Acceptable use policy

Use of this site is subject to this Acceptable Use Policy (AUP).
This AUP is governed by the Agreement between you (Customer) and Ghoz-Software sprl.
Customers who violate these rules may have their services suspended without notice. The resulting fees will not usually be refunded.

Illegal or malicious use

You may not use our services to store, display, distribute or process any illegal or harmful content.
This includes:

  • Illegal activities: promotion of gaming sites or services or child pornography.

  • Harmful or fraudulent activities: harmful activities to others, promotion of fraudulent products, services, systems or promotions (eg, Quick Payment Systems, ponzi and pyramid schemes, phishing or pharming), or other deceptive practices.

  • Infringing Content: Content that infringes the intellectual property of others.

  • Offensive content: Defamatory, obscene, abusive, invasive or otherwise objectionable content, including content that constitutes child pornography, is related to bestiality or represents non-consensual sexual acts.

  • Harmful content: malicious content, such as viruses, Trojans, worms, etc..

Usurpation of email address


You can not use our services for spam.This includes:

  • Unsolicited messages: send or facilitate the distribution of unsolicited emails and messages, either directly or indirectly through third-party messaging services. This includes the use of bulk e-mail lists. Any direct mail activity is subject to applicable legal restrictions, and you must be able to show proof of consent / acceptance of your mass mailing lists..

  • Identity theft: sending e-mails or messages with falsified or obscured headers or accepting an identity without the sender's permission

Security breaches

You may not attempt to compromise our services, access or modify content that does not belong to you, or engage in malicious actions:

  • Unauthorized access: access or use any system or service without our permission

  • Security search : conduct any security research or audit on our systems without written authorization, including scanners and automated tools.

  • Eavesdropping: listen to or record data that does not belong to you without permission

  • Other attacks: non-technical attacks such as social engineering, phishing or physical attacks against anyone or any system

Abuse of network and services

You can not abuse resources and our systems.
In particular, the following activities are prohibited:

  • Abuse of network: cause a denial of service (DoS) by flooding systems with network traffic that slows down the system makes it inaccessible or significantly affects the quality of service

  • Overload : voluntary impact on the performance or availability of systems with abnormal content, such as very large amounts of data, or a very large number of items to be processed, such as email bombs

  • Crawling: Automatically scan resources in a way that affects system availability and performance

  • Attack: use our services to attack, explore or otherwise affect the availability or security of third-party systems

  • Abusive registrations : use of automated tools to register or repeatedly subscribe to our services or register or subscribe with false identification information, or under the name of another person without their authorization