Fair Use Policy
This document sets forth the technical limitations applicable to the primary and additional services offered by Trafico (hereinafter “Trafico”) to the purchaser of services (hereinafter “Customer”), who agrees to these limitations upon contracting such services.
For the Customer’s reference, please note the existence of General Terms and Conditions that broadly govern the relationship between Trafico and the Customer, as well as the specific Terms and Conditions applicable to each main service. All relevant documents are available on Trafico’s official website.
Definitions and general information about Trafico are provided in the General Terms and Conditions.
1. Glossary Extension, Technical Terms
1.1 Server Resources. Those technical limitations defined by each product or service, which will be published on the specific page offering the service.
1.2 Cron/Cron Job. It is a utility that allows you to execute commands or sequences of commands within the server based on a time condition, they can be very useful to automate repetitive tasks.
1.3 Backup/Backup. It is a copy of the original data that is made in order to have a means to recover them in case of loss.
1.4 Database. Organized collection of information or structured data, which is stored digitally in a system.
1.5 Storage (SSD). It refers to the total storage capacity in SSD (Solid State Drive), which consists of storing information in a data storage device that uses non-volatile memory, by not having moving parts it drastically reduces access time, latency and others, thus differentiating itself from electromagnetic hard drives.
1.6 I/O. These are the input/output operations of the hosting storage, and are measured in Mbps. In the context of a hosting account, it is the data transfer speed limit between the server's disks and the RAM assigned according to your plan. It is related to disk writing.
1.7 IOPS. (Input/Output Operations Per Second) Refers to Input/Output Operations per second, it is a unit of measurement used to measure the performance of storage computing devices as opposed to I/O, this is used in data processing.
1.8 EP (Entry Processes). These are the number of processes that enter a Hosting account. The entry process limit controls the number of entries in LVE. Each time a process 'enters' LVE, we increment the counter. Each time the process leaves LVE, we decrement the counter. It is also known as the 'Apache simultaneous connections' limit.
1.9 Lightweight Virtual Environment. It is the technology used by CloudLinux for managing available resources.
1.10 NPROC (Number of processes). Controls the total number of processes and threads within LVE. Once the limit is reached, no new process can be created (until another one is terminated). When that happens, the NPROC counter is incremented. Apache might return 500 or 503 errors in such a case.
1.11 Apache. Apache HTTP Server is a free and open source web server software for Unix platforms that powers 46% of the world's websites. It is maintained and developed by the Apache Software Foundation.
1.12 Inodes. An inode is a record in a disk table that contains information about a file or folder, such as its size, owner, device node, socket, pipe, etc. The number of inodes in your account is proportional to the number of files and folders you have in it.
1.13 Query. In computer terms, a query is a precise request to obtain information in a database or information system.
1.14 Slow query. These are slow or poorly formed requests and are frequently related to a large number of records in the database. They are called slow because the query or request takes too long to complete, consuming processing time unnecessarily.
1.15 SHELL. A shell is a program that provides the traditional text-only user interface for Linux and other Unix-like operating systems. Its main function is to read commands that are written in a console or terminal window in a GUI and then execute them.
1.16 Error_log file. This is a file generated by the control panel from the events that generate errors on the website. This file generates lines with information about each error that occurs on the site when our visitors browse it.
2. Hosting Limitations
The Client will be prohibited and may be subject to a temporary and/or permanent suspension in the following cases:
2.1 Using more than 25% of the server's resources for more than 90 seconds.
2.2 Using codes that do not work correctly and that, as a result, are affecting the functionality of the servers or services of Trafico Africa.
2.3 Using more than 10% of the server's resources on a sustained or averaged basis per day.
2.4 Running a chat room or any program that serves as an interface to it from your account on the server, which demands high system resources.
2.5 Running autonomous programs that start working automatically at any time and that, due to their autonomy, are affecting the resources of the server.
2.6 Running any program of the "bit torrent", "tracker", "file-sharing", "peer-to-peer" type or any client of the same.
2.7 Running any game server.
2.8 Running radio stations.
2.9 Running scheduled "CRON" tasks with intervals greater than 5 minutes between each task.
2.10 Any slanderous, offensive, discriminatory, illegal, copyright and/or trademark infringing content, as well as violating their respective licenses, is strictly prohibited.
2.11 Maintaining more than 500,000 files (inodes) per account on the Lite and Max plans. This limit is the maximum allowed. The use of hosting space is reserved for the strict operation of the website and its visibility on the Internet, so Backups, File Distribution, mirror sites and others are prohibited.
2.12 Using the disk space of the hosting services for any use other than the usability of the website.
2.13 Exceeding the limit of 25 simultaneous connections to the site and/or account and/or ports.
2.14 Exceeding the maximum size of a database which must NOT exceed 1GB.
2.15 Using remote connections to databases longer than 120 seconds.
2.16 Running queries for more than 10 seconds.
2.17 Storing files containing large audio and audiovisual information and referring to live broadcasts.
2.18 Exceeding more than 250MB in the error_log file.
3. Appropriate Use of Email Services
The Customer will be prohibited and may be subject to a temporary and/or permanent suspension in the following cases:
3.1 Sending emails to users who have not given their electronic or physical consent, which must be demonstrable.
3.2 Sending mass emails except to users who have requested it from the Client and have been authorized (including SPAM).
3.4 Using a Script for Sending Emails.
3.5 Using inaccurate identification data of the recipient and sender (as well as their web addresses).
3.6 Sending mass emails from a plan other than Email Marketing.
3.7 Sending emails that do not contain an option to stop receiving emails from the sender.
3.8 Sending emails in blocks to more than 100 recipients in less than an hour, unless the plan allows otherwise (dedicated and virtual servers).
3.9 Resending messages to recipients who have bounced or rejected receiving emails.
3.10 Sending emails larger than 25MB including attachments and text.
3.11 Sending executable files, which may be marked as “dangerous”.
4. Appropriate Use of Email Marketing Services
The Customer will be prohibited and may be subject to a temporary and/or permanent suspension in the following cases:
3.1 Sending emails to users who have not given their electronic or physical consent, which must be demonstrable.
3.2 Sending mass emails except to users who have requested it from the Client and have been authorized (including SPAM).
3.4 Using a Script for Sending Emails.
3.5 Using inaccurate identification data of the recipient and sender (as well as their web addresses).
3.6 Sending mass emails from a plan other than Email Marketing.
3.7 Sending emails that do not contain an option to stop receiving emails from the sender.
3.8 Sending emails in blocks to more than 100 recipients in less than an hour, unless the plan allows otherwise (dedicated and virtual servers).
3.9 Resending messages to recipients who have bounced or rejected receiving emails.
3.10 Sending emails larger than 25MB including attachments and text.
3.11 Sending executable files, which may be marked as “dangerous”.
5. Coexistance
Anything not mentioned herein shall be deemed to be covered by the General Terms and Conditions or by their applicable specific terms, which in this case may be the Domain Terms and Conditions and the Hosting Service Terms and Conditions.