Regulation
General terms and conditions of use of our services
Regulation

Conditions of use for hosting services

Regulation of services

1. Scope of Hosting Services

Hosting Services are intended for the publication on the Internet of static and/or dynamic websites.
For such services, the General Terms of Service shall apply, in addition to the specific provisions set out below.

The features of the Hosting Services may be updated in accordance with the provisions set out in the section Changes to Service Features.

2. Content and Regulatory Compliance

The publication, storage or transmission of content that violates applicable laws or third-party rights is prohibited. By way of example and not limitation, it is prohibited to publish:

  • material protected by intellectual property rights without the necessary authorizations;
  • information covered by professional secrecy or otherwise disclosed in breach of confidentiality obligations;
  • data processed in violation of data protection laws and regulations.

3. Use of Resources and External Connections

It is prohibited to use Hosting Services to:

  • make resources (scripts, audio files, video files, archives or other content) available to external websites or servers in a manner that generates abnormal or non-compliant use of allocated resources;
  • access or connect to resources on external servers using protocols other than HTTP/HTTPS, including – by way of example – external database servers or SMTP servers;
  • use HTTP/HTTPS connections to external servers in an improper or abusive manner (for example, web-crawling activities or massive automated queries).

Hosting Solutions reserves the right to limit or block external connections that pose security risks or result in non-compliant use of the Service.

4. Email Sending and Forms

It is prohibited to:

  • send bulk email from Hosting plans, unless a dedicated SMTP service has been subscribed to and used in compliance with its applicable terms of use;
  • use SMTP servers external to Hosting Solutions systems;
  • send email messages with non-existent senders or invalid email addresses.

With regard to the use of email services, the specific provisions set out in the section of the regulations dedicated to email services shall also apply and remain fully applicable.

5. Use of Dynamic Components, Scripts and Executables

Hosting plans may allow the use of dynamic components and executable programs (such as, by way of example, CGI, ASP, Perl, PHP or similar technologies).
As such components require more resources than static content, their use is permitted exclusively in compliance with the following conditions.

5.1. Use of Resources

Scripts and executable programs must use system resources (CPU, memory, processes, I/O) in a manner consistent with the shared nature of the Service.
The execution of applications that result in excessive or abnormal resource usage may lead to:

  • limitation or suspension of the Service;
  • the application of additional charges;
  • a request to migrate to dedicated solutions or infrastructures with reserved resources.

Applications requiring high system resources are not compatible with shared Hosting plans.

5.2. System Integrity

Scripts must not:

  • alter or interfere with the configuration of the operating system, web server or hosting environment;
  • modify system parameters (such as timeouts, memory limits, processes or other default settings);
  • compromise the stability or security of the infrastructure.
5.3. Script Security

The Client is responsible for the security, proper functioning and updating of installed scripts and applications.
Scripts must not contain vulnerabilities exploitable from outside or be configured in a way that allows improper use. The Client shall remain responsible even where abuse is carried out by third parties.

5.4. Invocation from External Systems

Scripts may not be invoked or used by external servers or through automated procedures without the prior written authorization of Hosting Solutions. This prohibition includes, by way of example, server-side scripts accessible in automated form and services exposed for the benefit of other websites or external infrastructures.

5.5. Forms and Automatic Email Generation

Forms or modules on websites that generate email messages must be configured to prevent automated or abusive use (for example, by implementing verification systems such as CAPTCHA or equivalent tools).

The generated messages:

  • must indicate as sender an existing email address configured on the website’s domain;
  • must be sent only after proper configuration of the MX record for the relevant domain.
5.6. Service Interruptions and Corrective Measures

Any script or component that causes service interruptions, performance degradation or compromises the security of the infrastructure may be disabled without prior notice.
Service reactivation may occur subject to the necessary technical checks and in accordance with the procedures, timing and any costs determined by Hosting Solutions.

The use of scripts intended to attack, compromise or test system security without authorization shall result in the immediate termination of the Service and may lead to appropriate legal action.

Hosting Solutions reserves the right to assess, at its sole technical discretion, whether a script or application is harmful or non-compliant.

6. Prohibited Activities on Hosting

It is prohibited to use Hosting Services for:

  • cryptocurrency mining activities;
  • continuous background data processing not related to the normal publication of websites;
  • providing services such as counter servers, banner servers or CGI applications intended for a high number of users;
  • any other activity that results in abnormal or excessive use of allocated resources, unless prior written authorization has been granted by Hosting Solutions.

7. Software Updates and Security

Where CMS platforms (e.g., WordPress, Joomla or similar) are used, the Client must keep software, plugins, themes and extensions constantly updated with available security updates.

The use of obsolete or unsupported software that may compromise the security of the Infrastructure or third parties may result in suspension of the Service until the issue is resolved.

Forms or modules on websites that generate email messages must be configured to prevent automated or abusive use (for example, through CAPTCHA or equivalent systems) and must use, as sender, an existing email address configured on the website’s domain, with proper configuration of the MX record for the relevant domain.

8. Data and Responsibility

The Client may store within the Hosting space data such as texts, images, databases and other content owned by or lawfully used by the Client.

Hosting Solutions does not carry out prior monitoring of uploaded content and assumes no responsibility in relation thereto.

The Hosting Service is intended for publication on the Internet; therefore, content made accessible online is, by its nature, potentially accessible to the public. Even where appropriate security measures are adopted, data published on the Internet may be exposed to risks inherent to the network.

It is prohibited to use Hosting space to store or process special categories of personal data or data processed in violation of data protection laws or intellectual property rights.

9. Service Suspension

In the event of a breach of these provisions, Hosting Solutions reserves the right to suspend or terminate the Service, even without prior notice, without prejudice to its right to claim compensation for any damages.