07 3186 5272 [email protected]

HyperHost Policy


HyperHost Acceptable use Policy

This acceptable use policy applies to you employing HyperHost’s Services as your solution.

Indirect or attempted violations of the policy by you or your staff is considered to be violations of this policy. The policy supplements, but does not supersede, any LevelUP Solutions Pty Ltd T/A HyperHost Agreement for the Services. The requirements in this policy are guidelines. They are not intended to be exhaustive.

While we do not monitor or control communications, if we become aware of a violation of this policy, we may take such action as we consider appropriate including, in respect of your termination, sus-pension, blocking or filtering of sites and co operating with and notifying relevant authorities and par-ties including enforcement agencies and other internet service providers and carriers (we may, for this purpose, need to communicate personal information to others).

We will inform your system administrator and affected users when we are investigating any problem or complaint. If we are legally required to disclose any of your personal information, we will notify you of this requirement as far ahead of disclosure as is reasonably possible in the circumstances and will (at your direction and expense) use our best endeavours to oppose the disclosure.

You must inform us of all breaches by any person of which they are aware. They should do so by contacting us or your relationship manager. 

Prohibited Uses

Illegal Uses

You may not use services in ways that constitute criminal or civil breaches of any statute, regulations, government requirements or any other law (including general or common law) of any country. Those breaches include, without limitation, breach of intellectual property rights (such as copyright, trade marks, patents, trade secrets and confidential information); defamation; breach of obscenity laws and laws as to objectionable publications, such as pornography and hateful materials; fraud; theft; misappropriation of money, credit card details or personal information; breaches of privacy obligations; and trade practices legislation, examples of which are the Trade Practices Act (Australia) and the Fair Trading and Consumer Guarantees Acts (New Zealand).

Security and protection of the network

You may not use services to breach, or attempt to breach, the security and operation of any network, equipment or any other system. This includes: hacking, cracking into, monitoring, or using systems without authority; scanning ports (including scanning for open relays); improper configuration of mail servers and FTP servers enabling distribution of spam and unlicensed material by others; interference of service to any User or network (or activities that might encourage such interference by others) including mail-bombing, flooding, deliberate attempts to overload a system and broadcast attacks; denial of service attacks or activities which might encourage denial of service attacks by others; un-necessarily excessive traffic (including excessive pings); distributing viruses, or other harmful material or software; any communications across the Services which do not accurately identify (or disclose in a manner that is misleading) addresses, headers, names and other relevant details; and using our net-work in any way as a staging ground for any of those breaches or to disable or “crack” other systems.

Industry codes

You may not use services in a way that breaches any material standard, code and content requirements produced by any relevant authority or industry body.



Users may not use services to transmit content of a threatening nature including threats of death, physical harm and defamation.

You must not store, distribute or transmit any viruses, or any other material in the course of your use of the Virtual Desk Service:

  1.  is unlawful, harmful, threatening, defamatory, obscene or infringes any third party’s intellectual property or other rights;
  2.  facilitates illegal activity;
  3. promotes unlawful violence;
  4. is discriminatory based on race, gender, colour, religious belief, sexual orientation, disability, or any other illegal activity; or
  5. causes damage or injury to any person or property;

Responsible use

You must use services in a responsible manner taking into account:

  1. the effect that use may have on networks, equipment and other parties.
  2. compliance with “netiquette”, newsgroup and Internet conventions (as well as restrictions in rules, charters, FAQs and similar newsgroup, website and email mailing list material).
  3. such use must not interfere with the availability of any of the services to others (or any other services including services offered by us and other Internet providers and carriers to others).
  4. You must take reasonable steps to prevent activities that enable denial of service attacks and other adverse interference with networks.

Upload and Transfers

FTP and website migration tools are available for you to use, making migration a little easier

Service Protection

We take protecting our services and your website seriously with strong rewalls and optional GeoBlocking

Data Security

We aim to make storage of information secure as possible without affecting performance

Live Stats

Don't wait 24 hours to see whats going in & out. View raw traffic information almost as it comes

Cloud Backup

Do you want to backup your website to your cloud storage provider? Ask us about this

Performance Tiers

Fast websites are important! Choose the right hosting to suit the websites performance requirements


Find your perfect plan

Act now to secure an available domain name or use an existing domain you have to start
hosting today. Follow through the steps to get online and active for your business today!


Safe and Secure Web Hosting & Backups

VM vs Shared Hosting

If you’re hosting 1 or so websites, shared hosting in our environment is well favoured. Utilising our Virtual Servers opens the door to heavy performance loads and customs applications

Scheduled Backups

We make sure to backup all your data to keep somewhere safe if needed suddenly

Quick Application Installs

Need a quick online application installed? Use our Control Panel App Browser or enquire with us about prebuilt Virtual Machines


What people are saying about us

"Mauris blandit aliquet elit, eget tincidunt nibh pulvinar a. Donec sollicitudin molestie malesuada. Vivamus suscipit tortor eget felis porttitor volutpat. Donec sollicitudin molestie malesuada."

Author Name - Title, Organisation

"Mauris blandit aliquet elit, eget tincidunt nibh pulvinar a. Donec sollicitudin molestie malesuada. Vivamus suscipit tortor eget felis porttitor volutpat. Donec sollicitudin molestie malesuada."

Author Name - Title, Organisation

HyperHost Custom

Have a project or website that does fit the hosting plans available? Contact us and let's plan the perfect hosting plans that meets your needs

HyperHost Privacy Policy

This statement is the privacy policy of LevelUP Solutions Pty Ltd T/A HyperHost and its wholly owned Australian subsidiaries…

HyperHost Financial Hardship Policy

We use a recognized definition of financial hardship. The ACIF Credit Management Code defines financial hardship as…

HyperHost Acceptable use Policy

Indirect or attempted violations of the policy by you or your staff is considered to be violations of this policy. The policy supplements…


  • Reliable Uptime and Service Delivery
  • Easy Hosting Management with Plesk Control Panel
  • Australian Servers for your Data Security


  • Secured Mailboxes to suit all Businesses
  • Migrate your Exchange or Private Email Server
  • Protect your Inboxes with Proper Backups