- Artificial Intelligence (AI)
New products are being created in this section. Be patient for a moment or contact us for more information.Artificial Intelligence (AI)
All products at a glance
- After challenge
- Use Cases
- Cloud approaches
- Modern Infrastructure
- Business Continuity
- Managed Services
I would like to...
Use CasesCloud approachesModern InfrastructureBusiness ContinuityManaged ServicesConsulting
- Replace / replace the on-premises infrastructure
- Use virtual machines in Switzerland
- A dedicated infrastructure in the cloud
- Get rid of IT management or parts of it
- more VMware Knowledge in the enterprise
- redundantly save the backup
- Reduce the risk for downtime
- a disaster recovery strategy
- cheap and easy cloud storage
- Migrate from Cloud to Cloud
Benefit from 25 years of experience in the IT sector.
We support you in your search for the perfect IT strategy. Contact us for a non-binding offer.
All solutions at a glance
Links about the company
Acceptable Use Policy for Cloud Services
Acceptable Use Policy for Cloud Services
This Acceptable Use Policy ("AUP") describes activities that are not permitted in connection with the cloud services provided by Netstream. This AUP is not intended to be exhaustive, and Netstream reserves the right to take action with respect to content or uses not expressly described below.
Customer is responsible for violations of this AUP by persons using its account with its permission or without authorization. He is also responsible for violations of this AUP by his users. Customer's use of the Services to assist another person in an activity that would violate this AUP if performed by Customer is a violation of the AUP. Netstream may amend this AUP at any time by posting a revised version on the Netstream website (netstream.ch/aup-cloud).
Illegal or abusive activities or content
Customer may not use the Services for illegal or abusive purposes. Prohibited activities include:
- Illegal activities: any use of the Services that violates applicable Swiss law.
- Infringement of intellectual property rights: any use of the Services that infringes copyright rights (e.g., providing pirated software or multimedia content)
- Unauthorized pornography, violence, harassing or offensive content
Customer shall not use the Services to compromise the security of other IT systems. Unauthorized activities include:
- Malicious Software: Software that interferes with the functionality of other IT systems. This includes viruses, malware, spyware, adware, Trojan horses, worms or time bombs.
- Unauthorized access: the unauthorized access to or use of a system, including an attempt to probe, scan, or test the vulnerability of a system or to breach or bypass the security or authentication measures used by a system
- Wiretapping: Monitoring data or traffic in a system without permission.
- Origin forgery: the use of forged or misleading TCP IP packet headers, IP addresses, MAC addresses, email headers, or other parts of a message that describe its origin or route
Customer may not establish network connections to other users, hosts, or networks unless it has permission to communicate with them. Prohibited activities are:
- Fraudulent Activity: the intentional, knowing, or reckless introduction of viruses or other harmful code into the Service or the collection, transmission, or use of information, including email addresses, usernames, passwords, or other identifiers, through deception or covert means (such as phishing, Internet fraud, password theft, spidering, and harvesting).
- Intentional Disruption: the interference with the proper functioning of a system, including intentionally attempting to overload a system through mailbombing, newsbombing, broadcasting attacks, flooding techniques, or conducting a denial of service ("DoS") attack.
- Operation of certain network services: the operation of open proxies, open mail relays, open recursive domain name servers, Tor exit nodes, or other similar network services
Mining of cryptocurrencies, including but not limited to BitCoin, Chia or similar currencies, without express written permission is prohibited.
Abuse of e-mail and other messages and spamming
Customer will not disseminate, publish, send or facilitate the sending of unsolicited bulk email or other messages, promotions, advertisements or solicitations ("Spam"), including commercial advertising and informational announcements. Customer will not alter or obfuscate any email header or assume the identity of any sender without the sender's express permission. Customer shall use reasonable efforts to secure all devices or networks within its control against violations of applicable laws against spam and unsolicited email, including, where applicable, by installing anti-virus software, firewall software, and patches and updates for operating systems and application software. Customer will not take any action that directly or indirectly results in any of our IP addresses being listed in any spam database (e.g. Spamhaus).
Customer must comply with laws and regulations that apply to bulk or commercial email.
Testing for vulnerabilities (vulnerability testing)
Customer shall not attempt to probe, scan, penetrate or test the vulnerabilities of any Netstream system or network, or breach Netstream's security or authentication measures, whether through passive or active techniques, or conduct security or malware research on or with the Services, without Netstream's prior written consent.
Excessive use of shared system resources
Customer shall not use a shared system ("Shared" environment) provided by Netstream in a manner that unnecessarily interferes with the normal operation of the shared system or consumes a disproportionate amount of the system's resources (fair use policy). This applies to CPU, network and disk IOPS resources. Customer agrees that Netstream may quarantine or delete data stored on a shared system if the data is infected with a virus or otherwise corrupted and has the potential to infect or damage the system or other customer's data stored on the same system.
Our monitoring and enforcement
Netstream reserves the right, but has no obligation, to investigate any suspected violation of this AUP or misuse of the Services of which Netstream has actual knowledge. In connection with any such investigation, Netstream may report any activity that Netstream suspects violates any law or regulation to the appropriate law enforcement authorities.
Consequences of violations of the AUP
If Netstream determines, in its sole discretion, that Customer has violated this AUP, Netstream may remove, disable access to, or modify any Content or resources and/or restrict or terminate your use of the Services. Netstream may also intercept or block content or traffic belonging to Customer or its users if the Services are used unlawfully or not in accordance with this AUP. Netstream's right to restrict or terminate Customer's use of the Services applies even if a violation is unintentional or committed without its authorization. This right does not obligate Netstream to act at any particular time or with respect to any particular Subscriber, and Netstream may exercise this right at any time in its sole discretion.
Service restricted or terminated for AUP violations does not entitle the employee to compensation.
Reporting violations of this AUP
If you become aware of a suspected violation of this AUP, please notify Netstream by fully explaining the reasons for the violation. Netstream may request your assistance in stopping or remedying the violation. To report a violation of this AUP or to make inquiries regarding such violation, please email Netstream at email@example.com.