Acceptable Use Policy

Prestigious Hosting provides hosting services to clients worldwide, and we have a responsibility to protect each client and to provide the best services available. All registered clients of Prestigious Hosting ( agree to and are subject to our Terms of ServicePrivacy Policy and the following Acceptable Use Policy:

All services provided by Prestigious Hosting may be used for lawful purposes only. Transmission, storage, or presentation of any information, data or material in violation of any United States Federal, State or City law is prohibited. Services provided by Prestigious Hosting that reside outside of the United States must still abide these terms and must not be in violation of any relevant laws of hosting city, state and country. This includes, but is not limited to: copyrighted material, material we judge to be threatening or obscene, or material protected by trade secret and other statute. The subscriber agrees to indemnify and hold harmless Prestigious Hosting and its employees from any claims resulting from the use of the service which damages the subscriber or any other party.

The provisions of this AUP are intended as guidelines and are not meant to be exhaustive. Generally, conduct that violates law, regulation, or the accepted norms of the Internet community, whether or not expressly mentioned in this AUP, are prohibited. We reserve the right at all times to prohibit activities that damage our or our affiliates’ commercial reputation and goodwill. We will be the sole and final arbiter as to what constitutes a violation of our policies.



All users must comply with all relevant legislation and regulations on bulk and commercial e-mail, including but not limited to the CAN-SPAM Act of 2003.

Users may not send mass unsolicited e-mail, which is email that is sent to recipients who have not “opted-in” to mailings from the user. Users who send mass mailings must maintain complete and accurate records of all consents and opt-ins and provide such records to Prestigious Hosting upon its request. If a user cannot provide positive and verifiable proof of such consents and opt-ins, we will consider the mass mailing to be unsolicited. Users are prohibited from operating mailing lists, list services, or mailing services that do not target an audience that has voluntarily signed up for e-mail information using an “opt-in” process or that has made their e-mail addresses available to a user for distribution of information. Users who operate mailing lists must maintain complete and accurate records of all consents and “opt-in” elections and provide such records to Prestigious Hosting upon its request. If a user cannot provide positive and verifiable proof of such consents and “opt-in” elections, we will consider the list mailing to be unsolicited. Any user-maintained mailing list must also allow any party on the list to remove itself automatically and permanently. Other prohibited activities include, without limitation, the following:

    • Use of our network for the receipt of replies to unsolicited mass e-mail.
    • Forgery of e-mail headers (spoofing);
    • Spamming via third-party proxy, aggregation of proxy lists, or installation of proxy mailing software.
    • Configuration of a mail server to accept and process third-party messages for sending without user identification and authentication.
    • Hosting web pages advertised within “spam e-mail” sent from another network (spamvertising).
    • Hosting web pages or providing services that support spam.
    • Any other unsolicited bulk messages, postings, or transmissions through media such as weblog posts, IRC/chat room messages, guestbook entries, HTTP referrer log entries, usenet posts, pop-up messages, instant messages, or SMS messages.
    • Instructing others in any activity prohibited by this AUP.


If, as a result of your actions, our domains and/or IP address ranges are placed on black hole lists or other mail filtering software systems, your server may be suspended and possibly terminated upon further investigation.


Prohibited Uses

The following uses are prohibited on our network. Engaging in these activities on our services will result in an account and/or service suspension without notice.

  • Copyrighted content hosting and/or linking to pirated content
  • Open proxies
  • Stressers/booter websites
  • Mail/SMS bombers
  • Mass mail
  • Resource intensive activities (CPU, I/O, Network etc)
  • IP spoofing
  • Network/port Scanning
  • Distribution of credentials and/or personal information
  • Denial of Service (DoS) attacks
  • TOR exit nodes
  • Open DNS resolvers
  • Hola
  • Kloxo
  • Virtual currency (*coin) mining
  • World Community Grid, Folding at Home, or similar software
  • CrystalMines
  • HitLeap or any artificial traffic creation
  • HYIP websites
  • iBusinessPromoter or similar software
  • Vulnerability scanning
  • Bruteforcing
  • Social media crawlers
  • Cracking
  • Botnets
  • Illegal pornography
  • Hivemail
  • Telnet or SSH access scripts
  • Usenet
  • Destructive activities including but not limited to phishing, malware and/or distributing malicious content
  • Illegal activities including but not limited to ponzi schemes, pyramid schemes, phishing, scam websites and pirating software
  • Video streaming
  • Content delivery networks (CDN)
  • Multics, CCcam, or any other card sharing software
  • Chinese private game servers and related websites
  • Any form of file hosting, file storage, cyberlocker, leeching or similar activity is prohibited
  • Any activity, website, service, business or product defined as being prohibited by our payment processor(s) such as 2Checkout is not allowed. Click here for 2Checkout’s prohibited list.


Some network ports may be blocked on our network, this is to ensure our services are not used maliciously. Any port(s) may be added or removed to the list of blocks without prior notice. Please check our KB or create a support ticket if you require more information.

DDoS Attacks

Clients who are targeted with frequent and/or disruptive attacks may have action taken against them. If your service(s) are found to be impacting the experience of other clients, you will be notified via ticket and requested to prevent further damages from occurring or relocate to another provider.

Fair Usage

Unlimited & unmetered claims have software and hardware limitations, and are subject to a discrete fair use policy by our team. If you are using more of any resource than is considered realistic or reasonable for the platform then you will be notified via a support ticket to reduce your usage.


Web Hosting


Account Resources

All accounts are protected by CloudLinux virtualization. The resources allocated to our clients through packages are not dedicated to the account, and no right to use the entirety of any resource is given. These are in place to lessen attack disruption and/or abusive behavior from affecting other customers on the same node. If you are persistently reaching these limits, we may request that you upgrade your plan if applicable or move to a more powerful environment such as a VPS and dedicated server. We retain the right to change these limits without notice and to suspend services that are persistently reaching their maximum limits.

All cPanel accounts on our Shared & Reseller plans have a soft limit of 230,000 inodes and a hard limit of 250,000 inodes. When these are reached, this will result in you being denied access to write anymore files to disk. In computing, an inode is a data structure on a traditional Unix-style file system such as UFS. An inode stores basic information about a regular file, directory, or other file system object. (One inode is equal to 1 file, such as an image)

Outgoing mail on our cPanel host nodes are limited to 500 emails per hour on each account, this includes mailman lists and PHP mail. We retain the right to alter this limit without notice.

SSH access granted by Prestigious Hosting is jailed to prevent unauthorized access and damages to the host node. If you are found to be installing or running processes that are not meant for the platform, those processes will be killed and your SSH access will be removed. Severe and persistent violation may result in an account suspension.

Backup Policy

All cPanel host nodes run daily backups of accounts, the maximum retain period is 15 days. This process happens during off-peak hours and may cause a decrease in server performance during this time. We are not responsible for any performance decrease during the process, nor is it included within our uptime guarantee. We provide these backups as an emergency fail-safe and cannot guarantee their availability to clients.