Wishosting can suspend any service provided with or without a refund or notification for any reason. Wishosting can change the Terms of Service at any time without client notification.
Terms of Usage
All VPSs are subject to the fair usage policy. This implies CPU/disk/network usage. You are allowed to burst 100% usage of allocated resources for no longer than 10 minutes in 2 hours period. If your CPU/Network/IO load is constant, it shouldn't exceed 15% of allocated resources. KVM line has unlimited CPU usage policy if you use one VM per package. Wishosting has the right to limit or suspend your service in case we believe your VPS is above its allowed usage.
Wishosting services are unmanaged. It means we do provide support for the following area only:
1) Network problems
2) OS Installation problems
Our support does not help with software configuration issues and so on.
Wishosting verifies client information before accepting the orders. If the verification procedure does not pass, your order will be cancelled. If you intentionally created an account with false information, it will be suspended. If your order was cancelled due to verification problem, you may submit your proof of ID and/or address. It will be manually checked and if the information matches with information in our system, your order will be processed.
Each client may have only one account with Wishosting. Permission to create additional accounts must be requested via ticket prior to ordering. All related accounts may be suspended and/or terminated if permission has not been requested before creating more than one.
It is required to respond to abuse reports within 12 hours. In another case, your account will be suspended.
Wishosting does not take backups of client VPS data. Customers are fully responsible for backups of their data in case of data loss. Thus customers are encouraged to do regular backups of their data.
The following list contains the software and content that is prohibited on our servers:
1) Proxies or VPNs that are not for personal usage
2) TOR nodes
3) Cryptominers (except V-Dedicated packages)
4) IRC bouncers
5) Port scanners
6) Adult content