TrustedHosting.in Terms of Service

Effective date 04 February 2022. Last updated 31 October 2025.

1. Overview and Acceptance

1.

These Terms of Service set out the contractual relationship between you and TrustedHosting.in, a registered MSME, governing access to and use of all services including hosting, domain services, reseller programs, virtual servers, dedicated infrastructure, managed security and VAPT consultancy. Use or purchase of any service implies your acceptance of these Terms.

These Terms are designed to be clear and practical while protecting the Company’s operations, infrastructure and customers. If any term is unacceptable, please do not use our services and seek alternatives.

2. Definitions

2.

Definitions used throughout these Terms are intended to reduce ambiguity and provide clarity. “Company” or “we” refers to TrustedHosting.in. “Customer”, “you”, or “Client” refers to the person or entity ordering, registering or using Services. “Services” includes all infrastructure, hosting, domain, security assessments and consultancy offerings. “Client Data” means content uploaded, stored, or transmitted by Client.

Other specific terms are defined where they appear. Where a term is undefined it should be interpreted in common business usage consistent with the purpose of these Terms.

3. Scope of Services

3.

TrustedHosting.in provides a range of services including shared hosting, reseller and alpha reseller plans, managed and unmanaged VPS, dedicated servers, domain registration and management, professional email hosting, managed security and VAPT services, and related consultancy. Product pages and order confirmations set out specific technical limits, add-ons, and optional managed services which supplement these Terms.

The Company reserves the right to limit or alter feature sets or service offerings where necessary to preserve network stability, meet compliance obligations, or reflect vendor licensing changes. Any material change will be notified in advance when practicable.

4. Eligibility and Registration

4.

Customers must be legally capable of entering contracts. Registration requires a valid email and contact number. The Company may request identity verification or KYC documents at any time to comply with applicable law and to reduce fraud and abuse.

Accounts created with false, misleading, or temporary contact information will be suspended and may be terminated without refund. Customers must promptly update their contact information and accept notices delivered to the registered contact details.

5. Account Security and Access

5.

Customers are fully responsible for maintaining account security. Use strong passwords, enable MFA, and follow secure key management practices. Notify the Company immediately of any unauthorized access.

The Company is not liable for losses or damages resulting from compromised credentials, user-side malware, weak passwords, reuse of passwords across services, or other client-side security failures. The Company may temporarily disable access pending investigation to protect the environment.

6. Service Activation and Provisioning

6.

Activation times vary by product. We will use commercially reasonable efforts to provision services promptly following order and payment. Activation may require identity verification, completed payment clearance, or domain registry processing.

Delays caused by third parties, registries, payment processors, KYC checks, or propagation are not grounds for refund unless the product page or a separate policy explicitly states otherwise.

7. Payments, Billing and Renewals

7.

All fees are payable in advance and in INR unless stated. Recurring services renew automatically at the end of each billing cycle. VPS and Dedicated Services are billed on the 1st day of the month. Customers must maintain valid payment instruments. The Company is not responsible for payment delays from banks or third party gateways.

Unpaid accounts may be suspended after five days and terminated after fifteen days. Restoration may require payment of outstanding fees plus administrative reactivation charges. If multiple payment attempts fail, services remain suspended until a successful payment is received.

8. Pricing Adjustments and Taxes

8.

Prices may be adjusted to reflect infrastructure costs, licensing, regulatory changes, or vendor fees. Price changes will be posted and applied at renewal. Customers are responsible for taxes including GST. The Company will charge, collect, and remit taxes as required by law where applicable.

Where a jurisdiction requires tax withholding by the Customer, the Customer remains liable for any such withholding obligations and must notify the Company in advance.

9. Refunds and Cancellations

9.

Refunds are subject to product-specific terms and the Company’s Refund Policy. Promotional or trial offers may be non-refundable. Cancellation requests must be submitted via the client area. Cancellations do not automatically guarantee refunds and may be subject to billing cycle and deletion policies outlined elsewhere in these Terms.

For managed services, early termination fees may apply to cover provisioning and licensing costs. Any approved refunds will be processed to the original payment method and may take up to 14 business days to appear.

10. Service Level Commitment

10.

The Company targets 99.9 percent monthly uptime for core infrastructure. This SLA excludes scheduled maintenance, customer activities, misconfiguration, upstream provider failures, and force majeure. Availability measurements are taken at our monitoring points and are final for SLA purposes.

SLA credits, where eligible, will be issued as account credits only after verified measurement and must be claimed within seven days. Credits cannot exceed one month’s fee and do not represent a refund for lost business or consequential damages.

11. Datacenter, Hardware and Network

11.

We operate through partnered datacenters and enterprise-class hardware. While we engineer for high availability, datacenter-level hardware failures, RAID corruption, upstream network outages, or carrier faults may occur. The Company will respond and remediate using best practices but is not responsible for third-party or datacenter-caused interruptions.

Customers requiring redundant geographic distribution should use multi-zone or multi-datacenter architectures and maintain offsite replication strategies. The Company can assist with architecture design as an optional paid service.

12. Data Protection, Backup and Retention

12.

Backups may be available depending on plan type. Backups are retained according to plan-specific retention schedules and are provided on a best-effort basis. The Company does not guarantee success of any backup process, nor the completeness of restored data.

Customers are responsible for implementing independent, offsite backups and verifying backup integrity. For mission-critical data, Customers should maintain multiple backup copies and periodic restoration tests.

13. Data Loss and Recovery Disclaimer

13.

TrustedHosting.in expressly disclaims liability for loss of data or business resulting from server crashes, hardware failure, RAID corruption, software defects, human error, malware, ransomware, datacenter outage, or third-party carrier interruption. Restoration attempts are goodwill actions and may incur recovery fees.

Customers accept sole responsibility for data retention strategies and indemnify the Company against claims arising from data loss or lack of backups. The Company’s obligation, if any, is limited to performing commercially reasonable restoration efforts from available snapshots.

14. Cybersecurity, VAPT and Consultancy Services

14.

Security engagements such as VAPT, red team exercises, and consultancy are provided under separate scopes of work and often require signed engagement letters. Tests must be authorized by the system owner, and Clients must accept the inherent risks associated with security testing on production systems.

The Company shall present findings, risk ratings, and remediation recommendations. The Company does not guarantee that identified vulnerabilities can be fully mitigated or that remediation eliminates future exploitation risk. Liability for any impact resulting from testing remains with the Customer unless otherwise agreed in writing.

15. Software Licensing and Third Party Integrations

15.

Services may include vendor-licensed software such as control panels, web servers, databases, and management tools. Use of such software is subject to the vendor’s license terms. The Company provides licenses where included in a plan but bears no responsibility for vendor maintenance, security flaws, or license disputes.

Customers must not distribute, modify, or attempt to reverse engineer licensed components beyond the rights expressly granted by the vendor and the Company.

16. Domain Registration and Transfer Policy

16.

Domain registration and transfers are subject to registry rules. The Company acts as registrar or registrar reseller and is not responsible for registry deletions, disputes, or policies that affect domain availability. Domain renewals must be maintained to avoid expiration and potential loss.

Transfer requests require proper authorization and may be subject to 60 day transfer locks imposed by registries or registrars following registration changes.

17. Reseller and Alpha Reseller Responsibilities

17.

Resellers operate as independent entities and are responsible for their downstream clients and billing practices. Resellers must enforce these Terms with sub accounts and maintain adequate support and backup practices for downstream customers. Violations by sub accounts are actionable against the reseller.

Alpha Resellers must maintain operational controls, monitor abuse reports, and comply with license counting for software like cPanel or WHMCS. Failure to do so may result in suspension of reseller privileges.

18. Email Use and Anti-Spam

18.

Customers must follow applicable anti-spam laws and good sending practices. Bulk email must be compliant with recipient consent and opt-out mechanisms. Accounts used for spam or listed on major blacklists may be rate-limited or suspended to protect delivery reputation.

The Company provides basic outbound filtering and reputation protection; however, ultimate responsibility for mailing list hygiene and compliance remains with the Customer.

19. Resource Usage and Fair Use

19.

Shared infrastructure is subject to fair use. Excessive CPU, memory, I/O, or network usage that impacts other customers can lead to throttling or account migration. The Company will notify Customers and recommend upgrades where practical.

Abusive resource usage patterns, such as uncontrolled bots, scraping, or large computational workloads on shared plans, must be migrated to appropriate VPS or dedicated plans at the Customer’s expense.

20. Technical Support Scope

20.

Support covers infrastructure, network, and standard control panel assistance. Application level debugging, plugin development, or content creation is out of scope unless a managed service add-on is purchased. Priority and response targets are published in our support SLA.

Support actions that require elevated access, such as forensic investigations or data restoration, may incur additional professional service charges and require a signed engagement agreement.

21. Suspension, Termination and Data Deletion

21.

The Company may suspend or terminate accounts for non payment, breach, abuse, or legal compulsion. Suspension may prevent all access to data and services. Following termination, data retention is limited and the Company may delete content after defined retention windows.

Customers should export or backup data before cancellation. The Company is not liable for any content deleted after termination, including where the termination is due to breach or non payment.

22. Confidentiality and Privacy Obligations

22.

We treat non public information as confidential and limit access to authorized personnel. Our privacy practices are described in the Privacy Policy. We may disclose Customer information where compelled by law or to protect the Company’s rights, safety, or infrastructure.

Customers must not disclose security findings, privileged remediation steps, or forensic details publicly without prior written consent when such disclosure could increase risk or harm.

23. Intellectual Property Rights

23.

Customers retain rights to their content. The Company retains ownership of proprietary systems, trademarks, and service configurations. Customers grant the Company a license necessary to host, store, backup, and transmit content for service delivery. Unauthorized use of Company IP is prohibited.

Where Customer content infringes third party IP, the Company may suspend the content pending resolution and may comply with takedown notices in accordance with applicable notice and takedown procedures.

24. Indemnification

24.

Customers indemnify TrustedHosting.in against claims arising from Customer content, unlawful use, violation of third party rights, or breaches of these Terms. Indemnification includes costs, damages, and legal expenses incurred by the Company in defense or settlement.

This obligation survives termination and includes acts by downstream clients of resellers where applicable.

25. Limitation of Liability

25.

To the fullest extent permitted by law, the Company is not liable for indirect, incidental, special, or consequential damages including loss of profits, business interruption, or data loss. The Company’s aggregate liability for any claim will not exceed fees paid by the Customer for the affected service in the preceding three months.

This limitation applies regardless of the legal theory, whether based on breach of contract, tort, negligence, or strict liability.

26. Force Majeure

26.

The Company is not liable for failure to perform due to causes outside reasonable control including natural disasters, acts of government, strikes, power failures, datacenter outages, upstream provider failures, or cyber-attacks. The Company will use commercially reasonable efforts to resume service where possible.

Where prolonged force majeure affects availability, the Company may provide prorated credits at its discretion, but shall not be liable for consequential losses.

27. Compliance, Law Enforcement and Cooperation

27.

The Company cooperates with law enforcement, regulatory bodies, and CERT-In. Where required by court order or law, we may disclose customer information, suspend services, or preserve data for lawful investigations. The Company will notify Customers of legal process only where permitted by law.

Customers must cooperate with legitimate investigations, provide requested information, and follow lawful directives to remediate abuse or security incidents.

28. Governing Law and Dispute Resolution

28.

These Terms are governed by Indian law. Jurisdiction for disputes is the courts in Krishna District, Andhra Pradesh. Before litigation, parties should attempt to resolve disputes through written notice and escalation, and may pursue arbitration where mutually agreed.

Venue and jurisdiction clauses ensure predictability and allow the Company to efficiently resolve matters affecting network integrity or compliance.

29. Amendments, Severability and Entire Agreement

29.

The Company may update these Terms. Material changes will be posted on the website and may be communicated via client area notices or email. Continued use after notice indicates acceptance. If any provision is invalid, the remainder remains enforceable and effective.

These Terms comprise the entire agreement regarding the Services and supersede prior agreements, except where separate written service level or professional services agreements exist.

30. Company Identification and Acceptance

30.

By using TrustedHosting.in Services you acknowledge that you have read and accepted these Terms in full. If you act on behalf of a company or organization, you represent that you have the authority to bind that entity to these Terms.

30. Company Identification and Acceptance

By using TrustedHosting.in Services, you acknowledge that you have read, understood, and accepted these Terms. If you represent an organization, you confirm you have the legal authority to bind that organization to these Terms.

31. Prohibited Content and Activities

31.1 Overview
TrustedHosting.in enforces a strict zero-tolerance policy against illegal, unethical, and resource-abusive content or activities. Any account found engaging in these activities may be suspended or terminated immediately without notice or refund, and relevant information may be provided to law enforcement agencies if required by law.

31.2 Prohibited Content
Customers are strictly prohibited from hosting, uploading, linking to, transmitting, or distributing any of the following content types on any server, website, or service managed by TrustedHosting.in:

  • Nulled, cracked, or pirated scripts, plugins, themes, or software of any kind.
  • Fake or forged software licenses, key generators, or unauthorized license activation tools.
  • Phishing pages, login clones, credential harvesting pages, or deceptive impersonation content.
  • Hacking tools, penetration testing utilities used without authorization, exploit frameworks, malware, ransomware, keyloggers, or virus distribution mechanisms.
  • Adult, pornographic, obscene, or sexually explicit content, including imagery, video, written text, or related advertisements.
  • Child sexual abuse material (CSAM), revenge porn, or any form of sexual exploitation.
  • Content promoting or facilitating illegal activities such as drugs, weapons, or counterfeit goods.
  • Racist, extremist, violent, or hate-speech-related material directed at individuals or groups.
  • Spam content, bulk unsolicited email sites, or email lists obtained without recipient consent.
  • Mining, cracking, or brute-force software and any other unauthorized automation scripts.
  • Hosting or mirroring sites that distribute copyrighted materials without permission.
  • Any content violating applicable national or international laws, data protection, or intellectual property rights.

31.3 Prohibited Activities
Customers must not engage in any actions that could compromise server integrity, network performance, or the security of other clients. This includes:

  • Attempting to gain unauthorized access to any system, service, or account.
  • Running background processes that consume excessive CPU, RAM, or I/O resources on shared environments.
  • Executing denial-of-service attacks, network scanning, or traffic flooding.
  • Using our servers for cryptocurrency mining, botnets, or proxy/VPN abuse without authorization.
  • Hosting shell access files (C99, r57, etc.) or web-based backdoors.
  • Manipulating, tampering with, or bypassing licensing checks or software validation systems.

31.4 Enforcement and Reporting
TrustedHosting.in reserves the right to immediately disable or remove any account, file, or content that violates this section. Violations may result in permanent suspension, data deletion, and blacklisting of associated domains and IP addresses. Customers engaging in illegal acts will be reported to competent authorities. The Company’s decision on violations is final and not subject to appeal.

31.5 Customer Responsibility
Each customer is solely responsible for verifying that their content and activities comply with these Terms and with local and international laws. The Company disclaims all responsibility for any consequences arising from customer misuse, negligence, or failure to comply with applicable law.

31.6 Relationship to Other Policies
This section supplements the Acceptable Use Policy and does not limit the Company’s rights elsewhere in these Terms. Repeated or serious violations of this section may result in permanent termination of services across all associated accounts without prior notice.

Trade Name: SHAIK SAIMEERA
Enterprise: TrustedHosting.in
Udyam Registration: UDYAM-AP-06-0018045
Registered Address: Flat 1 43 Nandigama Raithapeta Nandigama Krishna District Andhra Pradesh 521185 India
Website: https://www.trustedhosting.in
Contact: Please use the official contact form on our website for support or legal correspondence.