Terms of Service, Privacy Policy, and Acceptable Use Policy

TechnoLogicRepair.com LLC d/b/a Striking Web Solutions (“Striking Web Solutions,” “we,” “us,” or “our”)
Revision / Effective Date: April 24, 2026
Important Email Networking Notice:
Outbound SMTP connectivity is blocked from our hosting networks. Any outgoing email sent from websites, VPS servers,
dedicated servers, public IP rentals, or POS hosting must use a third‑party email relay service
(e.g., Mandrill, SendGrid, Azure Communication Services, Amazon SES, Mailgun, etc.).
Inbound SMTP is permitted, subject to security controls and abuse prevention.

1) Acceptance of Terms

By purchasing, accessing, or using any services provided by Striking Web Solutions (the “Services”), you agree to these Terms of Service (“Terms”) and any policies referenced herein. If you do not agree, do not use the Services.

These Terms are intended to modernize and replace prior versions, including the 08/06/2015 revision, as of the effective date above.

Back to top

2) Services Covered

These Terms apply to all Services offered by us, including (without limitation):

  • Website hosting
  • VPS server rental
  • Dedicated server rental
  • Public IP address rental
  • Hosted Exchange / hosted email services
  • Domain registration and domain-related services
  • Point of sale (POS) hosting
  • Add-ons, licenses, managed services, and professional services

Some Services may be delivered using third‑party providers. Those providers may impose constraints or policies that also apply to you.

Back to top

3) Account, Eligibility & Responsibilities

3.1 Eligibility and Authority

You represent that you are legally able to enter into these Terms and that you have authority to bind the organization you represent.

3.2 Accurate Information

You must provide and maintain accurate account, contact, and billing information, including a valid payment method.

3.3 Account Security

You are responsible for safeguarding passwords, API keys, and credentials (including those for control panels, server access, and DNS). Activity under your account is your responsibility, whether authorized by you or not.

Back to top

4) Acceptable Use Policy (AUP) — Summary

Services may be used for lawful purposes only. Transmission, storage, distribution, or presentation of material in violation of any applicable law is prohibited.

4.1 Examples of Prohibited Content/Activity

  • Copyright infringement, pirated software/media, “warez,” or unauthorized distribution
  • Malware, botnets, phishing, credential theft, exploit kits, hacking tools/archives
  • Threatening, abusive, obscene, or unlawful content
  • Fraud, deceptive practices, or impersonation
  • Network abuse (DDoS, scanning, brute force attempts, exploitation)
  • Operating open relays, open proxies, or anonymous forwarding services

4.2 Enforcement

We may suspend or terminate Services immediately to protect our network, customers, or third parties. We may report illegal activity to appropriate authorities when required or appropriate.

Note: The summary above is a brief overview. Customers must review and comply with the Full Acceptable Use Policy included below.

Back to top

Full Acceptable Use Policy (AUP)

Revision / Effective Date: April 24, 2026

This Acceptable Use Policy (“AUP”) applies to all services provided by TechnoLogicRepair.com LLC d/b/a Striking Web Solutions (“Striking Web Solutions,” “we,” “us,” or “our”), including website hosting, VPS and dedicated servers, public IP rentals, hosted email/Exchange, domain services, and POS hosting (collectively, the “Services”). This AUP supplements the Terms of Service. Capitalized terms not defined here have the meanings set forth in the Terms of Service.

1) Purpose and Scope

The internet is an open forum. To protect customers, network integrity, and third parties, we prohibit uses that are unlawful, harmful, deceptive, or that degrade service reliability. You are responsible for your content, your systems, and your users’ activity.

2) General Rules

  • Lawful use only: Use the Services only for lawful purposes and in compliance with applicable regulations.
  • No harm or disruption: Do not interfere with, degrade, or damage our systems, networks, or other customers.
  • Responsibility: You are responsible for all activity originating from your account and all content you host or transmit.
  • Cooperation: You agree to cooperate with reasonable requests related to security, abuse investigations, and remediation.

3) Prohibited Content and Conduct

The following are prohibited (examples not exhaustive):

  • Illegal activity: Any content or conduct that violates applicable law, including fraud, scams, deceptive practices, or unlawful commerce.
  • Intellectual property infringement: Unauthorized distribution of copyrighted works, counterfeit goods, or other IP violations. See the DMCA / Copyright Policy.
  • Malicious software: Malware, ransomware, spyware, trojans, worms, botnets, or other code intended to harm or gain unauthorized access.
  • Phishing and impersonation: Credential theft, social engineering, spoofing, or impersonating individuals or organizations.
  • Harassment and threats: Unlawful harassment, threats, or intimidation directed at individuals or groups.
  • Privacy violations: Unlawful collection or disclosure of personal data, doxxing, or covert surveillance.

4) Email, Messaging, and Anti-Spam

  • No spam: Sending unsolicited bulk messages or running campaigns that result in excessive complaints, bounces, or blacklistings is prohibited.
  • No open relays/proxies: You may not operate open mail relays or misconfigured services that allow abuse by third parties.
  • Outbound SMTP restriction: Outbound SMTP connectivity is blocked from our hosting networks. Any outbound email sent from applications or servers must use a reputable third‑party relay (Mandrill, SendGrid, Azure Communication Services, etc.) as described in the Terms of Service.
  • Inbound SMTP: Inbound SMTP may be permitted where supported/available, subject to filtering and rate limits.
  • Authentication: Where applicable, you are responsible for proper email authentication practices (e.g., SPF/DKIM/DMARC) and accurate sender identity.

5) Security and Unauthorized Access

You may not attempt to gain unauthorized access to any system, service, account, or network. Prohibited activities include:

  • Port scanning, vulnerability scanning, or reconnaissance targeting systems you do not own or do not have explicit written authorization to test
  • Brute-force attacks, credential stuffing, password spraying, or other attempts to compromise accounts
  • Exploitation of vulnerabilities or distribution of exploit kits
  • Bypassing access controls, security measures, or authentication systems

6) Network Abuse and Service Integrity

  • DDoS and disruption: Denial-of-service attacks, traffic flooding, reflection/amplification attacks, or any activity that disrupts networks or services is prohibited.
  • Abusive traffic: Excessive connections, abusive crawling/scraping, or traffic patterns that degrade performance may be limited, rate‑restricted, or suspended.
  • Scraping / crawling: Automated crawling or scraping must be performed responsibly. You must (a) identify your crawler with an accurate User-Agent and contact information when practical, (b) honor applicable access controls and do not bypass authentication, paywalls, rate limits, CAPTCHAs, robots directives, or other technical measures, (c) comply with website terms and applicable law, and (d) avoid excessive request rates, concurrency, or patterns that degrade service for others. We may rate-limit or block abusive crawlers and may require you to reduce load or move workloads to a dedicated environment.
  • High-volume crawlers: Sustained high-volume crawling (including large-scale indexing, content harvesting, price monitoring, vulnerability reconnaissance, or similar activity) may require prior written approval and may be restricted to specific plans, IPs, schedules, or resource allocations.
  • Tor exit nodes: Operating Tor exit nodes is prohibited unless explicitly approved in writing. Tor exit nodes commonly generate abuse complaints and reputation issues; we may null-route or suspend services associated with exit traffic.
  • VPN / proxy services: Operating public VPNs, open proxies, anonymization services, or proxy networks (including “residential” proxy services) is prohibited unless explicitly approved in writing. If approved, you must implement abuse prevention (authentication, rate limits), logging sufficient to investigate abuse (subject to law), and prompt response to abuse reports. We may revoke approval at any time if complaints, legal risk, or reputation impact occurs.

7) Resource Usage, Streaming, and File Distribution

  • Fair use: You may not consume excessive CPU, memory, disk I/O, or network resources that negatively impacts service quality or stability.
  • Bulk file distribution: Using shared hosting primarily for download repositories or large-scale file distribution may be restricted. Large files/high-volume distribution should use dedicated storage/CDN services.
  • Streaming: Continuous audio/video streaming may be restricted on shared hosting plans. Streaming workloads may require VPS/dedicated resources or third‑party streaming/CDN solutions.
  • Crypto mining: Cryptocurrency mining or similar compute‑intensive workloads are prohibited unless explicitly permitted in writing.
  • Automated crawling workloads: If your site or application performs automated crawling of third-party resources (or if you operate bots that generate heavy traffic), you must design it to be rate-limited and resilient. We may require caching, exponential backoff, queueing, or migration to VPS/dedicated resources.

8) Public IP Address Rental and Reputation

Public IP addresses are rented and may be changed for operational or abuse reasons. You may not use rented IP addresses in ways that cause reputation damage, blacklisting, or upstream provider complaints. Abuse may result in IP reassignment, null routing, or suspension.

9) Domain and DNS Abuse

Using domains or DNS services managed through us for phishing, malware distribution, deceptive redirects, or other abuse is prohibited. We may suspend DNS, lock domains, or disable resolution to mitigate harm or comply with legal process.

10) POS Hosting and Sensitive Environments

POS environments may require stricter access controls and change management. You are responsible for application security and compliance obligations (including PCI‑DSS where applicable). You may not store or transmit sensitive data in violation of applicable standards or law.

11) Monitoring, Enforcement, and Remediation

  • Investigation: We may investigate suspected violations and request information needed to assess risk and compliance.
  • Immediate action: We may suspend, filter, null route, remove content, or terminate Services without notice when necessary to protect our network, customers, or third parties, or to comply with law.
  • Remediation: We may require you to remediate compromised systems, patch vulnerabilities, or remove prohibited content before restoring service.
  • Costs: Time spent responding to abuse, remediation assistance, restores, or other out‑of‑scope work may be billed at professional services rates as described in the Terms of Service.

12) Reporting Violations

To report suspected violations of this AUP, contact support@strikingwebsolutions.com. Provide relevant details (domain/IP, timestamps, logs, and URLs) to help us investigate.

Back to top

4A) DMCA / Copyright Policy

We respect intellectual property rights and respond to valid notices of alleged copyright infringement in accordance with applicable law, including the Digital Millennium Copyright Act (DMCA) where applicable.

4A.1 Takedown Notices

If you believe content hosted on our Services infringes your copyright, please send a written notice that includes (as applicable):

  • Identification of the copyrighted work claimed to be infringed
  • Identification of the allegedly infringing material and information reasonably sufficient to locate it (URL(s), screenshots, etc.)
  • Your contact information (name, address, telephone number, and email)
  • A statement that you have a good-faith belief that the use is not authorized by the copyright owner, its agent, or the law
  • A statement, under penalty of perjury, that the information in the notice is accurate and that you are the copyright owner or authorized to act on their behalf
  • Your physical or electronic signature

4A.2 Designated Agent

Send DMCA notices to our designated agent at: support@strikingwebsolutions.com. You may include “DMCA Notice” in the subject line to help route your request.

4A.3 Counter-Notification

If you believe material was removed or disabled by mistake or misidentification, you may submit a counter-notification. Counter-notifications should include your contact information, identification of the removed material and its prior location, a statement under penalty of perjury that you have a good-faith belief the material was removed by mistake, consent to jurisdiction where applicable, and your signature.

4A.4 Repeat Infringers

We may terminate accounts of repeat infringers and may disable access to material alleged to be infringing, without prior notice where necessary to comply with law or protect our Services.

Back to top

5) Email / SMTP Policy

5.1 Outbound SMTP Block

Outbound SMTP connectivity is blocked from our hosting networks (including website hosting, VPS, dedicated servers, POS hosting, and IP rentals) to reduce abuse and protect network reputation. This may include ports such as 25, 465, and 587 and other delivery methods we deem equivalent.

5.2 Required Use of a Third‑Party Relay

Any outgoing email generated by applications or servers hosted with us must use a reputable third‑party email relay service (e.g., Mandrill, SendGrid, Azure Communication Services, Amazon SES, Mailgun), or another provider approved by us in writing.

5.3 Inbound SMTP

Inbound SMTP is permitted where supported/available, subject to filtering, rate limits, and anti‑abuse controls.

5.4 Anti‑Spam

Spam, unsolicited bulk messaging, or activity resulting in blacklisting or abuse complaints is prohibited and may result in immediate suspension/termination.

Back to top

6) Security & Incident Response

6.1 Your Responsibilities

You are responsible for securing your applications and systems (patching, access controls, MFA where available, backups, secure coding). Unless you purchase managed services, you administer your VPS/dedicated server(s).

6.2 Compromise and Malware

If we reasonably suspect compromise, malware, phishing, crypto-mining, or harmful activity, we may suspend networking or the Service immediately to mitigate harm. Restoration may require remediation and proof of cleanup.

Back to top

7) Resource Use, Traffic & Network

7.1 Bandwidth / Traffic

Plans may include predefined traffic/bandwidth allowances. Unless otherwise stated in your plan/order, overage is billed at $1.00 per GB exceeded and may be rounded up.

7.2 Prohibited Network Uses

IRC/IRC bots are not permitted unless explicitly authorized. DDoS, scanning, brute force attempts, and open proxy/relay operation are prohibited.

7.3 Fair Use & Stability

We may impose limits or require upgrades if usage threatens stability or negatively impacts others.

Back to top

8) Public IP Address Rental

Public IP addresses are provided on a rental basis, subject to availability and upstream requirements. We may change assigned IPs for operational, routing, security, or abuse reasons.

You are responsible for reputation and proper use of rented IPs. Abuse may result in null routing, reassignment, or Service suspension.

Back to top

9) VPS & Dedicated Server Rental

9.1 Administration

Unless covered by a managed services agreement, you are responsible for system administration, patching, and security for VPS/dedicated servers.

9.2 Maintenance

We may perform scheduled or emergency maintenance, including reboots. We will provide notice when practical.

9.3 Acceptable Use

VPS and dedicated servers must comply with the AUP, including restrictions on abuse, illegal content, and prohibited network activity.

Back to top

10) Point of Sale (POS) Hosting

POS hosting may include additional security restrictions, change controls, and network limitations. You are responsible for POS software licensing, configuration, and compliance requirements (including PCI‑DSS where applicable). We do not represent that any configuration is PCI compliant unless expressly agreed in writing.

Back to top

11) Hosted Exchange / Hosted Email

Hosted email services may include mailbox hosting, web access, synchronization, filtering, and related features based on your plan. Use of hosted email must comply with the AUP and anti‑spam rules.

Retention, archiving, and recovery depend on your plan. Unless you purchase a specific backup/archiving service, we do not guarantee indefinite retention of deleted items.

Back to top

12) Domain Registration

Domain registration services are subject to registry, registrar, and (where applicable) ICANN policies. You must provide accurate registrant information and keep it updated.

Domains may auto‑renew if enabled and a valid payment method is on file. We are not responsible for domain loss due to non‑payment, outdated contact information, missed notices, or registry actions.

Back to top

13) Billing, Subscriptions & Recurring Payments

13.1 Recurring Charges & Auto‑Renewal

Most Services are sold as subscriptions (monthly/quarterly/annual). By ordering, you authorize us to charge your payment method on a recurring basis at each renewal, including applicable taxes and fees, until you cancel.

13.2 Payment Failure

If a charge fails, we may retry, request updated payment details, and/or suspend Services. You remain responsible for all amounts owed.

13.3 Invoices

We may deliver invoices electronically (email/portal). Electronic delivery satisfies notice requirements where permitted by law.

13.4 Fees

Setup/provisioning/migration fees, third‑party license costs, and overages are billed as described in your order form or invoice and are generally non‑refundable.

Back to top

13A) Professional Services & Out-of-Scope Support

Basic support is limited to issues directly related to the operation and availability of our Services (for example: service provisioning, platform availability, and account/billing questions). Requests that are outside normal support scope may be treated as professional services and billed accordingly.

13A.1 Examples of Out-of-Scope Support

Examples (not exhaustive) include: application debugging, website code changes, database tuning, malware cleanup on customer-managed systems, custom email deliverability troubleshooting, third-party software configuration, migrations not included in your plan, custom firewalling, and performance optimization beyond standard platform operations.

13A.2 Rates and Billing

Out-of-scope work may be billed at professional labor rates starting at $150 per hour, and may increase based on the skill set required to resolve the issue (e.g., senior systems, security, database, or application engineering). Where permitted, work may be billed in minimum increments and/or include a minimum charge. We may require written approval, a deposit, or an active payment method on file before commencing out-of-scope work.

13A.3 No Guarantee

Professional services are provided on a reasonable-efforts basis and do not guarantee a specific outcome, especially where third-party systems, software, code, or conditions outside our control are involved.

Back to top

14) Suspension, Termination & Data Deletion

14.1 Suspension for Non‑Payment

Services not paid by the due date may be suspended. Suspension may result in loss of public access, administrative access, and functionality.

14.2 Data Deletion

After 30 days of non‑payment, we may permanently delete data associated with the suspended Services. Deletion may be irreversible.

14.3 Reactivation

Reactivation may require payment of all past‑due balances and a reasonable reactivation fee based on work required.

Back to top

15) Refunds & Cancellations

Unless required by law or expressly stated in writing, we do not provide refunds for:

  • Partial periods or unused time
  • Setup/provisioning/migration fees
  • Domain registrations/renewals/redemptions/transfers
  • SSL certificates, third‑party licenses, add‑ons, or overage charges

Unless otherwise stated in your plan/order, cancellation requests must be submitted at least 30 days before the next renewal to avoid the next recurring charge.

Back to top

15A) Backups, Data Responsibility & Restore Fees

15A.1 Customer Responsibility

You are solely responsible for maintaining current backups of your content and data (including websites, databases, server configurations, email, and application data), unless you have purchased a managed backup service that explicitly states scope and retention in writing.

15A.2 Convenience Backups (No Warranty)

If we provide backups or snapshots as a convenience, they are provided on an “as available” basis and are not guaranteed to be complete, current, or restorable. We do not guarantee any specific backup schedule or retention unless explicitly contracted.

15A.3 Restore Requests and Fees

Restores, recovery assistance, or data extraction may require professional labor. Unless otherwise stated in your plan or a written agreement, restore requests and recovery work may be billed at our professional services rates (see Section 13A), plus any applicable third-party or media costs. We may require advance payment before performing restoration work.

15A.4 Suspension/Termination Impact

Suspension or termination for non-payment or policy violations may affect data availability. After deletion/purge timelines described in these Terms, data may be irretrievable.

Back to top

16) Uptime Guarantee (99.9%) & Service Credits

We guarantee 99.9% uptime per calendar month for eligible Services, excluding scheduled maintenance and events outside our reasonable control (including upstream provider outages, internet routing issues, and force majeure events).

16.1 Service Credits

If we fail to meet 99.9% uptime for an eligible Service in a calendar month, you may request a prorated service credit for the affected Service. Credits apply to future invoices and are not cash refunds. Requests must be submitted within 30 days after the month of the outage.

This section states your exclusive remedy for service availability issues.

Back to top

17) Limitation of Liability

To the maximum extent permitted by law, we are not liable for indirect, incidental, special, consequential, exemplary, or punitive damages (including lost profits, revenue, data, goodwill, or business opportunities), even if advised of the possibility.

Our total liability for any claim will not exceed the amounts you paid for the affected Service during the three (3) months immediately preceding the event giving rise to the claim.

Back to top

18) Indemnification

You agree to defend, indemnify, and hold harmless Striking Web Solutions and its owners, employees, contractors, and agents from any claims, liabilities, damages, losses, and expenses (including reasonable attorneys’ fees) arising out of or related to your use of the Services, your content, or your violation of these Terms or applicable law.

Back to top

19) Changes to Terms & Pricing

We may update these Terms, policies, Services, and pricing from time to time. If changes are material, we will provide notice by posting an updated version with a revised effective date and/or via the customer portal or email. Continued use of the Services after the effective date constitutes acceptance.

Back to top

20) Notices & Contact

Support / AUP Violations: support@strikingwebsolutions.com

Legal notice: This document is provided as a general template and does not constitute legal advice. Consult qualified counsel to ensure compliance with applicable laws and industry regulations.

Back to top