Terms and Conditions
Perfect Privacy provides almost ultimate freedom, but some rules and regulations are necessary to guarantee the undisturbed operation of its servers and services.
If you have further questions, please contact us .
Our servers are used by many people over the world, thus as a client of Perfect Privacy you oblige yourself to use our servers and services fairly and reasonably. You are encouraged to keep the thought in mind that you are not the only member that makes use of our servers and services and that you pay only a fraction of what ordinary ISPs charge you for a traffic allowance of a few gigabytes.
While Perfect Privacy does currently not impose a strict bandwidth limit, the principle of „fair and reasonable use” applies. Subscribers are, as a rule of thumb, encouraged not to use more than 100 GB's of traffic per month during Internet peak times (typically 7 am to 11 pm server time), thereof not more than 20-25 % on servers marked as „limited traffic” and „semi-limited traffic” servers. The other 75-80 % should be used on „unlimited traffic”servers.
This above-mentioned 100 GB limit of „fair and reasonable use” can be exceeded if you use „unlimited traffic” machines primarily or exclusively during off-peak hours (typically 11 pm to 7 am server time). It is recommended to use „unlimited traffic” machines with much bandwidth (100 to 1,000 mbps) instead of those with little bandwidth (~10 mpbs). As this constitutes traffic that would otherwise remain unused and which does in general not affect the speed of other members, the appropriate use of „unlimited traffic” machines during Internet off-peak hours, even if it significantly exceeded the 100 GB's/month guideline applying during peak times, would not violate the principle of „fair and reasonable use.”
In case we get the impression you violate the principle of „fair and reasonable use,” Perfect Privacy will try to find a mediating solution with the subscribers in question, asking them to reduce their traffic. In case these attempts fail, Perfect Privacy reserves the right to suspend the members' access to the servers in question or to all servers until the end of the monthly payment period and without financial compensation. Subscribers are in particular not allowed to use „limited traffic” servers for continual, reoccurring or excessive use of traffic intensive applications such as P2P, file sharing, excessive binary downloads via usenet, voice-to-IP, video conferences, and audio and video streaming. These servers are to be used primarily for traffic-economical applications such as browsing, instant messengers, telnet, gopher or SSH. If you need reoccurring high-bandwidth and high-traffic encryption and anonymization, please rely on the „unlimited traffic” servers in our park. As we do whatever is in our power to provide always sufficient bandwidth and traffic to our community, in the history of Perfect Privacy a person never had to be warned, so don't worry too much about it. We keep a benevolent attitute, but just keep it in mind.
Sending, introducing or executing malicious programs into any network or server, such as viruses, worms, Trojan Horses, and key loggers;
Causing or initiating security breaches or disruptions of network communication and/or connectivity, including flood pings, email-bombing, packet spoofing, and forged routing information;
Hacking, and/or subverting, or assisting others in subverting, the security or integrity of Internet and intranet systems;
Executing any form of network activity that will intercept data not intended for the client;
Evading or circumventing user authentication or security of any host, network or account, including cracking, brute-force, or dictionary attacks;
Interfering with or denying service to any user, host, or network, such as a denial of service attack or distributed denial of service attack;
Using any program, or sending messages of any kind, designed to interfere with or disable a user's session;
Sending unsolicited bulk messages (i.e., “spamming”);
Forgery of e-mail headers (“spoofing”);
Issuing a dangerous threat, threatening bodily harm, or encouraging bodily harm or property destruction;
Harassing another, or encouraging harassing behavior;
Collecting or distributing personal information about non-celebrities and non-prominents without their knowledge or consent;
Sending, distributing or premedidatedly requesting any information, data, material, or work that infringes the intellectual property rights of others or violates any trade secret right of any other person;
Using our services to disseminate, exchange, swap, upload, download, store, collect, or display still or moving images classified under international law as child pornography or child erotica (regardless of literary or artistic merit) and/or bestiality;
Committing or perpetrating any act that is considered a capital crime, a felony, a criminal offense, a misdemeanor or an administrative offense under the jurisdiction of the country in which the server you are using is located; and/or
Acting in any manner that might subject Perfect Privacy to unfavorable regulatory action, subject us to any liability for any reason, or adversely affect Perfect Privacy’s public image, reputation or goodwill, as determined by us in our sole and exclusive discretion.
The remedial actions set forth in these Terms and Conditions shall not be construed in any way to limit the actions or remedies that Perfect Privacy may take to enforce and ensure compliance with these Terms and Conditions and the means appropriate to lead to the aim to protect and indemnify Perfect Privacy and its innocent clients. Perfect Privacy reserves the right to recover any and all expenses, and apply any reasonable charges in connection with a user’s violation of these Terms and Conditions. No refund or service credits will be issued for any interruption in service resulting from violations of these Terms and Conditions by clients or third persons.
Sign-up Now and encrypt your Internet.
Need assistance? Email us.