Welcome to
Aurora Online Inc.
...Your Virtual IT Partner
Call Now
905-222-2022
Unacceptable Use/Illegal Activity
Hacking, which includes, for example penetrating or attempting to access, without authorization, another computer or network. Port scans, stealth scans, and fraudulent credit card “phishing” techniques are also prohibited. Hosting of files or other data that infringes on another’s copyright or other intellectual property rights. Spamming, or the sending of bulk, unsolicited email. We maintain a strict policy on spamming, which includes the sending of unauthorized commercial messages by use of our services, or by maintaining an open SMTP connection. We reserve the right to refuse or terminate service based on reasonable indications that you are engaged in spamming of any sort. Uploading or linking to any content that violates another’s right of publicity or privacy. Distributing hate speech, or any other content that is obscene, abusing, which could be considered libelous and defamatory. Hosting, storing, or distributing Pornography and Casino related material. Hosting large amounts of data not specifically tied (“linked”) to your hosting account - i.e. you cannot use our web hosting services as a data backup storage service. If you need file storage/backup solutions contact us and we can set that up for you at our Canadian data centre specifically designed for that purpose.
Content
All services provided by us may only be used for lawful purposes. You, the customer, agrees to indemnify and hold harmless Aurora Online Inc. from any claims resulting from the use of our services. Use of our services to infringe upon any copyright or trademark is prohibited. This includes, but is not limited to unauthorized copying of music, books, photographs, or any other copyrighted work. The offer of sale of any counterfeit merchandise of a trademark holder will result in the immediate termination of your account. Our services, including all related equipment, networks and network devices are provided only for authorized customer use. Our systems may be monitored for all lawful purposes, including ensuring that use is authorized, for management of the system, to facilitate protection against unauthorized access, and to verify security procedures, survivability and operational security. During monitoring, information may be examined, recorded, copied and used for authorized purposes. Use of our system(s) constitutes consent to monitoring for these purposes.