Terms and conditions regarding use of BitSwarm cloud services

In this document we present the following topics:


These are labeled generally as the Terms and conditions of the BitSwarm cloud usage (Terms and conditions). You must accept these to be able to use the BitSwarm cloud services. In case you will also take advantage of our license rental offer you must also accept the licensing agreement.
Generally the below Terms and conditions will be strictly enforced but we will always try to minimize any harm to the customer (you) and will try to be flexible in the application where such an approach will be possible. This is not a guarantee though.

Acceptable use policy

This Acceptable Use Policy (this “Policy”) describes prohibited uses of the web services offered by ITARS LLC (the owner of the BitSwarm cloud) (the “Services”) and the website located at http://www.bit-swarm.com (the “BitSwarm webite”). The examples described in this Policy are not exhaustive. We may modify this Policy at any time by posting a revised version on the BitSwarm webite. By using the Services or accessing the BitSwarm webite, you agree to the latest version of this Policy. If you violate the Policy or authorize or help others to do so, we may suspend or terminate your use of the Services.

No illegal, harmful, or offensive use or content

You may not use, or encourage, promote, facilitate or instruct others to use, the Services or BitSwarm webite for any illegal, harmful or offensive use, or to transmit, store, display, distribute or otherwise make available content that is illegal, harmful, or offensive. Prohibited activities or content include:

  • Illegal Activities. Any activities that are deemed illegal under European union (EU) law.
  • Harmful or Fraudulent Activities. Activities that may be harmful to others, our operations or reputation, including offering or disseminating fraudulent goods, services, schemes, or promotions (e.g., make-money-fast schemes, ponzi and pyramid schemes, phishing, or pharming), or engaging in other deceptive practices.
  • Infringing Content. Content that infringes or misappropriates the intellectual property or proprietary rights of others.
  • Offensive Content. Content that is defamatory, obscene, abusive, invasive of privacy, or otherwise objectionable, including content that constitutes child pornography, bestiality, or depicts non-consensual sex acts.
  • >Harmful Content. Content or other computer technology that may damage, interfere with, surreptitiously intercept, or expropriate any system, program, or data, including viruses, Trojan horses, worms, time bombs, or cancelbots.

No security violations

You may not use the Services to violate the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a “System”). Prohibited activities include:

  • Unauthorized Access. Accessing or using any System without permission, including attempting to probe, scan, or test the vulnerability of a System or to breach any security or authentication measures used by a System.
  • Interception. Monitoring of data or traffic on a System without permission.
  • Falsification of Origin. Forging TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route. This prohibition does not include the use of aliases or anonymous remailers.

No network abuse

You may not make network connections to any users, hosts, or networks unless you have permission to communicate with them. Prohibited activities include:

  • Monitoring or Crawling. Monitoring or crawling of a System that impairs or disrupts the System being monitored or crawled.
  • Denial of Service (DoS). Inundating a target with communications requests so the target either cannot respond to legitimate traffic or responds so slowly that it becomes ineffective.
  • Intentional Interference. Interfering with the proper functioning of any System, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, or flooding techniques.
  • Operation of Certain Network Services. Operating network services like open proxies, open mail relays, or open recursive domain name servers.
  • Avoiding System Restrictions. Using manual or electronic means to avoid any use limitations placed on a System, such as access and storage restrictions.

No e-mail or other message abuse

You will not distribute, publish, send, or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations (like “spam”), including commercial advertising and informational announcements. You will not alter or obscure mail headers or assume a sender’s identity without the sender’s explicit permission. You will not collect replies to messages sent from another Internet service provider if those messages violate this Policy or the acceptable use policy of that provider.

Our monitoring and enforcement

We reserve the right, but do not assume the obligation, to investigate any violation of this Policy or misuse of the Services or BitSwarm website. We may:

  • investigate violations of this Policy or misuse of the Services or BitSwarm website; or remove, disable access to, or modify any content or resource that violates this Policy or any other agreement we have with you for use of the Services or the BitSwarm website.
  • We may report any activity that we suspect violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. Our reporting may include disclosing appropriate customer information. We also may cooperate with appropriate law enforcement agencies, regulators, or other appropriate third parties to help with the investigation and prosecution of illegal conduct by providing network and systems information related to alleged violations of this Policy.

If you become aware of any violation of this Policy, you will immediately notify us and provide us with assistance, as requested, to stop or remedy the violation. To report any violation of this Policy, please follow our abuse reporting process.

Service terms

The following Service Terms apply only to the specific Services to which the Service Terms relate. In the event of a conflict between the terms of these Service Terms and the terms of the customized BitSwarm Customer Agreement or other agreement with us governing your use of our Services (the “Custom Agreement”), the terms and conditions of the Custom Agreement apply.

You may only use the Services to store, retrieve, query, serve, and execute Your Content that is owned, licensed or lawfully obtained by you. As used in these Service Terms, “Your Content” includes any “Company Content”. As part of the Services, you may be allowed to use certain software (including related documentation) provided by us or third party licensors (see licensing agreement). This software is neither sold nor distributed to you and you may use it solely as part of the Services. You may not transfer it outside the Services without specific authorization to do so.

You must comply with the current technical documentation applicable to the Services as posted by us and updated by us from time to time on the BitSwarm website. In addition, if you create technology that works with a Service, you must comply with the current technical documentation applicable to that Service as posted by us and updated by us from time to time on the BitSwarm website.

You will provide information or other materials related to Your Content (including copies of any client-side applications) as reasonably requested by us to verify your compliance with the Agreement. We may monitor the external interfaces (e.g., ports) of Your Content to verify your compliance with the Agreement. You will not block or interfere with our monitoring, but you may use encryption technology or firewalls to help keep Your Content confidential. You will reasonably cooperate with us to identify the source of any problem with the Services that we reasonably believe may be attributable to Your Content or any end user materials that you control.

If we reasonably believe any of Your Content violates the law, infringes or misappropriates the rights of any third party or otherwise violates a material term of the Agreement (including the documentation, the Service Terms, or the Acceptable Use Policy) (“Prohibited Content”), we will notify you of the Prohibited Content and may request that such content be removed from the Services or access to it be disabled. If you do not remove or disable access to the Prohibited Content within 2 business days of our notice, we may remove or disable access to the Prohibited Content or suspend the Services to the extent we are not able to remove or disable access to the Prohibited Content. Notwithstanding the foregoing, we may remove or disable access to any Prohibited Content without prior notice in connection with illegal content, where the content may disrupt or threaten the Services, as required to comply with European union law or any judicial, regulatory or other governmental order or request. In the event that we remove content without prior notice, we will provide prompt notice to you unless prohibited by law.

From time to time, we may offer free or discounted pricing programs covering certain usage of the Services (each , a “Special Pricing Program”). We may stop accepting new sign-ups or discontinue a Special Pricing Program at any time. Standard charges will apply after a Special Pricing Program ends or if you exceed the limitations by the Special Pricing Program. You must comply with any additional terms, restrictions, or limitations (e.g., limitations on the total amount of usage) for the Special Pricing Program as described in the offer terms for the Special Pricing Program or on the pricing page for the eligible Service(s). You may not access or use the Services in a way intended to avoid any additional terms, restrictions, or limitations (e.g., establishing multiple BitSwarm accounts in order to receive additional benefits under a Special Pricing Program), and we may immediately terminate your account if you do so. Any data stored or instances provided as part of a Special Pricing Program must be actively used.”

You will ensure that all information you provide to us via the BitSwarm website (for instance, information provided in connection with your registration for the Services, requests for increased usage limits, etc.) is accurate, complete and not misleading.


↑ Top