RULES FOR THE USE OF SERVICES

Approved on April 01, 2025..

These Rules for the Use of Services (“Rules”) are an integral part of the User Agreement (“Agreement,” “Offer”). The Rules describe the actions (or inaction) of the Customer that may cause harm to the Provider, its representatives, equipment, clients, and other third parties.
The Customer shall not use the Provider’s Services and equipment to cause harm to the Provider, its clients, or third parties, nor to violate applicable laws or facilitate such violations.

1. Such actions (or inaction) by the Customer may include, but are not limited to:

1.1. Actions by the Customer that violate applicable laws, contradict the orders of executive authorities, and local acts applicable to the Parties;
1.2. Actions by the Customer aimed at disrupting the normal operation of elements of the local network or the Internet (computers, other equipment, or software) not belonging to the Customer;
1.3. Violation by the Customer of occupational safety and fire safety rules, as well as other rules and local regulations of the Provider;
1.4. Failure by the Customer to comply with an order from an authorized body;
1.5. Actions (or inaction) by the Customer that result in losses for the Provider or third parties;
1.6. Disruption of the normal operation of Internet elements (computers, other equipment, or software) not belonging to the Customer;
1.7. Use of equipment located in Data Centers by the Customer in violation of technical operation rules, and/or use of equipment that does not have the required licenses and certificates;
1.8. Storing, publishing, transmitting, reproducing, distributing in any way, or using in any form software or other protected intellectual property and means of individualization without the permission of the rights holder;
1.9. Failure by the Customer to provide a response to the Provider regarding a complaint received from a third party about the violation of their intellectual property rights within 14 (fourteen) calendar days from the moment the Customer receives such a complaint. The Customer’s response must contain explanations regarding the claims made in the third party’s complaint; otherwise, the Customer’s response is considered not to have been provided to the Provider;
1.10. Storing, publishing, transmitting, reproducing, distributing in any way, or using in any form software or other materials containing viruses or other malicious components;
1.11. Performing actions that directly or indirectly involve or facilitate the mass mailing of emails and other messages of any nature (upon detection of such actions, the provision of the service to the Customer is automatically restricted);
1.12. Distributing, publishing, or otherwise processing information that contradicts the requirements of the current legislation of the Russian Federation or violates the rights of third parties;
1.13. Advertising services, goods, or other materials whose distribution is restricted or prohibited by current legislation;
1.14. Falsifying technical details issued by the Provider when transmitting data to the Internet;
1.15. Using non-existent return addresses when sending emails and other messages;
1.16. Performing actions aimed at gaining unauthorized access to equipment or an information resource not belonging to the Customer, the subsequent use of such access, as well as the destruction or modification of software or data not belonging to the Customer, without the consent of the owners of that software or data or the administrators of that information resource. Unauthorized access is understood as any access method other than that intended by the resource owner;
1.17. Transmitting meaningless or useless information to third-party computers or equipment, creating an excessive (parasitic) load on these computers or equipment, as well as on intermediate network segments, in volumes exceeding the minimum necessary to check network connectivity and the availability of its individual elements;
1.18. Scanning network nodes to identify the internal structure of networks, security vulnerabilities, lists of open ports, etc., without the explicit consent of the owner of the resource being checked;
1.19. Violating information security requirements that create a threat to the functioning of other (not belonging to the Customer) resources of the local or global computer network;
1.20. Using default passwords in software;
1.21. Using outdated and/or vulnerable mail server software;
1.22. Sending emails on behalf of addresses not belonging to the Customer’s network (domain).

2. The Customer shall not use the Services in any situation where the provision of the Services could pose a threat to state security and defense, the health and safety of people, or where any failure of the Service could cause serious harm to human health or the environment.

3.1. It is impossible to identify the Customer, including if there is a suspicion of providing incorrect data;
3.2. The data provided by the Customer is absent in the Unified State Register of Legal Entities;
3.3. Failure to provide additional information or confirm the information specified during registration in the Control Panel upon the Provider’s request within 10 (ten) calendar days from the date of the first request.

4. The Customer may not use the Services in case of violation of the terms and conditions of payment for the Services, or in case of insufficient funds to renew the Service, including:
4.1. Unjustified chargebacks of payments made by the Customer;
4.2. The Provider receiving transaction claims from payment systems or payment instrument holders.

5. The Customer does not have the right to use the Services if they do not promptly eliminate vulnerabilities discovered during a security requirements check.

6. The Customer shall not use the Services if they receive a corresponding order containing a requirement to cease using the Services from a state authority that regulates these relations and has the relevant powers in accordance with the legislation of the Russian Federation.

7. When ordering Services in regions other than the Russian Federation, the Customer is obliged to comply with both the legislation of the Russian Federation (including not to place personal data of citizens of the Russian Federation using databases located outside the territory of the Russian Federation) and the legislation of the region where the Customer has chosen the Service. The Customer accepts the fact that information located on facilities in other regions may be unavailable to users in the territory of the Russian Federation in accordance with the legislation of the Russian Federation.

8. If the Customer violates the Rules (including through negligence) or if, in the reasonable opinion of the Provider (including confirmed by the Provider’s security system), the Customer’s use of the Services could lead to a violation of the law, cause damage to the Provider and/or third parties, or cause a failure of the technical and software means of the Provider and third parties, the Provider has the right, for protection purposes, to:

  • suspend and/or restrict the provision of Services to the Customer (including by implementing automatic traffic filtering);
  • block access to the Control Panel;
  • reject the Customer’s application for a new Service;
  • reject the Customer’s application for the renewal of a Service.

If the Customer violates clause 3 of the Rules, the Provider also has the right to temporarily restrict the use of funds on the Customer’s Balance and/or on the service’s Balance. In the event of a repeated violation, or if the Customer fails to eliminate the violations within the period established by the Provider during the suspension of the Services, the Provider has the right to terminate the Agreement unilaterally without recourse to the courts.
9. The Provider’s actions may be reversed following negotiations between the Provider and the Customer and the elimination by the Customer of the circumstances that caused the Provider’s actions. To reverse the actions specified in clause 8, the Provider may request additional information and verification of the Customer’s identity, including by having the Customer send a photograph of themselves with their passport.