Customer Reviews
  • " Will use your service again ; "
  • Pete Harris, California, USA

Terms of Service's Terms of Service ("TOS") is published in accordance with
the Information Technology Act, 2000 and Information Technology
(Intermediaries guidelines) Rules, 2011 and provided to give our customers and
users a clear understanding of what expects of them while
using the service. All users of's Internet services: those
who access some of our Services but do not have accounts, as well as those who
pay a service fee to open account with us, must comply with this Terms of
Service. Use of Service constitutes acceptance and
agreement to's TOS as well as's othe

All Payments To Are
Nonrefundable Unless Otherwise Stated.
We do not actively monitor subscriber
activity under normal circumstances. Similarly, we do not exercise editorial
control over the content of any web site, e-mail transmission, newsgroups, or
other material created or accessible over or through the services, except for
certain proprietary Web sites. However, in accordance with our TOS (Terms of
Service), we may inform the 3rd party website to remove any materials that, in
our sole discretion, may be illegal, may subject us to liability, or which may
violate this TOS. may cooperate with legal authorities
and/or third parties in the investigation of any suspected or alleged crime or civil
wrongdoing. Your violation of this TOS may result in the suspension or immediate
termination of either your account or
may contact the 3rd party website to remove the illegal content WITHOUT PRIOR

This document is intended to provide a basic understanding of's Terms of Service. The following are guidelines for the
establishment and enforcement of's TOS: Ensure reliable
service to our customers Ensure security and privacy of our website the
Information Technology Act, 2000 and Information Technology (Intermediaries
guidelines) Rules, 2011 to maintain our reputation as a responsible service provider
Encourage responsible use of the Internet and discourage activities which reduce
the usability and value of Internet services Preserve the value of Internet
resources as a conduit for free expression and exchange of information Preserve
the privacy and security of individual users intends to provide its customers access to everything the
Internet has to offer. While is firmly committed to the
principles of free speech, certain activities that may be damaging to the resources
of both and the Internet and cannot be permitted under the
guise of free speech. The resources of and the Internet are
limited, and abuse of these resources by one user has a negative impact on the
entire community.

We do not monitor the activity or have control over the accounts as we are
resellers, the account activity and the use of the account will be solely determined
by the file hosting website where the account has been created (file hosting
websites policies would apply). However, in our efforts to promote good
citizenship within the Internet community, we will respond appropriately in
accordance with Section 79 of the Information Technology Act, 2000 and
Information Technology (Intermediaries guidelines) Rules, 2011, if we become aware
of inappropriate use of our service.

You may not use your dedicated server or virtual site to publish material,
which determines, at its sole discretion, to be unlawful,
indecent or objectionable. For purposes of this policy, "material" refers to all
forms of communications including narrative descriptions, graphics (including
photographs, illustrations, images, drawings, logos), executable programs, video
recordings, and audio recordings.

If account or the account created with the Third Party
file Hosting Website is used to violate the Terms of Service, we reserve the right
to terminate the account created with us or intimate the Third Party File Hosting
Website to terminate your service without notice. We prefer to advise customers
of inappropriate behavior and any necessary corrective action; however, flagrant
violations of the Terms of Service will result in immediate termination of service.
Our failure to enforce this TOS, for whatever reason, shall not be construed as a
waiver of our right to do so at any time. As a member of our network community,
you must use your Internet access responsibly. If you have any questions
regarding this policy, please contact us.

The following constitute violations of this TOS but not limited to the below:

Illegal use: services may not be used for illegal
purposes, or in support of illegal activities. reserves the
right to cooperate with legal authorities and/or injured third parties in the
investigation of any suspected crime or civil wrongdoing. Upload or circulating pornographic, erotic, defaming, abusing, harassing, stalking, threatening or provoking material or information, topic, incidences etc. is prohibited

Harm to minors: Use of the service to harm, or
attempt to harm, minors in any way, including, but not limited to child

Threats: Use of service to transmit any material (by email,
uploading, posting or otherwise) that threatens or encourages bodily harm
or destruction of property.

Harassment: Use of service to transmit any material
(by e-mail, uploading, posting or otherwise) that harasses another.

Fraudulent activity: Use of service to make fraudulent
offers to sell or buy products, items, or services, or to advance any type of
financial scam such as "pyramid schemes," "ponzi schemes," and "chain letters."
Forgery or impersonation: Adding, removing or modifying identifying
network header information in an effort to deceive or mislead is prohibited.
Attempting to impersonate any person by using forged headers or other
identifying information is prohibited. The use of anonymous remailers or
nicknames does not constitute impersonation.

Unsolicited commercial e-mail / Unsolicited bulk e-mail (SPAM): Use of
the service to transmit any unsolicited commercial or
unsolicited bulk e-mail is expressly prohibited. Violations of this type will result in
the immediate termination of the offending account.
Bulk Mailings: Bulk mailings of any kind, are not permitted to be sent from
the file-hosting servers. This line item applies to mailings sent within the 1000
emails per hour limit as well.

E-mail / News Bombing: Malicious intent to impede another person's use of
electronic mail services or news will result in the immediate termination of the
offending account.

E-mail / Message Forging: Forging any message header, in part or whole,
of any electronic transmission, originating or passing through the service is in violation of this TOS.

Unauthorized access: Use of the service to access, or
to attempt to access, the accounts of others, or to penetrate, or attempt to
penetrate, security measures of or another entity's
computer software or hardware, electronic communications system, or
telecommunications system, whether or not the intrusion results in the corruption
or loss of data, is expressly prohibited and the offending
account is subject to immediate termination.

Copyright or trademark infringement: Use of the
service to transmit any material (by e-mail, uploading, posting or otherwise) that
infringes any copyright, trademark, patent, trade secret or other proprietary
rights of any third party, including, but not limited to, the unauthorized copying of
copyrighted material, the digitization and distribution of photographs from
magazines, books, or other copyrighted sources, and the unauthorized transmittal
of copyrighted software.

Collection of personal data: Use of the service to
collect, or attempt to collect, personal information about third parties without
their knowledge or consent.

Threatens Nation: Threatens the unity, integrity, defense, security or
sovereignty of India, friendly relations with foreign states, or public order or
causes incitement to the commission of any cognizable offence or prevents
investigation of any offence or is insulting any other nation

Network disruptions and unfriendly activity: Use of the service for any activity that affects the ability of other
people or systems to use Services or the Internet. This
includes "denial of service" (DOS) attacks against another network host or
individual user. Interference with or disruption of other network users, services or
equipment is prohibited. It is the Member's responsibility to ensure that their
network is configured in a secure manner. A Subscriber may not, through action
or inaction, allow others to use their network for illegal or inappropriate actions. A
Subscriber may not permit their network, through action or inaction, to be
configured in such a way that gives a third party the capability to use their
network in an illegal or inappropriate manner. Unauthorized entry and/or use of
another company and/or individual's computer system will result in immediate
account termination. will not tolerate any subscriber
attempting to access the accounts of others, or penetrate security measures of
other systems, whether or not the intrusion results in corruption or loss of data.

Fraud: Involves a knowing misrepresentation or misleading statement, writing
or activity made with the intent that the person receiving it will act upon it.

Infringement of Copyright, Patent, Trademark, Trade Secret, or
Intellectual Property Right:
Distribution and/or posting of copyrighted or the
aforementioned infringements will not be tolerated.

Distribution of Viruses: Intentional distributions of software that attempts to
and/or causes damage, harassment, or annoyance to persons, data, and/or
computer systems are prohibited. Contains software viruses or any other files
programs designed to interrupt, destroy or limit the functionality of any computer
resource Such an offence will result in the immediate termination of the offending

Inappropriate Use of Software: Use of software or any device that would
facilitate a continued connection, i.e. pinging, while using
services could result in suspension service.

Verbal abuse of support personnel: Verbal abuse of
personnel is not tolerated. Customers who continue to verbally abuse support
personnel may be warned or asked to use a different provider.

Third Party Accountability: subscribers will be held
responsible and accountable for any activity by third parties, using their account
that violates guidelines created within the Terms of Service.

As a reseller we don’t have control over the servers of Third Party file hosting
website, so as far as the security measures are concerned please refer to the
terms of service and privacy policies of the respective websites. follows the mandatory security measures provided by the
Information Technology Act, 2000 and rules thereafter. As far as is concerned you are responsible for any misuse of your
account, even if a friend, family member, guest or employee committed the
inappropriate activity. Therefore, you must take steps to ensure that others do
not gain unauthorized access to your account. In addition, you may not use your
account to breach security of another account or attempt to gain unauthorized
access to another network or server. Your password provides access to your
account. It is your responsibility to keep your password secure. Sharing your
password and account access with unauthorized users is prohibited. You should
take care to prevent others from using your account since you will be held
responsible for such use. Attempting to obtain another user's account password is
strictly prohibited, and may result in termination of service. You must adopt
adequate security measures to prevent or minimize unauthorized use of your

You may not attempt to circumvent user authentication or security of any host,
network or account. This includes, but is not limited to, accessing data not
intended for you, logging into or making use of a server or account you are not
expressly authorized to access, or probing the security of other networks. Use or
distribution of tools designed for compromising security is prohibited. Examples of
these tools include, but are not limited to, password guessing programs, cracking
tools or network probing tools. You may not attempt to interfere with service to
any user, host or network ("denial of service attacks"). This includes, but is not
limited to, "flooding" of networks, deliberate attempts to overload a service, and
attempts to "crash" a host.
Users who violate systems or network security may incur criminal or civil liability. will cooperate fully with investigations of violations of
systems or network security at other sites, including cooperating with law
enforcement authorities in the investigation of suspected criminal violations.

The Services may contain links to other websites that are not owned or controlled
by ("Third Party Sites"), as well as articles, photographs,
text, graphics, pictures, designs, sound, video, information, and other content or
items belonging to or originating from third parties ("Third Party Content"). We
are not responsible for any Third Party Sites or Third Party Content accessed
through the Services. Third Party Sites and Third Party Content are not
investigated, monitored or checked for accuracy, appropriateness, or
completeness by us. If you decide to access Third Party Sites or to access or use
any Third Party Content, you do so at your own risk and you should be aware that
our terms and policies no longer govern. You should review the applicable third
party’s terms and policies, including privacy and data gathering practices of any
website to which you navigate

NETWORK PERFORMANCE accounts operate on shared resources. Excessive use or
abuse of these shared network resources by one customer may have a negative
impact on all other customers. Misuse of network resources in a manner that
impairs network performance is prohibited by this policy and may result in
termination of your account.
You are prohibited from excessive consumption of resources, including CPU time,
memory, disk space and session time. You may not use resource-intensive
programs that negatively impact other customers or the performances of systems or networks. reserves the
right to terminate or limit such activities.

REPORTING VIOLATIONS To is a reseller and does not have control over the content
posted/uploaded on the THIRD PARTY WEBSITES or do not actively monitor
subscriber activity under normal circumstances. Similarly, we do not exercise
editorial control over the content of any web site, e-mail transmission,
newsgroups, or other material created or accessible over or through the services,
except for certain proprietary Web sites. However, in accordance with our TOS
(Terms of Service), we may inform the 3rd party website to remove any materials
that, in our sole discretion, may be illegal, may subject us to liability, or which
may violate this TOS. upon obtaining knowledge by itself or
been brought to actual knowledge by an affected person in writing or through
email signed with electronic signature about any such information as mentioned
above and termed as illegal, will try and intimate the THIRD PARTY content
hosting website to get the illegal content removed in accordance with Section 79
of the Information Technology Act, 2000 and Information Technology
(Intermediaries guidelines) Rules, 2011.

When required by lawful order, the intermediary shall provide information or any
such assistance to Government Agencies who are lawfully authorized for
investigative, protective, cyber security activity. The information or any such
assistance shall be provided for the purpose of verification of identity, or for
prevention, detection, investigation, prosecution, cyber security incidents and
punishment of offences under any law for the time being in force, on a request in
writing staling clearly the purpose of seeking such information or any such
assistance. Furthermore requests that anyone who believes
that there is a violation of this TOS direct the information us. The email address
can be found on our contact page. If available, please provide the following
information: The IP address used to commit the alleged violation, the date and
time of the alleged violation, including the time zone and Evidence of the alleged
violation E-mail with full header information provides all of the above, as do
system log files. Other situations will require different methods of providing the
above information.


You expressly understand and agree that:
• your use of the Service is at your sole risk. Services
are provided on an "as is" and "as available" basis.
and its suppliers, to the fullest extent permitted by law, disclaim all
warranties, including but not limited to warranties of title, fitness for a
particular purpose, merchantability and non-infringement of proprietary or
third party rights. and its suppliers make no
warranties about the accuracy, reliability, completeness, or timeliness of
our Services, software, or content;
• makes no warranty that (I) the Service will meet your
requirements, (II) the service will be uninterrupted, timely, secure, or
error-free, (III) the results that may be obtained from the use of the
service will be accurate or reliable, (IV) the quality of any products,
services, information, or other material purchased or obtained by you
through the Service will meet your expectations, and (V) any errors in the
software will be corrected;
• any material downloaded or otherwise obtained through the use of the
Service is done at your own discretion and risk and that you will be solely
responsible for any damage to your computer system or loss of data that
results from the download of any such material;
• no advice or information, whether oral or written, obtained by you from us
or through or from the Service shall create any warranty not expressly
stated in these terms and conditions.

You agree to defend, indemnify, and hold harmless, its
affiliates, officers, directors, employees and agents, from and against any claims,
actions or demands, including without limitation reasonable legal fees, alleging or
resulting from your use of our Service, or the Services provided by the Third
Party File Hosting Websites, or your breach of this Agreement or other policies, terms and conditions

REVISIONS TO THIS TERMS OF SERVICE reserves the right to revise, amend, or modify this TOS,
and our other policies and agreements at any time and in any manner without
any prior notice which please note.

Shipping & Delivery Policy

Delivery of our services will be confirmed on your mail ID as specified during registration. For any issues in utilizing our services you may contact our helpdesk


Its the customers responsibility to provide a valid and correct email ID as the product will be delivered to it. The customer needs to confirm that our emails do not end up in JUNK folder of your email.


A copy of the product will be stored in your account with just login into your account to view it.

If you do not receive any product details from us with in 48 hrs then please contact us