Request a quote

User Policy

The policy is intended for NTPL products and services with the goal of protecting subsidiaries, affiliates, employees and customers. This policy applies to the use of all products, websites, copyrights and services owned or operated by NTPL, as well as all the data sent, transferred, received, stored, or accessed in NTPL network. Other products or services offered by NTPL may have additional terms and conditions that govern over this policy in the case of other inconsistencies.

This policy and the following prohibited activities below is an integral part of your hosting agreements with NTPL. Our services are specifically for the lawful use of NTPL internal & external customers. If NTPL finds any one violating the below prohibited activities of our services, he/she may be subject to suspension and/or removal from NTPL network. This policy is a non-exclusive list of actions prohibited by NTPL. NTPL reserves the right to modify these policies at any given time, changes become effective immediately. The policy is formulated in compliance with the Indian Government hosting, networking & IT policies.

Privacy & Security

NTPL will not part any customer information with any of its sub contractor. In case of parting such information from any of its employee / customer, NTPL can take any legal action against such individual. Even on demand from any customer for such data, NTPL has right to suppress the material fact except in the case of government authority for the statutory obligation.

NTPL does not provide system administrators or security advisors to aid customer in the security of their server. It is the sole responsibility of the customer to properly secure their servers. NTPL assumes no legal liability for the actions or data created, or posted by its customers. Each customer is responsible for all data transmitted or received by, to or through NTPL services. NTPL will co-operate with law enforcement on any criminal or suspected criminal acts by means which NTPL may deem necessary including but not limited to handing over personal information, data or hardware to aid law enforcement with their investigations. Law officials may request NTPL to provide information regarding such issues. NTPL reserves the right to comply with this request.

This User Policy has been formulated with the following goals in mind:

Ensure the security, reliability and privacy of NTPL network, systems, solutions and services
Preserve the value of the Internet as a resource for information and free expressionable area
Preserve the privacy and security of NTPL customers and other Internet users
Discourage irresponsible practices which degrade the usability of network resources and thus the value of Internet services
Avoid situations that may cause NTPL to incur legal liability
Maintain the image and reputation of NTPL as a responsible provider
If customer or any employee of the customer has shared the server password, email password or any secret information which are required to maintain

its confidentiality, in such cases NTPL will not be responsible for any loss of the data, information arising out of such disclosure

NTPL operates under a strict "No Spam" policy. The sending of any unsolicited e-mail advertising messages from, to or through NTPL services may result in the imposition of civil liability against the sender, in accordance with Indian Government Copyright Act or act which restrict the service provider from circulation of the harmful / provocative material / literature which increase any kind of tension between cast / creed as prescribed by the publication law (under The Publication Act). A copy of such act may be obtained on-line from site. NTPL reserves the right to check all known commercial and public databases for information regarding prior history of unsolicited mail sending, blacklisting and may choose to deny or terminate services based on this information. Individuals identified as violating any of the law as mentioned here. Such customer will be denied for the services immediately. NTPL receives feedback from other large ISP’s such as Reliance, TATA, BSNL about spam their customers report and may consider there suggestions for the restricting such users.

Spam - To protect outside sources, NTPL had solicited Bulk E-mailers they are required to remove complaints by methods including but not limited to creating any no-mail list. NTPL respects the Can Spam Act; however you as a customer it is essential to follow a stricter Double Opt-In policy as well as having an opt-out for all e-mails. Bulk e-mailers may be required to provide the complete opt-in information as well as provide proof of previous business relationships with the recipients.

You may not make postings of advertise on a website, e-mail account, other services provided by or through NTPL, to any newsgroup whose charter does not specifically allow such advertisements. You may not send unsolicited bulk e-mail (UBE) or post advertisements to NTPL or through NTPL network or any other services. You may not host "spam-friendly" websites, including spam software sites. You may not send UBE which advertises a website, e-mail account or other service provided by or through NTPL. You may not send e-mail to any person who does not wish to receive it. If a recipient asks to stop receiving e-mail, the customer must immediately and permanently cease to send that individual any further e-mail.

1. E-Mail Spam / Unsolicited Bulk E-Mail (UBE) / Unsolicited Commercial E-Mail (UCE) - Use of services

To send e-mails to users in a pre-generated list or self created list. Unsolicited Bulk / Commercial e-mails are sent to users that do not wish to receive the e-mail notification of products you wish to sell or advertise.

Mobile Phone Spam - Use of e-mail services to send unsolicited text messages advertising a product or website
Forum Spam - Use of e-mail services to advertise or post on forum content related to a product you wish to sell
Newsgroup Spam - Use of e-mail services to advertise or commit forgery through the use of newsgroups
Blank Spam - Use of e-mail services to E-mails containing no subject or content. Commonly used as a harvesting tactics designed to find valid e-mail addresses

2. E-mail Address Harvesting

Use of NTPL services to obtain or create unconfirmed mailing lists with the intention of selling, distributing or spamming is strictly forbidden.

Spam Bots A script or program that searches human readable text for e-mail addresses and collects them in e-mail lists
E-mail List Gathering Programs - Other scripts or programs that are used for gathering e-mail address from varying sources

3. Spamvertising

Sending spam with content advertising websites, or containing IPs that are on NTPL services, or sending spam from NTPL services advertising web content outside of NTPL networks is prohibited.

4. VoIP Spam

VoIP Spam is defined as unwanted automatically-dialed prerecorded phone calls using VoIP. This is considered by NTPL to fall into the same category as E-Mail Spam and as such is not permitted on our network.

Harmful Materials

Use and access to NTPL services is for lawful use only and it is the responsibility of the customer to use their best judgment of what is acceptable material. Using NTPL network, services, or systems to store or send content which is illegal according to the laws of India or any International treaties restricted by the land of law, is not permitted for any reason. You may not display, transmit, advertise, distribute or sell harmful materials. You may not store or send any material deemed either illegal or inappropriate from NTPL networks, including but not limited to child pornography.

Material Harmful to Minors - Images depicting persons under the age of 18 engaging in unlawful sexual acts, Pornographic materials viewable by persons under the age of 18 without proof of age.
Obscene Content - E-mails, messages, phone messages or any such posts with content that is threatening or harassing any other individual harassment, whether through content, frequency, or size using e-mail or Usenet messages.
Destructive Programs - Software or hardware containing programs such as Viruses, Worms, Trojans or other malicious programs with intent of causing
harm to an individual's computer or server.

Copyrighted Materials

NTPL expressly forbids the use of copyright materials without written permission from the owner of that material/s. NTPL follows all rules and regulations set forth by the TRIA, Indian IT Policy and Indian Hosting Act. You may not engage in an attempt to infringe, store or send any material deemed either illegal or inappropriate for NTPL networks, including but not limited copyrighted images, software or music.

Copyright Infringement - Advertising, selling, distributing, or marketing material that infringes a copyright, trademark, or any other proprietary right to any intellectual property including but not limited to photographs, trade secrets, and/or property.

Fraudulent Materials

NTPL compels that all customers provide accurate information regarding name, address and a working phone number to identify each customer. You may not use NTPL services to impersonate another individual by altering source, IP addresses information or forging E-mail / Usenet headers or other identifying information. You may not make any attempt to fraudulently conceal, forge or otherwise falsify one's identity in connection with use of the NTPL services. The customers must not utilize NTPL services to distribute fraudulent materials to others.

Fraudulent Activities

Attempting to buy or sell products or services, or offering fraudulent goods, services, or promotions.

Forwarding or otherwise propagating chain letters or "e-mail hoaxes," whether or not the recipient wishes to receive them, unless such propagation is both solicited and in the clear context of debunking or discrediting chain letters/hoaxes.
Forgery or Disguising Your Identity
Falsifying or modifying data to fraudulently disguise you as someone else with the intention of deceiving another user, including but not limited to forging e-mail Headers or e-mail.
Transmitting any electronic communication, including e-mail, using the name or address of another person or organization for purposes of deception. Impersonating another individual by altering source IP address information, forging e-mail/Usenet headers or other identifying information.


Phishing Materials

The use of NTPL services to gather personal information about victims of phishing is strictly forbidden. You may not perpetrate, engage in or take part in the use of phishing scams. Including but not limited to impersonating another individual by altering source IP address information, forging e-mail headers or other identifying information.

Phishing Scams - Including but not limited to sending e-mails with links to bogus websites that look similar to actual sites, or sending e-mails about you impersonating a representative of PayPal, Ebay or Bank Employee with the intention of acquiring personal information such as credit card information, Social Security Number, Personal E-Mails, Home Addresses, etc. in response to such mail if any loss like financial, material, data to individual / organization occurs out of any such act, NTPL will not be responsible for the such act.

Hacking

Use of NTPL services to perform attacks on other servers or computers outside of or within the NTPL premises is strictly forbidden. Use of the service to breach or access a person's server, computer or software with the intent of gaining access to or destruction of data without that person's permission or consent. You may not intercept or attempt to intercept, through any kind of method, network traffic intended for other customers. You may not use or store any type of software which is designed to, or is likely to, abuse or negatively impact internet service, including but not limited to, port scanners, hacking tools, ping flooding programs, security/root exploits, packet sniffers and spam softwares. Denial of service, including, but not limited to, any form of internet packet flooding, packet corruption or abusive attack intended to impact the proper functioning of any party's internet servers or services are forbidden.

Net Scanning - Use of services to search outside networks for open firewalls or server ports in an attempt to exploit vulnerability or weakness in the device


SSH attacks / Brute Force attack / Dictionary Attack - Using the services to engage in an attack on a separate entities server or computer with an unlawful script or program that attempts to guess a users credentials


DDos/Dos Attacks - An attack on a person's network, server or computer that creates multiple requests repetitively in an attempt to slow down or crash that person's network connectivity


Ping/Syn Floods - An attack that creates multiple echo requests and sends them to its target repeatedly in an attempt to slow down or crash the targets network connectivity


Proxy

NTPL services do not allow others to openly relay e-mail or services through your servers. You may not allow the use of another party's electronic mail server to relay e-mail without express permission from NTPL. Running proxy servers such as squid or BNC unless they are available only to users whose verified contact information is known by the proxy operator and can be disclosed to NTPL or law enforcement authorities upon request. All usage of such services must be brought to the attention of the NTPL security team and cleared by the Security Manager before you begin running such services.

Mail Proxy - Use of NTPL services to run any kind of Mail Proxy is not permitted.
Open Mail Proxy - A server that has been set up to allow any user to relay mail through it
Secure Mail Proxy - A server that has been set up to only allow specific users to relay their mail through it
Web Proxy - A server that allows users to forward requests to other servers in known as web proxy. NTPL may allow certain proxy servers at their own discretion and under separate terms.
Open Mail Proxy - A server that has been set up to allow any user to relay mail through it
Secure Mail Proxy - A server that has been set up to only allow specific users to relay their mail through it