Web Hosting Service Level Agreement (SLA)
THIS AGREEMENT is made and entered between Buzinessware FZCO, hereinafter referred to as Buzinessware and the Customer, who wishes to use the services of Buzinessware NOW, THEREFORE, in consideration of the foregoing premises and the mutual covenants hereinafter set forth, the parties hereto agree as follows:
1. Service Description: As a World Wide Web service provider, Buzinessware provides shared Webhosting service on dedicated server computers which are integrated into the Internet. These server computers shall send and receive information in relationship to the World Wide Web. Customer wishes to connect to the World Wide Web utilizing the hardware and software resources of Buzinessware to establish an Internet web presence on one of Buzinessware's server computers.
2. Conditions: The application and this Agreement constitute a binding contract between Buzinessware and the Customer and do not extend to any other person or entity. Customer may resell to third parties but is responsible for third party activities and content and is bound by the terms under this Agreement. Cancellations after the application is received and web space is set-up will still hold the Customer responsible for costs incurred by Buzinessware concerning the set-up of the web space.
3. Warranties: With respect to the service to be provided herein, the Customer acknowledges that Buzinessware makes absolutely no warranties whatsoever express or implied. As a result, the Customer agrees that Buzinessware shall not be liable to the Customer for any claims or damages which may be suffered by the Customer, including, but not limited to, losses or damages resulting from the loss of data as the result of delays, non-deliveries, or service interruptions.
4. Information: The utilization of any data or information received by the Customer from the utilization of the service to be provided by Buzinessware is at the Customer's sole and absolute risk. Buzinessware specifically disclaims and denies any responsibility for the completeness, accuracy or quality of information obtained through the services to be provided hereby. Domain Name: If Buzinessware shall acquire an Internet Domain Name on behalf of the Customer, then in such case the Customer hereby waives any and all claims which it may have against Buzinessware for any loss, damage, claim or expense arising out of or in relation to the registration of such Domain Name in any on-line or off-line network directories, membership lists or registration lists, or the release of the Domain Name from such directories or lists following the termination of the providing of this service by Buzinessware for any reason.
5. Indemnification: The Customer shall indemnify and hold harmless Buzinessware from all loss, cost, expense, and damages on account of any and all manner of claims, demands, actions, and proceedings that may be initiated against Buzinessware on the grounds that the web space content violates any copyright, proprietary right of any person, state and federal regulations, or contains any matter that is libelous or scandalous.
6. Changes in Terms of Agreement: Buzinessware reserves the right to make changes to the terms and conditions of this Agreement upon thirty (30) days' notice to the Customer, advising of the change and the effective date thereof, but with changes in service fees being effective only at the end of any period for which the Customer has prepaid. Utilization of the service by the Customer following the effective date of such change shall constitute acceptance by the Customer of such change(s).
7. Entire Agreement and Understanding: This instrument and the application for web space constitute the entire agreement between the parties and represent the complete and entire understanding of the parties with respect to the subject matter of this Agreement.
8. Resource Usage Policy:
Based on the prevailing industry standards, all our hosting related products were packaged around the Disk Space and Bandwidth specifications. The practice continues even in 2015. The technology has undergone a sea change with better and powerful CPUs, Cheaper and higher RAM and larger storage devices. On the software side too, the contents have steadily moved to web 2.0 and web 3.0 platforms. Dynamically generated web sites, engaging flash graphics & movies, content fetching in background like RSS, quotes, tweets etc etc, demand availability of other resources like CPU power, RAM allocations, Database overheads etc etc. It is very difficult for the customers to specify such requirements in advance. As the sites grow, so is the need of higher resources till the customer reaches a limit on the shared environment. If one customer uses more resources on a shared server, the other customer's sites / accounts are affected. We enforce following resource limits on all our shared servers. If your needs are not met, please do not sign-up the regular hosting account. Talk to our sales or business development team to customize services for you. These resource usage limits are applicable to all web hosting (Includes "Web Hosting / Business Email/ Reseller") accounts. These are not applicable to the dedicated / cloud servers. These policies are in place to protect you, our customers, from poor service quality.
8.1 CPU Usage:
Whether a web page is static or dynamically constructed, the web server's CPU is used to obtain and deliver the web page to your visitors. When a page is dynamically created by a script, even more CPU cycles or resources are used, since the script has done a fair amount of processing to reconstruct your web page. It must load the web template, obtain the data for that specific page from the database, execute the plugins or modules that you have installed, and finally assemble the page for delivery to the visitor.
Since CPU time is a finite resource shared by all websites hosted on a web server, if any one website excessively uses the CPU, the other sites on that computer will not have an opportunity to deliver their pages in a timely fashion and will appear either to be sluggish or non-responsive. As such, we monitor the amount of CPU your site uses on shared web hosting plans, to prevent problems when a single website uses too much of the CPU time, adversely affecting the other websites on that server.
8.2 RAM Usage:
RAM is the temporary memory that holds your site's scripts and their data while they execute. The maximum amount of RAM a machine can have, is fixed. That amount of RAM is shared by all accounts on those servers. This memory is needed by all programs that is run on the server, including the server itself. If your scripts are huge, or they require a lot of RAM to execute, they will be competing in that limited pool of memory shared by all sites and all programs. As such, memory usage is another resource which is limited too.
8.3 Database Connections:
The data for dynamic websites is usually kept in special databases on the web server. A database server, such as the popular MS SQL / MySQL server, manages the database and provides the information requested by the site's scripts when they need it.
Database servers have a limit on the number of connections they can accept at any one time. When too many requests for data are made simultaneously, they run out of resources and are unable to service those requests. This typically happens when your site receives a large amount of traffic, or when you use a script that is not very efficient (for example, it makes too many requests for every page it delivers), or both.
8.4 File System Contents:
Depending on the format type used for the storage disks, there could be limitations on number sub-directories and files within a directory. All the files must have proper permissions.
8.5 Resource Usage Restrictions:
8.5.1 CPU, RAM and Processes:
CPU usage, RAM usage and Processes invoked by your account, cron or any other method should not exceed the following limitations:
1. Utilize 25% or more of CPU usage for more than 90 Seconds.
2. Consumes more than 32 MB of RAM for more than 120 Seconds.
3. Number of open files should not exceed 64.
4. Create core dumps.
5. Number of simultaneous processes should not exceed 5.
6. Execute a script/binary that forks in a way to create a fork bomb.
7. Programs may not run in the background or listen on a network port. Running bot, service or daemon in the background is not allowed.
8.5.2 Database Restrictions:
1. Database is to be used only for the hosting account on the same server.
2. Indexes must be used in databases.
3. MySQL tuning parameters cannot be modified by users.
4. All users are restricted to 15 concurrent MySQL connections.
5. Each database is restricted to a maximum of 1 GB of disk space.
6. Database queries should not exceed 1,000 per hour.
7. Database changes (insert/update/delete) should not exceed 300 queries per hour.
8. Database servers should not be used as a hosted solution.
9. Remote database access is for administrative purposes only.
8.5.3 Files and Directories:
The total number of inodes in an account may not exceed 75,000. Every file (a web page, image, email, php file, directory, etc.) on your account uses up one (1) inode. This is not something we actively enforce, and it will only become an issue if a client is causing problems for other people on the server. We will of course notify you if this is the case with a full explanation.
A directory cannot contain more than 2,500 immediate child files. This includes sub-directories themselves but does not include files contained within those directories.
1. Hosting accounts are to be used for the purposes of hosting web sites - they are not to be used to back up content from remote computers or as a general-purpose file storage system.
2. All third-party web applications that you install must be kept up-to-date.
3. Accounts will be suspended if any unpatched or buggy web applications are actively being exploited.
4. Simultaneous Apache connections may not exceed 50 from one individual source at any given time.
5. Web processes should not fork or spawn sub-processes.
6. No Running a gaming server.
7. No Running a proxy server or anonymizer, either publicly accessible or password protected.
8. No Web spiders and indexers.
8.5.5 Email and Mailing Lists:
1. Attachment Files more than 10mb are not accepted for delivery.
2. Mailbox sizes are restricted to 1GB
3. POP / IMAP connections are limited based on the classification of the mail servers. Please know your allocations at the time of signing up the account.
4. Mail delivery times are not guaranteed. Based on the network congestion, recipient mail server configurations and responses, mails may get delayed, bounced or even discarded & lost at times.
5. Mailing lists larger than 1,500 will require a semi dedicated, VPS, or dedicated server. Dividing one list into smaller parts to get around this limit is not allowed.
6. We do not allow you to send to a mailing list you were given or that you bought. This is spamming, and we have zero tolerance for this.
7. Any mailing list must comply with the rules set forth by the United States of America and can be found at: https://www.ftc.gov/tips-advice/business-center/guidance/can-spam-act-compliance-guide-business
8. No Direct SMTP mailing system scripts or mail servers are permitted. Mail should be relayed through the local MTA. Rate Limits on number of emails per hour that can be sent through our servers will apply.
9. Any emails sent to a mailing list must contain an unsubscribe link to an automated email removal system. This system must not be behind password protection.
10. Our SMTP gateway is to be used only for the domain you have signed up the account for. All from addresses must be from your domain name for sending outbound mails. Any other smtp tweaking to use our SMTP service is not permitted.
11. If your email account is exploited by spammers, your account will be suspended without any notice.
12. If your local network is infected and sends spam mails, your account will be suspended without any notice.
8.5.6. Cron Jobs:
1. All cron jobs must be "niced" to 15 or greater.
2. A cron job should not execute more frequently than once every 15 minutes.
3. If a cron usage exceeds the CPU resource limits, the account will be suspended.
9. Yearly uptime percentage and credits
All calculations are based on effective uptime%. Therefore, scheduled maintenance and reboots after patching/kernel upgrade will not be considered as downtime. Service Credits are calculated as a percentage of the total charges paid by you.
|Less than 99.9% but equal to or greater than 98.0%||2.5%|
|Less than 98.0% but equal to or greater than 95.0%||5.0%|
|Less than 95.0% but equal to or greater than 90.0%||7.5%|
|Less than 90.0% but equal to or greater than 85.0%||10.0%|
|Less than 85.0%||1 Month Free|
10. Notification to Customers:
We may work with the customers to bring to their notice about the resource exceeding incidents. If it is transient, not lasting one day, our engineers will work with you to guide you to resolve the problems. If it is non-transient, it is a good sign for the customer that their online business and requirement is growing. We will do our best to work with customers to give 48 hours, 2 days, or 5 days' notice depending on the severity of the violation. We reserve the right as outlined in the AUP to suspend a site if it is causing a severe problem.
11. Failure to Comply with Policy:
Failure to fully comply with these terms is grounds for account suspension and/or termination without a refund. We reserve the right to remove any account without prior notice. If we terminate your account for violating policy, you will forfeit your rights to a refund.
12. SLA Exclusions
This SLA and any applicable Service Levels do not apply to any performance or availability issues:
i. that result from a suspension due to violation of Terms of Service (https://www.buzinessware.com/terms-of-service.html).
ii. occurred due to factors outside our reasonable control (for example: natural disaster, war, acts of terrorism, riots, government action, or a network or device failure external to our data centers, including at your site or between your site and our data center)
iii. that result from your unauthorized action or lack of action when required, or from your employees, agents, contractors, or vendors, or anyone gaining access to our network by means of your passwords or equipment, or otherwise resulting from your failure to follow appropriate security practices
iv. that result from your equipment, software or other technology and/or third-party equipment, software or other technology (other than third party equipment within our direct control)
v. caused by your use of an obsolete Service even after we advised you to modify/upgrade.
vi. that result from faulty input, instructions, or arguments (for example, requests to access files that do not exist)