find ongoing attacks. Web servers usually host several business sites, which store customer data, so they are common targets for attackers.
LINK’s makes sure that security policies for websites are strictly followed by taking into consideration the below guidelines:
A- Install and Configure a Web Application Firewall
A Web Application Firewall (WAF) blocks many common attacks sent through web forms. It runs on layer 7 of the OSI model, so it works differently than a typical hardware firewall. It’s similar to a reverse proxy where all traffic must pass through the WAF before it reaches the webserver. The WAF analyzes HTTP traffic and blocks any suspicious traffic
Using a WAF, LINK can block cross-site forgeries (CSF), cross-site scripting (XSS), SQL injections, and more. For example, if an attacker sends a malformed SQL string using a website’s contact form, the WAF detects it and blocks it. A good WAF will display statistics and information about blocked attacks so that the web host can identify vulnerabilities on customer sites.
B- Use SFTP Instead of FTP
File Transfer Protocol (FTP) transfers data in cleartext, leaving customers at risk of man-in-the-middle (MitM) attacks and data eavesdropping. Instead of hosting an FTP server for customers to upload and share files, use Secure FTP (SFTP) to transfer any files over an encrypted channel.
C- Back-Up Data on Servers
Site owners make mistakes sometimes, and they then need their sites restored to a specific date. Web hosting customers rely on web hosts to have good backups and a reasonable retention policy (e.g., 30 days). Backups are a component in disaster recovery and can be used to recover data at request from customers or restore a server, should it become a target in a sophisticated attack. For example, a successful injection of ransomware on a shared hosting server could destroy data across all customer sites. Backups could be used to recover instead of experiencing a critical security incident that can’t be remediated quickly.
D- Use Whitelisting for Maintenance IPs
Web hosters know that several customer IPs will be used to access authorized areas of their account (e.g., cPanel.Learn more about cpanel security). Instead of allowing open access from any IP address, customers should be advised to whitelist IP addresses so that only approved IPs can access administration areas of their account. The same should be done for the server itself. Administrators should use whitelisting of maintenance IPs for remote access using SSH.
E- SSL/TLS Connections
Every connection to the web host should be encrypted to protect users from man-in-the-middle attacks. Users who connect to sites from public Wi-Fi open themselves to data being intercepted and stolen. By forcing an encrypted connection to the server, using a cryptographically secure cipher, user data is safe from eavesdropping and account compromise.
F- Antivirus and Antimalware Protections
When you host hundreds of sites on one server, you allow site owners to upload any file to their hosting account. These files could contain malware either purposely or unknowingly. Malware stored on the hosting server could affect other sites on the server if an administrator accidentally executes the file, or if an attacker would obtain elevated privileges on the host and will execute the file. Using antivirus for Linux server and antimalware applications, the host can detect malicious files immediately and either clean the file or block it from being uploaded.
G- Remove Unused Applications Not Used for Hosting
When the hosting application is installed on the Linux server (e.g., Apache), it’s usually configured with default settings, plugins, and possibly other third-party applications. Any additional application on the server opens risks of vulnerabilities either from errors in code or from allowing the application to run unpatched. Instead of leaving them installed on the server, it’s better to remove any application not necessary for hosting customer sites.
H- Force Password Changes
Users, especially those with high-level privileges, should change their passwords frequently. If users keep the same password indefinitely, an attacker with access to those credentials could have access to the account for years, potentially. By forcing password changes on accounts, the attack window is reduced. For example, forcing users to change their passwords every 30 days gives an attacker only 30 days maximum to compromise and use the account.
This Privacy Proxy Registration Agreement is made between (1) LINK Host Ltd, in Iraq – (“LINK”) and you (“You/Your”). By clicking on the link, You agree to all terms and conditions set out in this Agreement, including any other terms and conditions that are incorporated by reference. This Agreement is effective on the date that you electronically accept it (“the Effective Date”).
1 In this Agreement, the following definitions apply: “Agreement” means this Privacy Proxy Registration Agreement;
“AUP” means LINK’s Acceptable Use Policy for lawful use of the Services“Domain Name” means an individual domain name subject to this Agreement;
“Effective Date” means the date Your order for the Privacy Service or Proxy Service was completed; “ICANN” means the Internet Corporation for Assigned Names and Numbers;
“Privacy Service” means a service by which the Domain Name is registered to You as the registered name holder, but for which alternative, reliable contact information is provided by LINK and/or Your Reseller for display of Your contact information in the WHOIS or equivalent;
“Proxy Service” means a service through which LINK license’s use of the Domain Name to You and LINK’s contact information is displayed in the WHOIS or equivalent services rather than Your contact information;
“Registry” means the operator of the TLD where the Domain Name is registered; “Reseller” means the person or organization from whom You have purchased the Services; “Services” means the Privacy Service and/or Proxy Services as ordered by You;
“Term” means the duration of this Agreement in respect of each Domain Name that is expressed to be subject to its terms as set out in clause 7;
“WHOIS” means the authoritative public database of registered domain names;
2.1 You have received this Agreement as You have selected to apply either a Privacy Service or Proxy Service to the Domain Name as part of Your order with Your Reseller. Accordingly, the terms of this Agreement shall apply from the Effective Date. In the event of any inconsistency between this Agreement and the terms and conditions of Your Reseller, this Agreement shall prevail. Please note that if You do not accept this Agreement by clicking on the appropriate acceptance link within 15 (fifteen) days of receipt, this Agreement shall automatically terminate and Your Domain Name shall revert to Your registration details.
2.2 In respect of the Privacy Service, You shall at all times be listed as the registered name holder of the Domain
Name but LINK shall keep all Your contact details confidential for the Term, subject always to the terms of this
Agreement. LINK shall not therefore disclose Your postal address, telephone, fax or email address in the WHOIS
and shall replace such details with those of the Privacy Proxy Supplier. The contact details for the administrative, technical and billing contacts shall be provided by the Privacy Proxy Supplier unless Your Reseller requests other contact details to be used for the Domain Name.
2.3 In respect of the Proxy Services, the Privacy Proxy Supplier shall be listed as the registered name holder of the Domain Name but LINK shall keep all Your contact details confidential for the Term, subject always to the terms of this Agreement. LINK shall not therefore disclose Your name, postal address, telephone, fax or email address in the WHOIS and shall replace such details with those of the Privacy Proxy Supplier. The contact details for the administrative, technical and billing contacts shall also be provided by the Privacy Proxy Supplier.
2.4 When selecting Proxy Services, You shall not have any ability to change any of the registered WHOIS details when using the Proxy Services, including administrative, billing or technical contacts until this Agreement expires or is terminated.
RIGHTS ASSOCIATED WITH THE DOMAIN NAMES
2.5 Although the WHOIS will show the Privacy Proxy Supplier’s details (dependent upon the Service ordered), You shall retain the full benefits of the registration and use of the Domain Name, including but not limited to, the right to sell, transfer, control, update, change nameservers, cancel, delete and renew the Domain Name.
2.6 You expressly acknowledge and accept that the Domain Name is subject to the rules and regulations of ICANN and the Registry for the Domain Name, including all obligations required of registered name holders and any dispute policy adopted by the Registry including the Uniform Dispute Resolution Policy and Uniform Rapid Suspension. Full details of the rules and regulations that apply to the Domain Name are set out at LINK.com/ policies under the applicable Registry heading and are available on the applicable Registry website.
2.7 You expressly acknowledge and accept that You are not entitled to use the Domain Name for any illegal activity or purpose including but not limited to gambling, gaming, obscenity and/or for making political statements and that you shall comply with LINK AUP.
2.8 In providing the Services, LINK is obliged to deliver to ICANN, via an escrow agent, Your name and full contact details as the user of the Services in respect of each Domain Name. ICANN will however only be able to access this information in cases where LINK’s agreement with ICANN is terminated or LINK ceases business.
3 EMAIL AND MAIL FORWARDING
3.1 LINK shall generate a unique email address per Domain Name per contact (registrant, administrative, technical and billing) for management and forwarding purposes. All email communications to such unique email addresses shall be automatically forwarded to the contact emails provided by You. All emails forwarded using the Services shall not be capable of direct reply.
3.2 In respect of postal mail, LINK shall open any correspondence solely to check the domain which is related to the correspondence. All postal mail will thereafter be forwarded to You.
3.3 Save as to identify the communication to the relevant Domain Name, LINK does not offer any service to review, access, assess or analyse such communications. You hereby waive all and any right to make any claim against LINK and/or the Privacy Proxy Supplier arising from a failure to receive any email and/or postal mail directed to
any email or postal address associated with the Domain Name irrespective of the reason for such failure.
3.4 LINK shall have a dedicated telephone line to deal with telephone inquiries relating to any Domain Name subject to the Services. Apart from forwarding information obtained from the telephone call to You, LINK shall have no other obligation in respect of acting upon or providing You with any other information.
4 PROXY LICENCE
4.1 In providing the Proxy Services, the Privacy Proxy Supplier is considered to be the legal and beneficial owner of all the rights in the Domain Name for the duration of the Proxy Services in respect of that Domain Name. During the Term, LINK grants You and will procure the equivalent grant from the Privacy Proxy Supplier, an exclusive worldwide, irrevocable, royalty free (save in respect of fees payable to Your Reseller) license to use the Domain Name for any lawful purpose whatsoever.
4.2 On expiry or termination of the Proxy Services in respect of the Domain Name, LINK shall immediately transfer the legal ownership of the Domain Name to You. You shall immediately become the legal and beneficial owner of the Domain Name and be listed as the registered name holder in the WHOIS.
4.3 LINK shall renew the Domain Name according to instructions from Your Reseller and shall, unless otherwise directed, retain the Privacy Service or Proxy Service and consequent contact settings for the Domain Name. LINK does not collect any payments from You in the registration of the Domain Name, the provision of the Service or any renewal fees. You shall pay all fees associated with the Services to Your Reseller pursuant to their terms and conditions with You.
5 YOUR OBLIGATIONS
5.1 At the time of placing the order with Your Reseller, You shall be required to provide your name, email and postal addresses, telephone and fax numbers associated with the Domain Name, together with the same information in respect of the technical, administrative and billing contacts for the Domain Name. You shall be required to provide any updates to these according to Your Reseller’s standard terms and conditions. You warrant, represent and undertake to LINK that (i) all information provided by You relating to the Domain Name is true, accurate and complete (ii) Your use of the Domain Name shall be in good faith (iii) Your Use of the Domain Name shall not infringe the legal rights, including intellectual property rights of any third party (iv) your use of the Domain Name shall not be in breach of LINK’s AUP and (v) You shall not use the Domain Name for any fraudulent purpose or activity that could in any way be considered as constituting a criminal offence.
5.2 You acknowledge and accept that LINK undertakes no responsibility, and makes no representation or warranty, towards You in relation to its rights as registered name holder of the Domain Name, right of use, or any other right to or in the Domain Names. LINK’s sole warranties are (i) LINK has granted You such user rights as set out in this Agreement and (ii) LINK has not granted any other use rights to any other person or entity and shall not do so for the Term.
6 LINK’s OBLIGATIONS
6.1 LINK’s only obligation in respect of the Domain Name is to provide the Services. LINK assumes no liability for any loss, cost or other expense that you may incur in connection with registration, administration, protection and/or maintenance of the Domain Name and makes no representation or warranties to You in respect of the same. LINK has no obligation, nor right, to pursue legal actions against infringement activities by third parties against the Domain Name.
7 Term and Termination
7.1 This Agreement shall commence on the Effective Date and shall last for an initial period of 1 (one) year. It shall thereafter continue indefinitely until terminated.
7.2 You shall be permitted at any time to terminate this Agreement with immediate effect by cancelling the appropriate order with Your Reseller.
7.3 LINK shall be entitled to withdraw the Service at any time on 3 (three) months written notice to You.
7.4 LINK shall be entitled to terminate this Agreement with immediate effect:
(i) When required to do so by law when such action is required, in LINK’s reasonable discretion, to comply with any relevant legal obligation;
(ii) In order to comply with ICANN or the applicable Registry’s rules, policies or procedures;
(iii) When LINK receives any claim, whether in writing or otherwise, by a third party that the Domain Name is being used in any way that may lead to a third party commencing legal action against LINK as a result of the Services including but not limited to claims for intellectual property rights infringement, breach of any criminal law and/or fraud;
(iv) Where LINK considers that you are in breach of any provision of this Agreement through Your use of the Domain Name including LINK’s AUP;
(v) To comply with any court orders, legal judgments, subpoenas or other requests of law enforcement;
(vi) To comply with any dispute resolution policy adopted by ICANN and/or the Registry;
(vii) When LINK receives a lawful transfer request to transfer the Domain Name to another registrar;
(viii) If you fail to comply with the terms of this Agreement.
7.5 Upon termination of this Agreement for whatever reason, LINK shall immediately change the contact details for the Domain Name to You. This means that the WHOIS will revert to displaying Your name, postal address, email address, fax and telephone numbers and any other contact information provided on the order by Your Reseller. Any Service fees paid to LINK by Your Reseller shall not be refundable under any circumstances.
8.1 You hereby agree to defend, indemnify and hold harmless LINK, its directors, officers, agents and employees together with the Privacy Proxy Supplier, from and against all claims, demands, liabilities, losses, damages, costs, including reasonable legal fees, arising out of or related in any way, directly or indirectly, with this Agreement or the Services provided by LINK.
8.2 Under no circumstances shall LINK be liable for any special, incidental or consequential damages, or for interrupted communications, lost data or lost profits incurred by You as a result of, or in connection with the Domain Name registration hereunder, including but not limited to the Domain Names suspension, cancellation, deletion, interruption or transfer in accordance with this Agreement. Save in respect of any losses that may not be prohibited or excluded by applicable law, LINK’s total liability to You arising under or in connection with this Agreement shall be limited to a total of 10,000 DKK.
8.3 You acknowledge that ICANN may exclude or vary the terms relating to the provision of a Privacy Service and/or
Proxy Service at any time. Accordingly, LINK may need to vary and/or cease providing the Privacy Service and/or Proxy Service.
8.4 The validity, construction and performance of this Agreement shall be governed by and construed in accordance with the laws of Denmark. Both LINK and You irrevocably submit to the exclusive jurisdiction of the courts of Denmark over any claim, dispute or matter arising under or in connection with this Agreement save in respect of any ICANN and/or Registry dispute resolution procedure commenced in relation to the Domain Name.
LINK Backup and Recovery Policy
LINK is an IT infrastructure and Data Center solution and, in common with other ICT companies within the sector, is heavily reliant on the use of computing and network technology to support, manage and distribute the information that is a key asset for LINK. LINK’s ability to exploit and gain advantage from its information base enables it to maintain and improve its reputation and meet its strategic, business and professional goals, as well as conducting its day-to-day operations effectively. The information used by LINK is one of its major assets and, without it, the company would have difficulty providing a service to our employees and clients with whom we have relationships. The information systems (hardware and software) supporting the company’s business are varied and represent a sizeable investment that must be protected. The value of information stored should not be underestimated and, in many cases, data may not be easily reproduced.
It is vital that LINK adopt consistent policies, appropriate and cost-effective strategies and good practice to ensure that all electronic information resources on which LINK depends, and the IT infrastructure on which they reside, are protected against loss of data or corruption.
This policy will support and strengthen the implementation of LINK’s Information Systems and Information Technology Strategies.
The principles of this policy are:
The LINK IT Backup and Recovery Policy consists of this high-level overarching document and a number of supporting documents.
LINK requires that all company’s data is backed up according to the following policy:
LINK requires that the company’s systems and data are backed up in line with the following schedules:
The following schedule provides for data to be restored with at most one working days data missing.
Retention Period (days)
Application & Databases
Staff User Documents and files
We do offer complimentary backups for our customers. They are created on a daily and weekly basis. These backups are not guaranteed in any way. We highly recommend that all LINK customers create and manage their own backups. LINK does not offer redundant or mirrored backups. LINK will run courtesy backups at our discretion. Any backups that LINK runs are in addition to our Terms of Service and are not guaranteed. Customers are encouraged to run periodic backups through the provided cPanel. LINK recommends that customers store such backups off-site on their local system. Backups are kept for a maximum of 30 days. Backups older than 30 days will be overwritten with a newer backup. The customer’s responsibility is to download a backup before it is overwritten if the customer wishes to keep that copy of their data.
Note: LINK assumes no responsibility for failed backups, lost data, or data integrity. LINK is unable to create automatic backups for sites above 30 gigabytes in size. Customers may create their own copies using SSH/Shell Access. Backups may be permanently deleted if the payment fails on customer’s account and the account is expired. It is the sole responsibility of the customer to make and keep copies of their data, and LINK will not attempt to keep data (including backups) of accounts that have been expired or deleted.
Backup for LINK systems is required to protect the organization’s vital business and operational systems. System backup must be provided for all infrastructure, business and data systems to ensure that in the event of any significant disaster, such as loss of data center or system, business critical systems can be restored within a reasonable time frame.
To facilitate quick recovery of systems LINK must maintain the following types of backups:
The following table provides the backup schedule for imaging of LINK Systems. This schedule dictates the frequency for full system images based directly on hardware platforms (not virtualized).
Backup Retention Period (days)
LINK’s infrastructure and application systems are homed in a virtual environment using VMware ESXi. In order for LINK to maximize benefit from this type of deployment these systems must be replicated frequently to provide an additional level of resilience in event of a hardware failure or local disaster. The schedule below indicates frequency for replication of all virtual servers. This replication must observe backup policy by ensuring that replicas are housed in a different physical location to the original virtual server.
Backup Retention Period (days)
Core Infrastructure Systems
Replica over written on backup
Replica over written on backup
Replica over written on backup
Replica over written on backup
(*Additional backup methods must be used – System Backup [image]+ configuration).
This section of the policy document outlines the policy for recovery of data relating to LINK Backup.
The following table summarizes recovery schedules for types of backups carried out by the LINK IT department.
(Hours from request receipt)
Type of Recovery
Potential data loss
(The period of potential difference [hours] between loss of data & last backup)
(Not exceeding 5GB).
Permanent recovery to original data location.
Permanent recovery to original data location
Permanent recovery to original data location.
Initial recovery using system replica. Later Scheduled Permanent recovery to original data location.
No data loss anticipated
Initial recovery using system replica. Later Scheduled Permanent recovery to original data location.
(* Server holds databases schedules for Application databases must be applied.)
An electronic copy will be made available on the LINK website.
A record will be maintained within the IT Service Desk software in which all IT Data recovery Incidents will be recorded along with details of any action taken. All staff (from all Departments) will have a responsibility to log with the IT Service Desk any incidents that relate to recovery of Data.
The purpose of this policy is to ensure that any incidents that affect the daily operations of LINK Company are managed through an established process.
One of the benefits of Incident Management process is to restore normal service operation as quickly as possible and minimize the adverse impact on business operations, ensuring that agreed levels of service quality are maintained.
on ITIL v3 This incident management process is built based.
The document addresses the management of the total Incident Management lifecycle from identification, logging, categorization, Prioritization and initial support to resolution and closure.
This policy is intended to achieve the following objectives:
Value to Business
The value of Incident Management includes:
Incident Management Process Workflow
The process to be followed during the management of an incident is shown in Figure 1. The process includes the following steps.
Website / Portal / Email Incident Identification
Functional or Management Escalation
Investigation & Diagnosis
Resolution & Recovery
Figure (1) Incident Management Process
In this step Incidents come either from LINK customers or by automated notices, such as network monitoring software or system Monitoring utilities. The service desk then decides if the issue is truly an incident to proceed with the Incident Management process or if it is a request. Requests are categorized and handled differently than incidents through service level agreement between LINK Company and the customer.
Once identified as an incident, the Service desk team logs the incident as a ticket. The
ticket in the ticketing system should include the information below:
When the Customer initiates a Service Ticket via the Website, there is a pre-defined
selection of classifications for the incident. In the case of a phone call, email or automatic notification from a monitoring system, the Service team will assign the appropriate category for the incident. Below is a list of incident classifications:
Incident prioritization is an essential part of the incident management process as it helps you to determine how best to prioritize any issue. An incident priority is determined by its influence on the customers and its urgency on the business. An incident having high impact and high urgency should be worked before something with low impact and low urgency.
Table (1) Priority Matrix
1 – High
2 – Medium
3 – Low
A service or
An issue prevents Customer(s) from performing critical time sensitive functions
An issue prevents Customer(s) from performing some actions
Impact to Customer(s)
1 – High
2 – Medium
3 – Low
All Customers of a specific service are affected and facing
Most Customers have degraded service levels
Some Customers have
This step occurs after a Tier 1 Service Desk engineer receives an alarm, events or multiple
tickets from customers with the same Ticket classification. The Service Desk engineer will investigate the issue by gathering information such as logs, current configuration, screenshots etc.
If possible, the Service Desk engineer Tier 1 will resolve the incident and close the incident if the resolution is successful. If the Service Desk engineer Tier 1 cannot resolve the incident within the resolution time mentioned in the Service Level Agreement, he/she must begin the incident escalation process.
As soon as it becomes clear that the Service Desk engineer Tier 1 is unable to resolve the incident themself (or when target times for first-point resolution have been exceeded) the incident must be immediately escalated to Tier 2 support. If it is clear that the incident will need deeper technical knowledge, or when Tier 2 has not been able to resolve the incident within an agreed target timescale, the incident must immediately go to either Tier 3 or Management.
If the incident is critical, or all Tier engineers are unable to resolve it, the appropriate Technical manager must be notified, for informational purposes at least. Management Escalation is also used if the ‘Investigation and Diagnosis’ and ‘Resolution and Recovery’ steps are taking too long or proving too difficult. The Technical Manager can take necessary action, such as allocating additional resources or involving suppliers/vendors. Management escalation is also used when there is contention about to whom the incident should be allocated.
When a potential resolution has been identified, this should be applied and tested. The specific actions to be undertaken and the people to be involved in taking the recovery actions may vary, depending upon the nature of the fault, but could involve:
• Asking the Customer to undertake directed activities on their own desktop or remote equipment.
• Tier 2 or 3 support team being asked to implement specific recovery actions.
• A third-party supplier or Vendor being asked to resolve the fault.
• Determine planned maintenance operation and inform all customers about
the date and time, as well as resolution time needed.
• If the Disaster recovery site is working properly, the support team must migrate the service to this site.
Even when a resolution has been found, sufficient testing must be performed to ensure that recovery action is complete and that the service has been fully restored.
The Service Desk should check that the incident is fully resolved without any alarms appearing in monitoring systems and check that all Customers are satisfied and agree the incident can be closed.
Code used: R= Responsible, A= Accountable, C= Consult, I= Inform
Service Desk /Support Team
Incident Logging & Classification
Immediate Incident Resolution
Technical or Management Escalation
Critical Incident Management
(a) Any person or entity may initiate an administrative proceeding by submitting a complaint in accordance with the Policy and these Rules to any Provider approved by ICANN. (Due to capacity constraints or for other reasons, a Provider’s ability to accept complaints may be suspended at times. In that event, the Provider shall refuse the submission. The person or entity may submit the complaint to another Provider.)
(b) The complaint including any annexes shall be submitted in electronic form and shall:
(i) Request that the complaint be submitted for decision in accordance with the Policy and these Rules;
(ii) Provide the name, postal and e-mail addresses, and the telephone and telefax numbers of the Complainant and of any representative authorized to act for the Complainant in the administrative proceeding;
(iii) Specify a preferred method for communications directed to the Complainant in the administrative proceeding (including person to be contacted, medium, and address information) for each of (A) electronic-only material and (B) material including hard copy (where applicable);
(iv) Designate whether Complainant elects to have the dispute decided by a single-member or a three-member Panel and, in the event Complainant elects a three-member Panel, provide the names and contact details of three candidates to serve as one of the Panelists (these candidates may be drawn from any ICANN-approved Provider’s list of panelists);
(v) Provide the name of the Respondent (domain-name holder) and all information (including any postal and e-mail addresses and telephone and telefax numbers) known to Complainant regarding how to contact Respondent or any representative of Respondent, including contact information based on pre-complaint dealings, in sufficient detail to allow the Provider to send the complaint
(vi) Specify the domain name(s) that is/are the subject of the complaint;
(vii) Identify the Registrar(s) with whom the domain name(s) is/are registered at the time the complaint is filed;
(viii) Specify the trademark(s) or service mark(s) on which the complaint is based and, for each mark, describe the goods or services, if any, with which the mark is used (Complainant may also separately describe other goods and services with which it intends, at the time the complaint is submitted, to use the mark in the future.);
(ix) Describe, in accordance with the Policy, the grounds on which the complaint is made including, in particular,
(1) the manner in which the domain name(s) is/are identical or confusingly similar to a trademark or service mark in which the Complainant has rights; and
(2) why the Respondent (domain-name holder) should be considered as having no rights or legitimate interests in respect of the domain name(s) that is/are the subject of the complaint; and
(3) why the domain name(s) should be considered as having been registered and being used in bad faith
The description shall comply with any word or page limit set forth in the Provider’s Supplemental Rules.);
(x) Specify, in accordance with the Policy, the remedies sought;
(xi) Identify any other legal proceedings that have been commenced or terminated in connection with or relating to any of the domain name(s) that are the subject of the complaint;
(xii) State that Complainant will submit, with respect to any challenges to a decision in the administrative proceeding canceling or transferring the domain name, to the jurisdiction of the courts in at least one specified Mutual Jurisdiction;
(xiii) Conclude with the following statement followed by the signature (in any electronic format) of the Complainant or its authorized representative:
“Complainant agrees that its claims and remedies concerning the registration of the domain name, the dispute, or the dispute’s resolution shall be solely against the domain-name holder and waives all such claims and remedies against (a) the dispute-resolution provider and panelists, except in the case of deliberate wrongdoing, (b) the registrar, (c) the registry administrator, and (d) the Internet Corporation for Assigned Names and Numbers, as well as their directors, officers, employees, and agents.”
“Complainant certifies that the information contained in this Complaint is to the best of Complainant’s knowledge complete and accurate, that this Complaint is not being presented for any improper purpose, such as to harass, and that the assertions in this Complaint are warranted under these Rules and under applicable law, as it now exists or as it may be extended by a good-faith and reasonable argument.”; and
(xiv) Annex any documentary or other evidence, including a copy of the Policy applicable to the domain name(s) in dispute and any trademark or service mark registration upon which the complaint relies, together with a schedule indexing such evidence.
(c) The complaint may relate to more than one domain name, provided that the domain names are registered by the same domain-name holder.
(a) The Provider shall submit a verification request to the Registrar. The verification request will include a request to lock the domain name.
(b) Within two (2) business days of receiving the Provider’s verification request, the Registrar shall provide the information requested in the verification request and confirm that a Lock of the domain name has been applied. The Registrar shall not notify the Respondent of the proceeding until the Lock status has been applied. The Lock shall remain in place through the remaining Pendency of the UDRP proceeding. Any updates to the Respondent’s data, such as through the result of a request by a privacy or proxy provider to reveal the underlying customer data, must be made before the two (2) business day period concludes or before the Registrar verifies the information requested and confirms the Lock to the UDRP Provider, whichever occurs first. Any modification(s) of the Respondent’s data following the two (2) business day period may be addressed by the Panel in its decision.
(c) The Provider shall review the complaint for administrative compliance with the Policy and these Rules and, if in compliance, shall forward the complaint, including any annexes, electronically to the Respondent and Registrar and shall send Written Notice of the complaint (together with the explanatory cover sheet prescribed by the Provider’s Supplemental Rules) to the Respondent, within three (3) calendar days following receipt of the fees to be paid by the Complainant
(d) If the Provider finds the complaint to be administratively deficient, it shall promptly notify the Complainant and the Respondent of the nature of the deficiencies identified. The Complainant shall have five (5) calendar days within which to correct any such deficiencies, after which the administrative proceeding will be deemed withdrawn without prejudice to submission of a different complaint by Complainant.
(e) If the Provider dismisses the complaint due to an administrative deficiency, or the Complainant voluntarily withdraws its complaint, the Provider shall inform the Registrar that the proceedings have been withdrawn, and the Registrar shall release the Lock within one (1) business day of receiving the dismissal or withdrawal notice from the Provider.
(f) The date of commencement of the administrative proceeding shall be the date on which the Provider completes its responsibilities in connection with sending the complaint to the Respondent.
(g) The Provider shall immediately notify the Complainant, the Respondent, the concerned Registrar(s), and ICANN of the date of commencement of the administrative proceeding. The Provider shall inform the Respondent that any corrections to the Respondent’s contact information during the remaining Pendency of the UDRP proceedings shall be communicated to the Provider further to Rule 5(c)(ii) and 5(c)(iii).
(a) Within twenty (20) days of the date of commencement of the administrative proceeding the Respondent shall submit a response to the Provider.
(b) The Respondent may expressly request an additional four (4) calendar days in which to respond to the complaint, and the Provider shall automatically grant the extension and notify the Parties thereof. This extension does not preclude any additional extensions that may be given further to 5(d) of the Rules.
(c) The response, including any annexes, shall be submitted in electronic form and shall:
(i) Respond specifically to the statements and allegations contained in the complaint and include any and all bases for the Respondent (domain-name holder) to retain registration and use of the disputed domain name (This portion of the response shall comply with any word or page limit set forth in the Provider’s Supplemental Rules.);
(ii) Provide the name, postal and e-mail addresses, and the telephone and telefax numbers of the Respondent (domain-name holder) and of any representative authorized to act for the Respondent in the administrative proceeding;
(iii) Specify a preferred method for communications directed to the Respondent in the administrative proceeding (including person to be contacted, medium, and address information) for each of (A) electronic-only material and (B) material including hard copy (where applicable);
(iv) If Complainant has elected a single-member panel in the complaint state whether Respondent elects instead to have the dispute decided by a three-member panel;
(v) If either Complainant or Respondent elects a three-member Panel, provide the names and contact details of three candidates to serve as one of the Panelists (these candidates may be drawn from any ICANN-approved Provider’s list of panelists);
(vi) Identify any other legal proceedings that have been commenced or terminated in connection with or relating to any of the domain name(s) that are the subject of the complaint;
(vii) State that a copy of the response including any annexes has been sent or transmitted to the Complainant.
(viii) Conclude with the following statement followed by the signature (in any electronic format) of the Respondent or its authorized representative:
“Respondent certifies that the information contained in this Response is to the best of Respondent’s knowledge complete and accurate, that this Response is not being presented for any improper purpose, such as to harass, and that the assertions in this Response are warranted under these Rules and under applicable law, as it now exists or as it may be extended by a good-faith and reasonable argument.”; and
(ix) Annex any documentary or other evidence upon which the Respondent relies, together with a schedule indexing such documents.
(d) If either the Complainant or the Respondent elects to have the dispute decided by a three-member Panel, the Provider shall appoint three Panelists in accordance with the procedures.
The fees for a three-member Panel shall be paid in their entirety by the Complainant, except
where the election for a three-member Panel was made by the Respondent, in which case the
applicable fees shall be shared equally between the Parties.
(e) At the request of the Respondent, the Provider may, in exceptional cases, extend the period of time for the filing of the response. The period may also be extended by written stipulation between the Parties, provided the stipulation is approved by the Provider.
(f) Once the entire Panel is appointed, the Provider shall notify the Parties of the Panelists
appointed and the date by which, in the absence of exceptional circumstances, the Panel shall forward its decision on the complaint to the Provider.
(a) Each Provider shall maintain and publish a publicly available list of panelists and their qualifications.
(b) If neither the Complainant nor the Respondent has elected a three-member Panel, the Provider shall appoint, within five (5) calendar days following receipt of the response by the Provider, or the lapse of the time period for the submission thereof, a single Panelist from its list of panelists. The fees for a single-member Panel shall be paid entirely by the Complainant.
(c) If either the Complainant or the Respondent elects to have the dispute decided by a three-member Panel, the Provider shall appoint three Panelists in accordance with the procedures. The fees for a three-member Panel shall be paid in their entirety by the Complainant, except where the election for a three-member Panel was made by the Respondent, in which case the applicable fees shall be shared equally between the Parties.
(d) Unless it has already elected a three-member Panel, the Complainant shall submit to the Provider, within five (5) calendar days of communication of a response in which the Respondent elects a three-member Panel, the names and contact details of three candidates to serve as one of the Panelists. These candidates may be drawn from any ICANN-approved Provider’s list of panelists.
(e) In the event that either the Complainant or the Respondent elects a three-member Panel, the Provider shall endeavor to appoint one Panelist from the list of candidates provided by each of the Complainant and the Respondent. In the event the Provider is unable within five (5) calendar days to secure the appointment of a Panelist on its customary terms from either Party’s list of candidates, the Provider shall make that appointment from its list of panelists. The third Panelist shall be appointed by the Provider from a list of five candidates submitted by the Provider to the Parties, the Provider’s selection from among the five being made in a manner that reasonably balances the preferences of both Parties, as they may specify to the Provider within five (5) calendar days of the Provider’s submission of the five-candidate list to the Parties.
(f) Once the entire Panel is appointed, the Provider shall notify the Parties of the Panelists appointed and the date by which, absent exceptional circumstances, the Panel shall forward its decision on the complaint to the Provider.
This service support agreement effective as of the last date written above, is made by and between LINK, and the client whose name and address are mentioned on the first page of this contract, referred to as the second party.
Purpose and Goal of the Agreement
The purpose of this Agreement is to constitutes the entire understanding between the parties hereto in order to regulate any concern or reported issue that might occur on the service provided to the customer.
The goal of this Agreement is to obtain mutual agreement for the service provision between the Service Provider(s) and Customer(s).
The objectives of this Agreement are to:
Provide clear reference to service ownership, accountability, roles and/or responsibilities.
Present a clear, concise and measurable description of service provision to the customer.
Match perceptions of expected service provision with actual service support & delivery.
Scope of Support Service:
LINK commit to provide service and support to our customer to cover Domain Registration service:
Severity 1 (S1)
The customer’s existing service is down or there is a critical effect on their business operations.
Severity 2 (S2)
Operation of a customer’s existing service is severely degraded, or significant aspects of customer’s business operations are negatively affected
Severity 3 (S3)
Operational performance of the service is impaired, although most business operations remain functional
Severity 4 (S4)
Information is required about the service, or configuration. There is little or no effect on business operations
Level of urgency and specification
Final Resolution Time
This includes the unavailability of the service or a performance degradation of the service that affects [Customer]’s Core Business value stream.
This includes the Performance degradation of the service that does not impact the [Customer]’s Core Business Value
This is the failure of a non-critical component of the VPS or The failure of one of the passive nodes of a multiple (n+1) redundancy of the Application platform. All service incidents that affects a single user, Application Alerts or events
Service Level Agreement Workflow
Monitor SLA based on severity level
Proceed with Incident Management Policy
Is the problem fixed based on SLA resolution time
Yes / No
If No, escalation to upper support layer or Management to resolve
LINK shall not be responsible for the Customer’s web site or domain management portal not being accessible on the Internet due to the circumstances not in the direct control of LINK, such as limitations of the Internet users’ equipment, Internet Service provider outages and/or browser software limitations.
LINK Corporate Domains is committed to providing the best experience possible to our clients and anyone who interacts with them. Please let us know if a name registered here is being used in a malicious or abusive way.
Domain name registrants are required to use and manage their domain names under the terms of their registration agreement. The registration agreement and its terms of service prohibit the registration and use of the domain name for certain purposes, including for the distribution of malware, the operation of abusive botnets, phishing, or other activity contrary to applicable law. We take reports of abuse seriously. If you need to report that a domain name registered through us is being used for an abusive or malicious purpose, you may send an email to: abuse@Linkdata.co or send us postal mail at the address below.
Abuse reports should identify (A) your name and contact information, including your postal address, email address, and a telephone number at which you can be reached; (B) the domain name that is the cause of, or associated with, your report; (C) the nature of the harm caused, with sufficient detail for us to investigate your report; and (D) whether the harm is current and ongoing. Abuse reports that contain each of these elements will be given priority.
Reports from law enforcement, consumer protection agencies, or quasi-governmental or other similar authorities should identify the name of the relevant agency and the jurisdiction in which it operates. We respond to all reports from law enforcement or related agencies within twenty-four (24) hours.
All abuse reports are ticketed and sent to our abuse and compliance team for investigation and handling. In some instances we may need to contact our customer for a response or additional information. Our investigations are confidential and you will receive additional communications from us only if we need more information to understand or evaluate your report.
E-mail for communication:
Phone number for communication:
+964 (750) 819333
Address for postal communication:
Link, Silver Star Holdings Corp.
“SSHC, 100 M, Peshawa Qazi,