Abuse Handling Policy
1. Purpose
- This policy outlines The Chosen Host’s procedures for addressing abuse reports related to its web hosting services. We aim to maintain a safe and secure online environment while respecting users’ rights and complying with Indian law, including the Information Technology Act, 2000.
2. Scope
- This policy applies to all users of The Chosen Host’s web hosting services and anyone reporting potential abuse.
3. Types of Abuse
Abuse covered by this policy includes, but is not limited to:
- Malware Distribution: Hosting websites or content that distribute malicious software.
- Phishing and Malware: Hosting content designed to deceive users or gain unauthorized access to their information, including phishing scams and malware.
- Spam and Unsolicited Commercial Email (UCE): Sending unsolicited commercial email (“spam”) or using our servers to distribute spam.
- Infringing Content: Hosting content that infringes on the intellectual property rights of others, including (but not limited to) copyrighted material, trademarks, and patents.
- Child Sexual Abuse Material (CSAM): Hosting, distributing, or accessing material depicting child sexual abuse.
- Hate Speech: Content that incites violence, hatred, or discrimination based on race, religion, ethnicity, sexual orientation, gender identity, or other protected characteristics.
- Defamation: Making false and damaging statements about an individual or organization.
- Harassment: Engaging in a pattern of conduct that causes emotional distress or fear of bodily harm.
- Illegal Activities: Using hosting services for activities that violate Indian laws.
- Network Attacks: Engaging in activities that threaten the security or stability of our network or the network of others, including denial-of-service attacks, port scans, and network infiltration attempts.
- Data Breaches: Failing to implement appropriate security measures to protect user data and notifying us promptly of any data breaches.
- GDPR Violations: Processing user data in violation of the General Data Protection Regulation (GDPR).
4. Reporting Abuse
Reporting Mechanisms: Users can report abuse via:
Reporting Information: Reports should include:
- Description of the abuse
- URLs or IP addresses involved
- Relevant logs or screenshots
- Contact information of the reporter (optional, for follow-up as needed)
5. Response Procedure
- Acknowledgement: The Chosen Host will acknowledge receipt of abuse reports within a reasonable timeframe (e.g., 24 hours).
- Investigation: The Chosen Host will promptly investigate abuse reports, taking into consideration relevant technical data, legal requirements, and user privacy.
- Action: Appropriate actions may include:
- Content removal
- Account suspension/termination
- Cooperation with law enforcement agencies
- Notification to affected parties
- Timeframe: The Chosen Host strives to resolve abuse reports as quickly as possible, considering the nature and severity of the alleged abuse.
- False Reports: Knowingly false abuse reports may result in action against the reporter.
6. Collaboration with Law Enforcement
- The Chosen Host will cooperate with Indian law enforcement agencies investigating criminal activity related to its services, in compliance with applicable laws and procedures.
7. Protection of User Rights
- The Chosen Host respects user privacy and freedom of expression. Actions will be taken only as necessary to address substantiated abuse and uphold legal obligations.
8. Transparency
- The Chosen Host may publish periodic reports on abuse trends and actions taken, subject to privacy considerations.
9. User Education
- The Chosen Host may provide resources and guidance to help users understand and prevent abusive activities.
10. Review and Updates
- The Chosen Host will regularly review and update this policy as needed to reflect evolving best practices and legal requirements.