Our Acceptable Use Policy is a description of the types of activities that are not allowed on our network and, as such, forms part of Our Hosting Terms.
Pixel Perfect Group reserves the right to request changes or disable, as necessary, any website, account, database, or any other component that does not comply with our established policies or to make any such modifications in an emergency at our sole discretion. To meet the changing needs of our customers, our business, the Internet environment and the legal landscape, this policy may be revised at any time and we encourage our customers to review this policy regularly.
If you feel you have discovered a violation of any area of this policy, please let us know by sending an email to [email protected]SPAM and Unsolicited Email »
Pixel Perfect Group has a zero tolerance SPAM policy.Offensive Content »
Certain content is not permitted on Pixel Perfect Group’s network.Misuse of Account Features »
Your account features are for use with your sites only.Shared Systems and Resource Usage »
Excessive resource usage will cause performance and stability problems.Server Side Processes »
Certain processes are not permitted on our shared systems.Internet Abuse »
Using our network to engage in illegal, abusive, or irresponsible behaviour is a violation.Security »
Negligence will put Pixel Perfect Group’s network at risk.Disk Usage »
Disk space usage is monitored with automated billing for over-usage.Traffic Usage »
While our traffic usage is generous, it is regulated and is subject to reasonable use.Combining traffic quotas across multiple servers »
It is not possible to combine the traffic quotas of dedicated servers that are combined to deliver a single service.
1.SPAM and Unsolicited Email
Last updated: January 2013.
Sending unsolicited commercial communication (including, but not limited to email, instant messaging, SMS, chat rooms, discussion boards and newsgroups) is not permitted via Pixel Perfect Group’s network.
Regardless of how the recipient’s email address was acquired, if email communication was not explicitly requested or consented to by the recipient or if the recipient would not expect to receive it as a result of an existing relationship, the communication is considered unsolicited (this applies to communication sent to both personal email addresses and company email addresses e.g. [email protected]). Email communication that does not clearly originate from a consensual sender or which appears to come from a 3rd party or affiliate is considered unsolicited.Examples of unsolicited communication:
- Purchased mailing lists, “safe lists” and harvesting of email addresses, where the users of those email addresses have not explicitly agreed to receive communication from a specified consensual sender is considered unsolicited.Sending emails where the recipient must opt-out of receiving further emails that they didn’t originally request is considered unsolicited. Sending a once-off invitation to receive further information, which was not explicitly requested or consented to by the recipient is considered unsolicited. Email communication to a mailing list including addresses of unwilling recipients or a recipient who has indicated that they wish to be removed from such list, yet continues to receive unwanted emails after a reasonable period, is considered unsolicited.
- Mailing list operators should maintain meaningful records of recipient requests and their consent to receive said email communications. There should also be an option for the recipient to unsubscribe from receiving further email communications.
- When Pixel Perfect Group receives a spam complaint, in order to establish if the communication was unsolicited, we may ask you to verify whether the recipient agreed to receive communications from you and if so, when and where you recorded their email address.
- Pixel Perfect Group reserves the right to suspend or terminate the account of any user who sends out unsolicited email otherwise known as Spam with or without notice in accordance with its General Terms and Conditions.
- As a Pixel Perfect Group customer, should you infringe this policy, you will be held liable for any costs incurred by Pixel Perfect Group, both monetary and in reputation. Pixel Perfect Group reserves the right to charge the customer of the account used to send any unsolicited email a clean-up fee or any charges incurred for blacklist removal. This cost of the clean-up fee is entirely at the discretion of Pixel Perfect Group.
- The use of any other service for the purposes of sending SPAM with any reference to Pixel Perfect Group services (including but not limited to mailboxes, autoresponders, and Web pages), will also be grounds for suspension/termination as described above. If your website was compromised and exploited for the purpose of sending unsolicited communications, Pixel Perfect Group will be more lenient in resolving the issue. However, repeat exploitations of the same website and/or customer account would be grounds for suspension/termination. For further information, please read our FAQ on Spam Abuse
2. Offensive Content
Last updated: May 2011.
- Pixel Perfect Group does not allow any of the following content or links to such content, to be published on its Hosting Systems:
- Content of a pornographic, sexually explicit or violent nature.
- “Hate” sites or content that could be reasonably considered as discriminatory in any way including by way of sex, race or age discrimination.
- Content of an illegal nature (including stolen copyrighted material).
- Content that is defamatory or violates a person’s privacy.
- Content that involves theft, fraud, drug-trafficking, money laundering or terrorism.
- Pirated software sites.
- Illegal gambling sites.
- If Pixel Perfect Group in its sole discretion determines that any customer content violates any law, including the Film and Publications Act, 65 of 1966 or this policy, it may:
- Request the customer to immediately remove such content; and/or
- Require the customer to modify such content; and/or
- Without notice, suspend or terminate access to any services; and/or
- Without notice, delete the offending content; and/or
- Notify the relevant authorities of the existence of such content (if required by law or otherwise), make any backup, archive or other copies of such material as may be required by such authorities, disclose such elements of the customer’s data as may be requested by the authorities and take such further steps as may be required by such authorities.
3. Misuse of account features
Last updated: July 2011.
- Operating any service which makes an account feature available to third parties for any use other than normal access to that account’s Web site is forbidden. Operating any service which enables or assists anonymous or abusive behaviour by third parties is forbidden. Operating any service which affects the stability or reliability of any Pixel Perfect Group server or network component, impacts other users or the company negatively, or degrades quality of service is forbidden. All account features are to be used solely in order to develop and implement the Web site(s) associated with that account.
- Reselling Multiple Domains on Pixel Perfect Group’s Web Hosting packages to a third party is not allowed. Multiple Domains are to be used solely for the Profile Owner’s own websites.
- Users may not, through a cron job, CGI script, interactive command, or any other means, initiate the following on Pixel Perfect Group’s shared servers:
- Run any process that requires more than 50MB of memory space.
- Run any program that requires more than 30 CPU seconds.
- Run more than 10 simultaneous processes.
- Send out mail to more than 500 recipients (email addresses) within one hour. 500 recipients represent one of the following: 500 recipients for one email, 500 individual emails or a combination of the two.
- Send or receive, through mail, any file larger than 20MB.
- Should we discover that a customer is performing bulk mail runs on our shared systems that exceeds the limit communicated in 3.1.4 above, regardless of whether it constitutes SPAM or not, Pixel Perfect Group will deactivate the user’s account.
- Custom server-side CGI scripts are to be run only by users with the appropriate package types (in Pixel Perfect Group’s case the Web Hosting Basic package or higher). No user may run CGI scripts for the benefit of external sites or services. The use of system resource limits is intended to prevent runaway CGI scripts on an unattended server. Also, processes with large memory footprints or hungry CPU requirements will incur swapping and other slowdowns that cause problems for every site on the server.
- Interactive Web applications, commonly known as “chat”, are not allowed on Pixel Perfect Group’s shared systems. These applications are better placed on dedicated servers.
- MySQL databases are provided to users of the Web Hosting Basic package and higher:
- Each qualifying individual package is limited to the allocated quota as published in the product matrix.
- Each individual database is allotted a maximum of 500 MB disk space.
- Databases may not be used for circumventing package disk allowances by storing web sites within the database.
- Databases may only be used in conjunction with Pixel Perfect Group hosted packages. Access to databases from outside our local network is provided strictly for site and database development.
- Only 10 concurrent MySQL connections per database user are allowed.
- Databases may not be used to store binary files (including but not limited to image and application files). The database needs to reference the image on the user’s site rather than actually storing the image i.e. these files should be stored within the user account and referred to in the database by using a link.
- Pixel Perfect Group reserves the right to require changes to databases and database usage should they have an adverse impact on a database server and/or other user databases on that server. Pixel Perfect Group may move the database to a new server, or in extreme cases, Pixel Perfect Group reserves the right to disable any database determined to be harming performance of a database server.
4. Shared Systems and Resource Usage
Last updated: August 2012.
Customers hosting on our shared environment may not use any shared system provided by Pixel Perfect Group in a way that interferes with the normal operation of the shared system, or that consumes a disproportionate share of the system’s resources. For example, excessive server hits, excessive bandwidth usage, excessive disk usage, inefficient scripts or database queries may compromise other users of the shared hosting environment. Pixel Perfect Group is authorised to suspend a user’s account should it be found that excessive resource usage is negatively impacting on other customers of our shared hosting environment. In most cases, the examples below do not apply to Pixel Perfect Group Dedicated servers.
- To be used only by customers of the Web Hosting Basic package and higher.
- The job must not execute more often than every two hours.
- If a cron job is likely to consume excessive CPU usage, it should be given a lower CPU priority.
Resource limits are enforced by automatic monitoring systems. This is not applicable to Fully Managed Dedicated servers, providing that it does not interfere with Pixel Perfect Group’s ability to manage the server on the customer’s behalf.
5. Server side processes
Last updated: May 2011.
- To protect the CPU and memory resources available on each server.
- To protect and enhance system security by not allowing unapproved third-party programs to accept connections from the outside world.
6. Internet Abuse
Last updated: May 2011.
You may not use our network to engage in illegal, abusive, or irresponsible behaviour, including:
Compliance with the acceptable use policies of any network or system with which you connect through our service is required. If inappropriate activity is detected, all accounts of the user in question will be deactivated until the investigation is complete. Prior notification to the user is not assured. In extreme cases, law enforcement will be contacted regarding the activity.
Last updated: May 2011.
Pixel Perfect Group customers must take reasonable security precautions. Negligence could result in the hacking of websites as well as compromised mailboxes due to vulnerable PCs, website software or the use of weak passwords, which could affect other Pixel Perfect Group customers through blacklisting, phishing or spamming.
8. Disk usage
Last updated: July 2016.
9. Traffic Usage
Last updated: November 2020.
- Public mirroring services that are made available for general public use
- Any website or service where the primary focus is to drive or redirect traffic from one network to another
- Reselling bandwidth and/or network capacity as internet access to end-users
If you’d like to discuss your requirement in more detail, please contact sales@Pixel Perfect Group.com
10. Combining traffic quotas across multiple servers is not supported
Last updated: November 2020.
Pixel Perfect Group will provide traffic usage per IP address and any excessive usage will be flagged with the customer. It is, therefore, not possible to apply an aggregated traffic usage model across multiple servers.
Traffic generated from a Colocation network that is destined for the internet should not be routed via a Self-Managed Server or network. An example of this is hosting a video processing system which requires a large number of servers to perform the required processing, including database, backup and redundancy servers. It is not possible to combine the quotas of multiple servers on our network.
Other examples that may generate high traffic are:
We have found that the majority of our customers remain well within the acceptable aggregated data usage pattern. We will contact any customers that show a pattern of excessive usage, to discuss a feasible solution. Should you have any concerns, you’re welcome to contact us on dedicated@Pixel Perfect Group.com.
11. Traffic & Self-Managed Servers
Last updated: November 2020
Our Self-Managed Server options have no set traffic quota. As per 1.3 and 2 of this policy, all Self-Managed Server customers are expected to comply with our Acceptable Use Policy. Any server that utilises traffic outside of this policy may be rate-limited during peak traffic periods.