Acceptable Use Policy

VPLS, INC. and its Affiliates (collectively, “Company”) creates this Acceptable Use Policy (“AUP”) to provide its customers and users a clear understanding of the responsible use of Company’s networks, systems, services, websites and products (collectively “Services”). By using Company’s Services, customers and users consent to be bound by the terms of this AUP.


  1. EvoDC, LLC.
  3. Evocative – Cyberverse, LLC.
  4. EVODC Garland, LLC.
  5. Evocative, Inc.
  6. Fiber Internet Center, LLC.
  7. Cyberverse, Inc.
  8. Krypt Technologies, DBA VPLS, Inc.
  9. VPLS Solutions, LLC.
  10. ZR Systems, LLC

Company’s AUP applies to all of its (and Affiliate’s) customers and users. Such users include (a) those who have access to some of the Services but do not have accounts, and (b) those who pay a service fee to subscribe to the Services.

Company reserves the right in its sole discretion to remove any content for any reason, including but not limited to, your violation of any laws or the terms and conditions of this AUP. Your violation of this AUP may result in the suspension or immediate termination of either your account or other actions as detailed below.

The AUP below describes certain actions relating to the content and operation of the Website which Company considers to be inappropriate and thus prohibited. The examples identified in this list are provided as examples only for your guidance. If you are unsure whether any contemplated use or action is permitted, please contact the Company.

Actions which Company considers inappropriate and grounds for removal of offending material or termination of access to the Website include, but are not limited to, the following:

  1. Using Services to sell any goods or services that are unlawful in the location at which the content is posted or received, or the goods or services delivered;
  2. Using Services to post any content that is obscene, lewd, lascivious, excessively violent, harassing, or otherwise objectionable;
  3. Using Services to harm, or attempt to harm, minors in any way, including, but not limited to child pornography;
  4. Using Services to transmit any material (by e-mail, uploading, posting, or otherwise) that threatens or encourages bodily harm or destruction of property;
  5. Using Services to post any content that advocates, promotes, or otherwise encourages violence against any governments, organizations, groups, or individuals or which provides instruction, information, or assistance in causing or carrying out such violence;
  6. Using Services to post any content that holds Company, its employees or owners up to public scorn or ridicule or would in any way damage or impair Company’s reputation or goodwill;
  7. Using Services to post any content that violates any copyrights, patents, trademarks, trade secrets, or other intellectual property rights of others;
  8. Failing to obtain all required permissions when using Services to receive, upload, download, display, distribute, or execute programs or perform other works protected by intellectual property laws including copyright and patent laws;
  9. Deleting or altering author attributes, copyright notices, or other copyright management information, unless expressly permitted in writing by the author or owner;
  10. Adding, removing, or modifying identifying network header information in an effort to deceive or mislead;
  11. Attempting to impersonate any person by using forged headers or other identifying information (the use of anonymous remailers or nicknames does not constitute impersonation);
  12. Using Services to make fraudulent offers to sell or buy products, items, or services, or to advance any type of financial scam such as “pyramid schemes,” “Ponzi schemes,” and “chain letters;”
  13. Using Services in a tortious manner, including the posting of libelous, defamatory, scandalous, threatening, harassing or private information without the permission of the person(s) involved, or posting content that is likely to cause emotional distress;
  14. Introducing viruses, worms, Trojan horses, malware or other harmful code on the Internet;
  15. Using Services to transmit any unsolicited commercial or unsolicited bulk e-mail. Violations of this type will result in the immediate termination of the offending account;
  16. Using the Services for any kind of IRC (Internet Relay Chat) on Company’s servers;
  17. Using Services for any activity which affects the ability of other people or systems to use Services or the Internet (this includes “denial of service” attacks against another network host or individual user); or
  18. Using Services to hack, breach, or test the vulnerability of user authentication or security of any software or hardware without express authorization of the owner.

In using the Company’s services, User must comply with all applicable requirements of the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act and the Telephone Consumer Protection Act. Under no circumstances may any Company Services be utilized to transmit or distribute unsolicited bulk email (“UBE” or “spam”). Likewise, the sending of UBE from another service provider advertising a website, email address, services, or utilizing any resources hosted on any Company network or server is prohibited. User must maintain an abuse role account email address, i.e. “[email protected]” This address should be exempt from spam filtering and will be used as the Company’s point of contact for communicating violations of this paragraph.

User Acknowledges that not all of the Company’s Products and Services are designed to comply with the Health Insurance Portability and Privacy Act of 1996 (“HIPAA”), security standards; User shall not, without the prior written consent of Company and execution of Company’s HIPAA Addendum to Master Services Agreement, use any Products or Services to create, maintain, receive, transport or store any protected health information, as defined in 45 C.F.R. §164.501 (“PHI”), and; User shall use only those Products and/or Services that have been designated by Company as “HIPAA Compliant” to create, maintain, receive, transport or store any PHI.

Company will provide Colocation Services that meet Payment Card Industry (PCI) mandated physical security requirements with controls such as: Access Control Lists, Visitor Log audits, and video surveillance.

Company takes no responsibility for any material created or accessible on any website, e-mail transmission, newsgroups, or other material created or accessible over or through the Services. Company is not obligated to monitor or exercise any editorial control over such material but reserves the right to do so. In the event that Company becomes aware that any such material may violate this AUP and/or expose Company to civil or criminal liability, Company reserves the right to block access to such material and suspend or terminate any customer or user creating, storing or disseminating such material. Company further reserves the right to cooperate with legal authorities and third parties in the investigation of alleged wrongdoing, including disclosing the identity of the customer or user that Company deems responsible for the alleged wrongdoing.

Company requests that anyone who believes that there is a violation of this AUP direct the information to the Abuse Department at [email protected]. If available, please provide the following information:

  1. The IP address used to commit the alleged violation;
  2. The date and time of the alleged violation, including the time zone or offset from GMT;
  3. Evidence of the alleged violation;

Company may revise in its sole discretion this AUP, without prior notice. Any such changes shall be posted by Company on its website. You shall be responsible for periodically reviewing the online AUP to apprise yourself of any changes thereto. You agree to be bound by all such changes.

Last Updated: February 22, 2022

Scroll to Top