1. Our Security Mandate

At Eleven Orbits, we believe that a secure hosting environment is a shared responsibility. We have engineered a fortress-like infrastructure designed to withstand modern cyber threats, but maintaining this “Clean Network” requires the active cooperation of every user. This policy outlines our security protocols and the strict standards of conduct required to use our services.

2. Platform Security: How We Protect You

We employ a Defense-in-Depth strategy to secure your data from the network edge to the server core.

2.1. Infrastructure Hardening

  • Virtual Isolation: Unlike traditional shared hosting where one bad user can crash the whole server, our VPS and Managed WordPress environments utilize advanced Containerization. Your file system is strictly isolated, ensuring that a security breach in a neighboring account cannot bleed into yours.

  • Active DDoS Mitigation: We sit behind an enterprise-grade Web Application Firewall (WAF) that filters traffic patterns in real-time. This system automatically absorbs volumetric attacks (DDoS) before they reach your server, keeping your website online even under assault.

  • Encryption Standard: We enforce TLS 1.3 protocols for all data in transit. Whether you are uploading files via SFTP or logging into your dashboard, your connection is wrapped in bank-grade 256-bit encryption.

2.2. Email Integrity Protocols

To ensure your private emails land in the inbox—not the spam folder—we implement rigorous authentication standards:

  • SPF, DKIM, & DMARC: We provide the tools to digitally sign your outgoing emails, verifying your domain’s identity to receiving servers (like Gmail and Outlook).

  • Outbound Filtering: Our systems scan outgoing mail for spam signatures to prevent IP blacklisting, ensuring the reputation of our network remains pristine for all clients.


3. Acceptable Use Policy (AUP): Your Obligations

To maintain a high-performance network for everyone, Eleven Orbits enforces a Zero-Tolerance Policy regarding malicious activity. By using our services, you agree NOT to engage in the following:

3.1. Prohibited Content & Activities

  • Malware Distribution: Hosting viruses, ransomware, trojans, or “Command and Control” (C&C) scripts.

  • Phishing: Hosting fake login pages designed to steal credentials (e.g., banking or social media clones).

  • Network Abuse: Launching DoS/DDoS attacks, port scanning, or packet flooding against other servers or networks.

  • Spamming: Sending unsolicited bulk email (UBE) or hosting “spamvertised” landing pages.

3.2. Resource Fair Use

  • The “Noisy Neighbor” Rule: You may not run scripts that excessively consume CPU or I/O resources to the detriment of other users (e.g., crypto-currency mining or background video rendering on shared plans).

  • Copyright Infringement: Hosting unlicensed copyrighted material (Warez, nulled scripts, pirated movies) is strictly forbidden and will result in immediate termination upon receipt of a valid DMCA notice.

Violation of these rules will result in the immediate suspension of services without refund.


4. User Account Responsibilities

While we secure the server, you are the captain of your account. You are responsible for:

  • Credential Hygiene: You must maintain strong, unique passwords. We strongly recommend enabling Two-Factor Authentication (2FA) in your Client Area to prevent unauthorized takeovers.

  • Application Patching: If you are on an unmanaged VPS, you are responsible for keeping your OS and applications updated. If you use WordPress, you must keep your plugins and themes patched to prevent backdoor exploits.

  • Data Backups: While we maintain disaster recovery backups, you are responsible for your own data. We recommend maintaining an off-site backup of your critical files.


5. Reporting Abuse

The safety of our network depends on vigilance. If you witness suspicious activity originating from an Eleven Orbits IP address, or if you believe a site hosted by us violates this policy, please report it immediately.

  • Email: abuse@elevenorbits.com

  • Response Time: Our Security Operations Center (SOC) investigates all credible reports within 24 hours.

6. Policy Updates

The threat landscape evolves daily, and so must we. Eleven Orbits reserves the right to update this Safety Policy at any time to address new security challenges. Continued use of our platform constitutes your acceptance of these updated standards.