Legal
Anyone who publishes material and information accessible through MysticDev LLC's network is fully responsible for the content of such materials. MysticDev LLC does not accept responsibility for content published by others that is accessible through the MysticDev Network, nor does it accept responsibility for any laws violated resulting from such publication or distribution. MysticDev LLC exercises no control over the content of information passing through its network and makes no guarantee and assumes no liability for the security of data on any server. Please remember that NO computer system should be considered safe from intrusion.
You expressly indemnify MysticDev, LLC, including its employees, assignees, agents, managers or directors, and hold MysticDev, LLC blameless for any matters arising out of material, information or content published by you, including events where MysticDev, LLC must remove such user-generated content for the purposes of complying with local or foreign law.
1.1 — Resource Abuse
Resource Abuse consists of any activity, intentional or otherwise, that consumes sufficient system resources to negatively affect other clients or equipment.
1.2 — Unsolicited Communication
1.2.1
Any email-based communications sent without the consent of the recipient are considered "Unsolicited Communication(s)".
1.2.2
Knowingly permitting or initiating Unsolicited Communications is grounds for immediate termination and a permanent ban from any future service.
1.3 — Malicious Content
1.3.1
Any type of script, code, or other file that performs harmful action — either to the user affected or as a bulk action triggered by the user — is considered "Malicious Content".
1.3.2
Any content that violates the laws of the country it resides in is also considered "Malicious Content".
1.3.3
Knowingly permitting or hosting Malicious Content is grounds for immediate termination and a permanent ban from any future service.
2.1 — Intentional / Malicious Abuse
2.1.1
Intentional / Malicious usage is defined as any action knowingly performed by the user, or persons the user has authorized to access the service, that is categorized in the above Abuse Definitions.
2.1.2
All services on the user's account will be immediately terminated without compensation, and the user forfeits the ability to hold any further services by MysticDev LLC.
2.2 — Order of Execution During Abuse Offenses
2.2.1
The offending service will be brought offline and left in a suspended state.
2.2.2
A support ticket will be opened to the service owner detailing the offense and the necessary steps required to resolve the situation, if resolvable. It is the client's responsibility to attempt timely remediation.
2.2.3
Once the service owner replies acknowledging the issue and how to correct it, the service will be reactivated and the service owner will have 24 hours to prevent any further abuse.
Failure to address abuse cases will result in your services being suspended, and in extreme cases, terminated.
MysticDev LLC is a strong believer and supporter of Freedom of Speech. You are welcome to run Exit, Relay, and Bridge nodes — just follow the rules when doing so.
3.1 — Tor Guidelines
3.1.1
Please open a support ticket informing us if you're running an Exit Node so we can track and handle abuse complaints accordingly.
3.1.2
MysticDev LLC understands it is possible to receive abuse complaints for Tor users — however, this is not an invitation to start being malicious.
3.1.3
If you're operating an Exit Node, please make sure your exit policy blocks the following ports:
TCP 25 (SMTP) · TCP 465 (SMTP over SSL) · TCP 587 (SMTP over TLS)
TCP 6660–6667 (IRC — optional) · TCP 6697 (IRC over SSL — optional)
If you believe that your work has been copied in a way that constitutes illegal copyright infringement, you must provide a Notice to our Copyright department that includes all of the following:
1. A physical signature of the person authorized to act on behalf of the owner of the copyright or other intellectual property interest.
2. A description of the copyrighted work that you claim has been infringed.
3. A copy of the filed police report.
4. A description of where the material you claim is infringing is located on the site.
5. Your address, telephone number, and email address.
6. A statement by you that you have a good faith belief that the disputed use is not authorized by the copyright owner, its agent, or the law.
7. A statement by you, made under penalty of perjury, that the above information is accurate and that you are the copyright owner or authorized agent.