Antler...
General Terms And Conditions
Cookie Statement [v2 04/2017]

The website www.ddos-hosting.ro uses cookies

1. General information
2. What is a cookie?
3. What are the benefits of cookies?
4. What is the lifetime of a cookie?
5. What are cookies placed by third parties?
6. How are cookies used by www.ddos-hosting.ro?
7. Security and privacy issues
8. Disabling cookies
9. General information
The information presented below is intended to inform the user of the details regarding the placement, management and use of cookies by the website www. ddos-hosting.ro. If you have any questions or need more information than those listed below, you can contact us using the contact form. Please read the following information carefully: The website www.ddos-hosting.ro (website, site) uses its own cookies and cookies from third parties to provide visitors with better navigation and tailored services. the needs and interests of everyone. Cookies play an important role in facilitating access and delivery of multiple services that the user enjoys on the Internet, such as:
• Customizing certain settings such as: settings for sorting, connection status, filtering, etc.
• Cookies provide site owners with valuable feedback on how the site is used by users, with the aim of improving its ease of use;
• Allow multimedia or other applications from other sites to be included in a particular site to create a more valuable, useful and enjoyable browsing experience;
• Improve the efficiency of online advertising.


2. What is a cookie?

A Cookie (also known as a "browser cookie" or "HTTP cookie") is a small text file, consisting of letters, numbers and other symbols, which will be stored on your computer or mobile terminal or other equipment used for accessing the website or applications www.ddos-hosting.ro. The cookie is installed by a request sent by a webserver to an Internet browser (web browser - eg Internet Explorer, Google Chrome, Mozilla Firefox, etc.) in order to store statistics, preferences or other information provided by the user . A cookie consists of 2 parts: the name and content of the cookie. Furthermore, the cookie's lifetime is determined; technically, only the webserver that sent the cookie can access it again when a user returns to the website associated with that webserver. Cookies themselves do not require personal information in order to be used and, in most cases, do not personally identify Internet users. There are 2 major categories of cookies:-uri:

• Session cookies - these are temporarily stored in the cookie folder of the web browser to store them until the user exits the respective web-site or closes the browser window (eg at the time of authentication / authentication of an account ).
• Persistent cookies - These are stored on the hard drive of a computer or device (and generally depends on the default cookie lifetime). Persistent cookies include those placed by a website other than the one the user is visiting at that time - known as "third party cookies" - which can be used anonymously to memorize the interests of a user so that advertising is delivered as relevant to users.

3. What are the benefits of cookies?

A cookie contains information that links a web-browser (the user) and a particular web-server (the website). If a browser accesses that web-server again, it can read the information already stored and react accordingly. Thus, a cookie can ensure an easy and comfortable browsing experience.


4. What is the life of a cookie?

Cookies are managed by web servers. The lifetime of a cookie may vary significantly, depending on the purpose for which it is placed. Some cookies are used exclusively for a single session (session cookies) and are no longer retained once the user has left the website and some cookies are retained and reused each time the user returns to that website (cookies). permanent). However, cookies can be deleted by a user at any time through the browser settings.


5. What are cookies placed by third parties?

Certain sections of content on some sites may be provided through third parties / providers (eg news box, a video or an advertisement). These third parties may also place cookies through the site and they are called "third party cookies" because they are not placed by the owner of the respective website. Third-party providers must also comply with the law in force and the privacy policies of the site owner.


6. How are cookies used by www.ddos-hosting.ro?

A visit to this site may place cookies for the purposes of:

• Site performance cookies • Visitor analysis cookies
• Cookies for geotargetting
• Registration cookies
• Cookies for advertising
• Advertising providers' cookies
• Cookies to keep filtering, sorting or order retention in the shopping cart

7. Security and privacy issues

Cookies cannot be viruses. These are text-type objects that cannot be self-executed, so they cannot be duplicated, retrieve content outside the browser (web browser) and cannot perform internal applications or delete / copy operations on the hard disk. user. Warning: Cookies can still be used for negative purposes. Because it stores information about users' browsing preferences and browsing history, both on a particular site and on several other sites, cookies can be used as a form of Spyware. Many anti-spyware products are aware of this fact and are constantly flagging cookies for deletion in anti-virus / anti-spyware removal / scanning procedures. In general, browsers have integrated privacy settings that provide different levels of cookie acceptance, validity period and automatic deletion after the user has visited a particular site.


8. Disabling cookies

By deactivating cookies is meant to block / stop writing or reading information in the cookie session. Disabling cookies can lead to defective functionality of both the www.ddos-hosting.ro site and other sites. Any web browser offers the possibility to disable cookies. For more details on how to do this, go to the following links depending on the browser you are using:

• Manage cookies in Microsoft Internet Explorer
• Manage cookies in Mozilla Firefox
• Manage cookies in Google Chrome
• Manage cookies in Safari
Additional details about the cookie
If you would like more information about cookies, you can access the following links:
• Wikipedia: HTTP Cookie
• Microsoft: Description of Cookies

Privacy Policy / GDPR [v2 04/2017]

Preliminary remarks

On 15/10/2018, the parties concluded an agreement on the use of Servers(Main Agreement). The provisions of the Main Agreement include the processing of data by the Contractor on behalf of the Client. This data may also include personal data. Personal data means any information relating to an identified or identifiable natural person (data subject). Insofar as the processing of personal data by the Contractor on behalf of the Client is concerned (data processing for third parties), this Agreement shall serve as a supplement to the Main Agreement. In this respect, deviating provisions of this Agreement take precedence over the provisions of the Main Agreement. The parties shall observe data protection regulations, in particular the regulations of the EU General Data Protection Regulation (GDPR) and the German Federal Data Protection Act (BDSG) when processing data.

The GDPR shall apply as of 25 May 2018. Insofar as the parties have already entered into a data processing agreement (DPA), this Agreement shall supersede the DPA once the GDPR applies.

Subject matter and duration

• The subject matter of the contract arises from the Main Agreement. In particular, this includes the provisioning of servers racks incl. power supply and Internet connection in the data centre of Astimp IT Solution SRL.Personal data processed according to this Agreement shall include data that the Contractor has collected on behalf of the Client or has been transferred from the Client to the Contractor for data processing. The Client shall ensure that the transferred data or data collected on its behalf does not reveal racial or ethnic origin, political opinions, religious or philosophical beliefs or trade union membership. The data shall also not be related to criminal convictions or offences, genetic data, biometric data for the purpose of uniquely identifying a natural person, data concerning health or data concerning the sex life or sexual orientation of such a person.
• The duration of the contract shall correspond to the term of the Main Agreement. After completing the data processing services, the Contractor shall erase or return all personal data at the option of the Client unless legal regulations stipulate the storage of such data. The Contractor shall once again separately confirm the erasure at the request of the


Content of the contract

• The type and purpose of the processing arise from the Main Agreement. Personal data processed on behalf of the Client includes (type of data):
– IP Adresses
insofar as the data subject may be identified by such data.The Contractor shall not process the data for other than the contractual purposes. In particular, the Contractor shall not transfer the data to third parties outside the contract. The Contractor shall make copies (e.g. backup copies) only for the contractual processing of the data.
• The data of the following persons is affected by the data processing (categories of persons):
– users who access the Client’s infrastructure via the Internet.
• The Client shall remain solely responsible for the processing of personal data that is effected on its behalf. The Contractor shall therefore process this data only at the instruction of the Client, insofar as the Contractor is not obligated to perform other processing according to the legal regulations. The Contractor shall notify the Client about such other processing, however, insofar as such notification is not prohibited due to important public interests. The responsibility of the Client is concerned especially with the lawful data processing according to the contract and as instructed, as well as ensuring compliance with principles of processing personal data and that this compliance can be proven.
• The instructions shall be initially defined and documented in the Main Agreement and this Agreement. The Client may modify, replace or supplement the initial instructions at a later point in time with separate instructions (individual instruction). The individual instruction shall fall within the scope of the contract and also be documented. If an individual instruction is given verbally due to extreme urgency, it shall be promptly confirmed in documented form. In this respect, instruction means every stipulation that is related to a specific data protection- related handling of the data processed according to this Agreement (e.g. erasure, anonymisation and rectification of data or the restriction of data processing).
• If the Contractor believes that an instruction violates legal regulations, the Contractor shall immediately inform the Client. In this respect, the Contractor shall be entitled to suspend the implementation of the instruction until it is modified or confirmed by the Client in documented form. If the Contractor determines the purposes and means of processing violating the instructions of the Client, the Contractor shall be responsible with regard to this processing.
• The data processing shall be performed in the Member States of the European Union (EU). The transfer of the processed data to a third country shall require the consent of the Client, which may be withheld only for important reasons. In particular, if the third country does not offer an adequate level of protection or the legal requirements for the transfer of data to the respective country are not met this shall constitute a reason for withholding consent. The Contractor shall be responsible if there are doubts in this
• The Client shall not make anyone subject to decisions based on automated processing including profiling within the context of data processing which produces legal effects concerning the data subject or similarly significantly affects the data subject. By the same token, the Client shall not have data processed on its behalf for an offer that is directly made to a child (e.g. services specifically directed at children).


Data protection officer

• This Agreement shall not constitute an obligation to designate a data protection officer. Both parties are aware that a data protection officer shall be designated according to the legal regulations if a) the core activity of the respective party involves the performance of processing operations that require extensive regular and systematic monitoring, b) generally at least ten employees are constantly occupied with the automated processing of personal data, or c) the data is processed in a business-like manner for the purpose of data transfer or market and opinion
• The provision for changing the contact person applies correspondingly to the data protection officer. The contact person may also at the same time be the data protection officer. If a party subsequently designates a data protection officer, it shall immediately notify the other party in documented form. The data protection officer of the Client shall be entitled to give instructions and the data protection officer of the Contractor shall be entitled to receive
• The data protection officer shall be involved by the respective other party in all issues concerning the protection of personal data and monitor the compliance with data protection regulations. The parties may consult the data protection officer of the other respective party in all issues concerning the processing of personal data according to this


Rights and obligations

• The Contractor shall ensure that persons authorised to process personal data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality. This shall in particular apply to persons subject to the supervision of the Contractor (employees) who have access to the processed data. At the same time, the Contractor shall ensure that its employees process this data only according to the instructions of the Client insofar as they are not obligated to other processing according to legal regulations. The obligation to ensure discretion and confidentiality shall remain after the end of the
• The Contractor shall assist the Client in the fulfilment of its obligation to respond to requests for exercising the data subject’s legal rights vis-à-vis the Client. If a data subject contacts the Contractor, the Contractor shall immediately forward the request of the data subject to the Client. The Contractor shall not respond to any request of data subjects without the instruction of the Client. Furthermore, the parties shall assist each other taking into account the nature of the processing and their respectively available information in the compliance with their legal obligations concerning data protection.In particular,this shall apply to the obligation to ensure the security of processing, notify the supervisory authorityand the data subjects of a data protection breach, perform a data protection impact assessment, consult the supervisory authority and prepare a record of processing activities.
• The parties shall provide all necessary information to prove compliance with data protection obligations stipulated in this Agreement on request. The same shall apply to information needed for proving compliance with required legal regulations for data processing. Furthermore, the Contractor shall facilitate reviews including inspections that are performed by the Client or an auditor commissioned by the Client. The Contractor may object to an auditor that is in direct competition with the Contractor. The Client shall make an appointment in good time in advance for inspections at the establishment of the Contractor. The Client or auditor shall commit to confidentiality prior to the audit. This shall not apply if it is excluded that the Client and/or auditor comes into contact with information other than the information processed according to this Agreement. The Contractor shall assist the audit where necessary. The proof of measures that not only relate to the specific contract may also be provided by audit certificates or reports by an independent body such as an external auditor or data protection auditor. The same shall apply to authorised or otherwise appropriate certifications by an independent
• If the Contractor becomes aware of a breach of security of personal data that is processed on its behalf, the Contractor shall immediately notify the Client. The same shall apply if the data processed by the Contractor is subject to seizure or confiscation, insolvency proceedings or similar measures. In case of imminent danger, the Contractor shall be entitled and obligated to point out that the responsibility for the affected data lies with the Client. The parties shall implement appropriate measures for the protection of the data and for minimising possible adverse effects, in particular also for the data subjects, and assist each other with the documentation. The parties shall also inform each other about measures that a supervisory authority has taken in connection with the processing insofar as this is


Technical and organisational measures

• The Contractor shall take appropriate technical and organisational measures so that the processing is performed in accordance with legal requirements and the protection of the data subjects’ rights is ensured. The Contractor shall thereby consider the state of technology, implementation costs and the type, scope, circumstances and purposes of processing as well as the different probabilities of occurrence and severity of the risk to the rights and freedoms of natural persons. Overall, the technical and organisational measures of the Contractor shall ensure a level of protection that is appropriate to the risk
These measures shall include for example:
a)the pseudonymisation and encryption of personal data, b) the ability to ensure the confidentiality, integrity and capacity of the systems and services in connection with the processing in the long term, c) the ability quickly to restore the availability of personal data and access to it following a physical or technical incident. The data processed on behalf of the Client shall be separated technically and organisationally from other data whenever possible
• Details on the measures implemented may be found in the Appendix to this Agreement. The Client acknowledges that these measures are sufficient according to the state of technology. The Contractor shall regularly review the compliance and effectiveness of the technical and organisational measures to ensure the security of the processing and update them where necessary. During the review, the Contractor shall consider the risks concerning the processing, in particular due to destruction, loss or alteration, whether unintended or unlawful, or unauthorised disclosure of or unauthorised access to personal data that is transferred, stored or processed in any other way. The Contractor shall comply with the level of protection stipulated by this Agreement when updating. Significant changes that result from the updating of the measures shall be documented by the


Subcontractors

• The Contractor currently uses the processors (subcontractors). Documentation is required if a subcontractor is processing data in a third country. At the same time, it is necessary to document what constitutes the appropriate level of protection for data processing by the subcontractor. In this respect, the Client agrees to the data transfer to a third
• The Contractor shall be entitled to involve additional subcontractors or replace the used subcontractors by other subcontractors. The Contractor shall inform the Client in advance about any intended change with regard to adding or replacing a subcontractor. This gives the Client the opportunity to object to the intended change. The objection shall be raised within a cut-off period of six weeks after receiving notification about the intended change. Both the notification and the objection shall be made in writing, with the Contractor once again making the Client aware of the cut-off period in the notification. If the Client raises an objection to the change without an important reason, the Contractor shall be entitled to early cancellation of this Agreement as well as the Main Agreement with a notice period of six
• The Contractor shall impose the same data protection obligations on the subcontractors stipulated in this Agreement between the two parties. In particular, the subcontractor shall implement appropriate technical and organisational measures in such a way that the processing is performed according to the data protection regulations. If a subcontractor fails to comply with its data protection obligations, the Contractor shall be liable for the compliance with the obligations of the respective subcontractor. The Contractor shall transfer data processed on behalf of the Client to a subcontractor only when the requirements according this Agreement are met.
• Third parties which the Contractor uses for ancillary services to support the performance of the contract shall not be considered subcontractors. These include telecommunication, postal, maintenance and audit services. The Contractor shall also take measures in this respect to ensure an appropriate level of protection proportionate to the risk (e.g. confidentiality obligation, monitoring or encryption).

Costs

• The Contractor shall perform the implementation of the instructions that are defined in the Main Contract and ensure compliance with general, technical and organisational measures according to this Agreement without charging costs to the Client. In this respect, the services of the Contractor shall already be covered by the compensation pursuant to the Main Contract. The same shall apply to individual instructions that the Client may and actually does implement on its own according to the Main Agreement (e.g. erasure of data through a web interface) via the processing system of the
• The costs for the implementation of individual instructions and other requirements, however, shall be the responsibility of the Client. In particular, this shall include assisting in responding to requests of data subjects and compliance with other obligations to which the Client is subject, the return and destruction of data insofar as this goes beyond deletion in the system of the Contractor, making information available insofar as this is not primarily in the interest of the Contractor and facilitating and contributing to reviews including
• On request, the Contractor shall provide the Client with a cost estimate in advance. Costs also include an appropriate compensation for services rendered. Different cost provisions in the Main Contract or a price list included in the Main Contract related to data protection measures shall override this cost Likewise, the costs for measuresrequired due to the fault of one party shall be borne by this party. Partial culpability of the respective other party shall be considered, however.


Final provisions

• Even if single provisions are legally invalid, this Agreement shall remain binding in its remaining parts. Statutory provisions shall apply in place of the invalid provisions. This Agreement shall not apply to the processing of non-personal data. This Agreement shall also not apply if the parties categorised such data as personal by mistake or because of an incorrect interpretation of the law. As long as there are doubts concerning whether the data is personal, the data labelled as such shall be handled as if it were personal as a precautionary measure. The provisions of the Main Agreement shall apply solely to non-personal
• The laws of the Romania shall apply. Any provision on the place of jurisdiction and limitation of liability in the Main Agreement shall also apply to this Agreement without limiting the legal rights of the data
• Modifications, supplements to and cancellation of this Agreement shall be made in documented form. Documented form within the meaning of this Agreement means at least text form. At the request of one party, any declaration made in text form shall be confirmed in writing.



Servers Policies [v2 09/2018]

Use of resources

All accounts are monitored for their use of server resources. If an account is using a large amount of server resources we will contact the customer to discuss the issue. If an account is using a large amount of resources (memory, CPU), account may be suspended or script disabled without notice to maintain the smooth running of the server. Maximum power is accepted for sites 5% CPU, 5% and 1.5% MEM MySQL and processes can consume up to 10% CPU for standard packages excluded package NS-mining site is limited to 3% CPU, MEM and 3% MySQL 0.5% higher consumption may be considered abuse of the server. Customers can request a package upgrade or temporary resource. Customer's sole responsibility to contact us in advance of requiring extra resources to prevent account suspension.


Backup

Backups are made weekly by us both to files, email boxes and database. Still not offer any guarantee for the integrity of these backups. We advise all customers to download their own backups from their control panel, the option Bakup. Provider is not responsible in any way for loss of information users hosted as a result of actions or due to existing errors in applications that are not associated with the service. For example, the control panel is not associated with the service and is provided by the supplier, being developed and offered by cpanel.net


Uptime Guarantee

The service offered by ddos-hosting.ro Average uptime guarantee 99.98% server. Are these exceptions: - Force majeure in which we can not have any influence, such as wars, natural disasters, unavailability / interruption of communications, fire, viruses, hackers, failure of correct software provided by another source (free scripts, software trade electronic or online payments processor), flood, earthquake, embargoes, actions by statutory authorities. - Maintenance works announced or in critical situations, upgrades of servers. - Domain Name System (DNS) problems that can not be controlled DDOS-HOSTING.RO - Customer access problems with FTP, POP, IMAP or SMTP.


Programs running in the background

Do not allow use of programs that run continuously in the background. Allow programs to operate in the background as an extension of the client's website, but do not allow use of programs specifically designed to work in the background.


Cron Jobs

We do not allow scripts to run at intervals set by cronuri less than 15 minutes.


CGI Scripts

CGI scripts can be used by our clients as a Party included in services, but any CGI script specifically developed to negatively affect server performance or network integrity may be terminated without notice


Chat Room

We do not allow the use of chat rooms to each client on our servers due to special requirements of these programs.


Installation of additional services

If the script you want to use other software programs require activation server ddos-hosting.ro is not required to install those programs, unless they consider that their activation would adversely affect the stability or security server. In this go and change some parameters of the software used on servers. Any request for account upgrade (space / traffic / other package) is made by email or support ticket at least 24 hours before the change. We take no responsibility if you upgrade your account and end traffic site or area. The customer can always check the resources allocated to the control panel - Cpanel


TOS [v3 01/2018]

Terms Of Service

The Convention on the "Terms and Conditions for use of web-hosting service
for use of web-hosting service, determine the conditions under which any person may visit or access the site ddos-hosting.ro can use in any manner or hosting service or domain registration, and has a value conventions concluded between Avnet IT&C ltd. (Hereinafter called "supplier"), in its capacity as owner and administrator of the site and service provider, and any person visiting or accessing the site or in any way wish to use or actually use the services (hereinafter "user or client). Non-acceptance of this Agreement or of any provision of this person's obligation to draw immediately cease accessing or using the Site in any manner of service, while still accessing or visiting the site, opening an account at ddos-hosting.ro or use in any way service constitutes acceptance of the Convention in its entirety and any provision thereof, including any subsequent changes may be made without restriction by the supplier, without requiring any other formality.


Content Policy

It is forbidden to publish the content provider's servers or references (links) to such content that: (i) violates or infringes in any way intellectual property or other rights of others, (ii) are obscene or pornographic nature or violence, (iii) have content defamatory or libelous, (iv) are content with racial or discriminatory nature, (v) contain viruses, Trojan horses or the like, (vi) contain pirated software or for those who pirate software or any practice similar activities. It is also forbidden to use our servers exclusively as a storage medium (for instance, movies, mp3, pictures, etc..).


Banned scripts

- Scripts for Proxy, Anonymizer - Scripts for IRC - Scripts Top Sites - Scripture text browser - Mail Bomber mass email or any insecure script to send emails - Torrent Tracker - Chat rooms which consume excessive resources - PhpShell and similar command execution scripts. Any attempt to harm the servers or clients is prohibited. Any activity that affects the proper functioning of the shared hosting server (examples include but are not limited to: CPU load than normal, mass mailings, very common SQL queries and / or duration) will be considered abuse and will be appreciated as an attempt to harm other customers collocated.


E-mail

Sending Unsolicited Commercial Email (SPAM) to promote any site using our servers or third party servers promoting any website hosted by us will result in the suspension or cancellation of customer's hosting account without refund. Mailing lists can be operated in conditions where people subscribe to receive messages, and publish all the lists messages withdrawal procedure. Each hosting account is limited, so do not allow sending more than 100 emails in a period of 60 minutes.On each server VDS or dedicated we accept only one RDNS , indifferent how many alocated IP the server have. This policy (restriction) is necessary to protect the quality hosting service. Sending mass emails cause massive consumption of resources of a server, it having a negative impact on quality of services received by cliienti. The first violation of this policy will result in immediate suspension of hosting account.


Customer Responsibility

Customer is responsible for updating contact information in their billing control panel when necessary. We can not be held responsible for the confusion in the communication as a direct result of missing the customer to update their details. If your client has provided incorrect information when registering (intentionally) we reserve the right to suspend the hosting account or other services if they are active until the correct contact details / personal.Customer is responsible for keeping security usernames, passwords and other sensitive information. If an unauthorized person to log into your account and change your client login information or will transfer a domain name to another registrar or simply change the data owner at your disposal 48 hours to submit a complaint / Commercial Department by referral (phone, email). If you have not notified within 48 hours, ddoshosting.ro can not be held liable for any damages. To recover a domain name registered ddoshosting.ro active, we need to show your ID and invoice number of ddoshosting.ro on that domain name. If during that notification was not submitted to the web domain was transferred to another Registrar ddoshosting.ro not responsible for solving problems and need to go to civil court.


Limited Liability

We are not responsible for damage caused by our servers unavailable, for any reason that causes this. This includes damages arising from damage or loss of data. Customer agrees to indemnify and consider us harmless from any claims, damages, including, without limitation, damages caused to third parties arising as a consequence of using the service which damages our client. The user said he understands and accepts that in any situation where the user will claim damages from any supplier, the total amount of damages requested by the user for any reason that could be paid by the provider can not exceed in any way in any case the total amount of charges (fees) paid by the user provider.


Notices and Announcements

ddos-hosting.ro reserves the right to send notices and announcements on services offered by third parties when they can be for the benefit of users.


Payment terms and invoicing

Customer agrees to pay for our services ahead of time in which they are provided. All pro-forma invoices will be sent by email and will provide client control panel. Customers must pay for the bill in advance at the beginning of each pay period, within 5 days from invoice issue date. Customers who want a hosting account or closing of any service to be purchased by sending an email notification at least five days before the due date, otherwise the invoice issued will be paid for one month minimum. For each day of delay in payment after the date of proforma invoices scandenta extending hosting packages are charged a penalty of 0.5% per day.


Account suspension for unpaid services

Accounts of users who have not paid rates (by "paid" means that the amounts entered in our account, regardless of payment method and duration of banking circuit) for the service within five days of the invoice issued by the supplier pro -form will be suspended until payment confirmation or until payment, as provided above. Reactivating accounts will be made only after payment confirmation. NOTE. Any account suspended for non-payment will be automatically deleted by the system within 15 days of suspension. Supplier will be able to reopen closed accounts due to unpaid charges only after full payment of amounts owed to all of the user. Reactivate a suspended account takes between 1-12 hours of receiving payments to Avnet IT&C ltd.


Warranty - 30 days money back

Each web hosting customer of Avnet IT&C ltd. has a 30-day warranty. If during this period are not completely satisfied with the quality hosting service you require, and get back money paid in advance. These services are not included in the guarantee of 30 days: fees for registering domain names (national and / or international), fees paid for dedicated servers, reseller services as ordered, and any other fees paid for optional services / other special than the standard offer. If cancellation is due to failure to account ,SPAM, ilegale activity for the customer to these terms and conditions will be no refund. Money back guarantee within 30 days from the order does not apply and will not perform if you use at least 50% of allocated data transfer hosting account that are the subject of the request for reimbursement. If you made a payment in a certain order and can not complete your order in certain cases such as (providing inaccurate data, identification number, name, etc. ..) and do not reach an agreement (the refusal to supply accurate data) there will be no refund made. All fees (banking, online payment, credit card) will be borne by the customer.


Changes

We reserve the right to make additions, cancellations or changes in the Terms and Conditions, our hosting packages, prices and website at any time information is done through the website or customer control panels.


Additional Details

The prices dont contain VAT 19% on site ddos-hosting.ro
Prices listed on the site ddos-hosting.ro(USD) are converted from EURO > USD.
Prices listed on the site ddos-hosting.ro( RO/DE/FR )are converted from EURO > RON .

. Content Policy [v2 04/2017]

[1] Obligations while affiliate Antler

Lorem ipsum, or lipsum as it is sometimes known, is dummy text used in laying out print, graphic or web designs. The passage is attributed to an unknown typesetter in the 15th century who is thought to have scrambled parts of Cicero's De Finibus Bonorum et Malorum for use in a type specimen book. It usually begins with.


[1.1] From its medieval origins to the digital era, learn everything there is to know about the ubiquitous lorem ipsum passage.


[a] Lorem ipsum, or lipsum as it is sometimes known, is dummy text used in laying out print, graphic or web designs. The passage is.


[b] From its medieval origins to the digital era, learn everything there is to know about the ubiquitous lorem ipsum passage.


[2] Advantages of affiliate Antler

Lorem ipsum, or lipsum as it is sometimes known, is dummy text used in laying out print, graphic or web designs. The passage is attributed to an unknown typesetter in the 15th century who is thought to have scrambled parts of Cicero's De Finibus Bonorum et Malorum for use in a type specimen book. It usually begins with


[2.1] From its medieval origins to the digital era, learn everything there is to know about the ubiquitous lorem ipsum passage.