UCloud Global Cloud Platform Security Rules
In order to better regulate the market management of the UCloud Global cloud platform, maintain the operation order of UCloud Global products, improve the user experience of UCloud Global products, and according to the “Cybersecurity Law of the People’s Republic of China”, “Administrative Measures for the Security Protection of International Networking of Computer Information Networks”, “Administrative Measures for Internet Information Services” and other related laws, as well as the “User Agreement of UCloud Global”, “Legal Statement and Privacy Terms of UCloud Global Cloud Service” and other related rules and agreements, these rules are formulated.
The “Security Rules of UCloud Global Cloud Platform” refer to the rules that you and the company you represent (hereinafter referred collectively to as “you”) need to comply with when using UCloud Global products or services to post, store, point to information, engage in network behavior (hereinafter referred to as “these rules”).
UCloud Global reserves the right to change these rules at any time and will announce it on the website. If the user does not agree with the related changes, they should stop using the related products or services of UCloud Global immediately. UCloud Global has the right to unilaterally determine the user’s behavior and the relevant rules that should be applied, and deal with it accordingly.
Article 1 You should comply with national laws and regulations, and strictly implement information security management regulations. You must not use any illegal means to access and use UCloud Global cloud services.
Article 2
You must not use UCloud Global cloud services to carry out illegal and criminal activities that endanger national security or leak state secrets, nor use UCloud Global cloud services to produce, look up, copy and distribute information that violates the constitution and laws, disrupts social order, undermines national unity, destroys national unity, pornographic, violent, etc., nor use UCloud Global cloud services to produce, look up, copy and distribute any information that includes but is not limited to the following content:
1, Pornography and vulgarity
1.1 Posting or storing audio and video products and videos with pornographic and obscene content; pornographic chat, prostitution, companion services; adult website forums, etc.
Including but not limited to the following violations: 1) Pornographic obscene audio and video products, videos, such as Japanese AV films, yellow films, passion films; 2) Pornographic chat services, such as naked chat; 3)
Information on pornographic website forums, adult websites, forums account links, invitation codes, etc. 4) Videos and pictures of the door incident.
1.2 Posting or storing trade information containing aphrodisiac products that can make others temporarily lose their resistance and have blurred consciousness, whether taken orally or applied externally;
Including but not limited to the following violations: Posting information on aphrodisiac products such as golden flies, silver flies, Spanish fly powder, weijia impulse liquid, Japanese sex素 etc.
1.3 Publishing or storing information containing software for spreading pornographic information; audio and video products with erotic and vulgar content, etc.;
Including but not limited to the following violations: 1) Software for spreading pornographic information, such as pornographic movie seeds, search tools with pornographic elements, pornographic live performances, selling pornographic resources using network disk storage tools, etc .; 2)
Containing erotic, violent, and vulgar content Audio and video products; 3) The posted information is explicitly a third-level movie, pornographic movie.
1.4 Publishing or storing information containing cartoons, games, books and magazines, and pictures with erotic and vulgar content;
Including but not limited to the following violations: 1) Cartoons, novels, and magazines containing erotic and vulgar content; 2) Games containing erotic and vulgar content; 3)
Pictures with pornographic content, body art, photo album & picture sets.
2、Gambling category:
2.1 Posting or storing information containing gambling trading platform;
Including but not limited to the following violations: 1) Mark Six, gambling, gambling platform information; 2)
Private or organized illegal opening of online lottery websites; engaging in real-time online video gambling, sports competition gambling websites; disguised gambling through board games; grabbing red packets through payment tools such as Alipay, WeChat, etc.
2.2 Posting or storing information about illegal gambling tools;
Including but not limited to the following violations: 1) Slot machines, gambling machines and other game machines of a gambling nature and their related cheating tools; 2) remote control dice, perspective poker and other gambling tools; 3)
Information related to Mark Six, private lottery and other gambling; 4) Information about services with the nature of network gambling such as game coin recycling.
3、Politics category:
3.1
Posting or storing information containing reactionary, undermining national unity, sovereignty and territorial integrity, disrupting social stability, involving state secrets, disrupting social order, advocating cult superstition, advocating religious and racial discrimination, or legally prohibited books, audio and video products, videos, file materials.
Including but not limited to the following violations information: 1) Information that incite subversion of the state power, overthrow the socialist system, destroy national unity, sovereignty and territorial integrity, and disrupt social stability; 2)
Information involving state secrets, disrupting social order; 3) Attack the national religion policy, advocate cult superstition, advocate religious and racial discrimination, such as Falun Gong; 4)
Content prohibited from publishing and distributing by laws and regulations; 5) Spreading rumors about major sudden events; 6) Insulting revolutionary heroes, distorting party history, national history, and military history; 7)
Fabricated rumors, smeared, and painted the party and national leaders.
4、Banned Chemicals category:
4.1 Posting or storing trade information containing drugs, raw materials for drug production, and chemicals for drug production;;
Including but not limited to the following violations information: 1) Drugs: such as opium, morphine, marijuana, dolidine, coca, cocaine, heroin, methamphetamine, MDMA, K powder, caffeine, triazolam, etc.; 2)
Drug testing paper; irregularly published drug extraction or production technology, technical books, etc .; 3)
Preparations of Ephedra: such as ephedrine, pseudoephedrine, l-ephedrine, racemic ephedrine, methylephedrine, ephedra extract, ephedra extract powder and other ephedrine substances; Camphor oil, trichloromethane; ergotamine; the main precursor for the manufacture of heroin acetic anhydride; Key precursor chemicals for the manufacture of amphetamine-like stimulants such as ephedrine, pseudoephedrine, l-ephedrine, 1-phenethyl-2-propanone, phenylacetic acid, etc.; Key precursors for the manufacture of ecstasy 3,4-methylendioxyphenyl-2-propanone, camphor, isocamphor, camphor oil, pepper aldehyde; Key precursor chemicals for the manufacture of cocaine, potassium permanganate; Key precursor chemicals for LSD ergot acid, ergotamine, ergotamine; The main precursor chemicals for the manufacture of barbitone are N-acetyl-o-aminophenol, o-aminophenol; also solvent-based solvents needed for drug production, such as toluene, acetone, methyl ethyl ketone, ether, etc.
4.2 Posting or storing trade information containing highly toxic chemicals;
Including but not limited to the following violations information: Arsenic, sodium cyanide, potassium cyanide, etc., including related ingredients.
4.3 Posting or storing trade information containing dangerous chemicals (excluding highly toxic chemicals) banned from sale in the national list;
Including but not limited to the following violations information: 1) Strong corrosive chemicals: such as sodium hydroxide; 2) Flammable and explosive chemicals: such as ammonia; 3) Toxic chemicals: such as phorate, bromoxynil, etc.
4.4 Publishing or storing trade information containing
mental health, anesthesia, toxic, radiation, stimulant, family planning drugs and addictive drugs; drugs that have been announced as banned by the state, declared by the Drug Administration to be prohibited in production and use.
Including but not limited to the following violations information: 1)
Mental health, anesthesia, toxic, radiation, stimulant drugs, such as triazolam and other mental health drugs, cocaine and other anesthesia drugs, Atropine API and other toxic western medicine, injection of yttrium methyldiphosphonate and other radioactive drugs, Androdiol and other stimulant drugs; 2)
Drugs that have been announced by the country as banned or recognized by drug supervision; 3) Addictive drugs: such as methadone, opium tincture, etc.
4.5 Posting or storing trade information containing flammable and explosive items (excluding fireworks and firecrackers) and related chemicals;;
Including but not limited to the following violations information: flammable and explosive items, hand grenades, bombs, gunpowder, etc.
4.6 Posting or storing trade information introducing related tutorials and books on the production of flammable and explosive items;;
Including but not limited to the following violations information: Tutorials or books containing instructions on the production of flammable and explosive items.
5、Banned Equipment and Software category:
5.1 Posting or storing trade information containing firearms, ammunition, military hardware and imitations;;
Including but not limited to the following violations information: 1)
Firearms, ammunition, military hardware and imitations including all kinds of air guns, service, and firing guns, blank guns, ammunition, anesthetic injection guns, etc, such as Desert Eagle, rifles, etc.; 2)
Real goods, including missiles, rockets, hydrogen bombs, fighter planes, tanks, aircraft carriers, etc.
5.2 Posting or storing trade information containing related equipment, accessories, affiliated products, etc. of firearms, ammunition, and military hardware;;
Including but not limited to the following violations information: 1) Related equipment and accessories of firearms, ammunition, and military hardware: bullets, magazines, sight glasses, seamless steel pipes, parts of anesthetic guns, anesthetic needles, anesthetic blow pipes, etc.; 2)
Affiliated products of firearms, ammunition and military hardware: gun bags, bullet bags, etc.
5.3 Posting or storing trade information containing police, military uniforms, signs, equipment and products;;
Including but not limited to the following violations information: 1)
Military, police uniforms and accessories: military and police uniforms, police dog vests, police dog leash chest straps, military and police pens, military and police wallets, military and police watches, military and police gloves, military and police water bottles, military police lighters, military police cigarette boxes, military caps police cap, military police medals, military police tie clips, military police badges, military police ties, military police collar flowers (badges), military police qualification badges, military police shoulder badges, military police arm badges, military police chest insignia, military police nameplates, military police belts, military boots police boots, military and police reflective vests, etc.; 2)
Military police equipment and products: police law enforcement recorders, military police telescopes, large hanging national emblems, military emblems, police emblems, military police walkie-talkies, military police warning lines, police light boxes, military police patrol cars, police car obstruction equipment, horn horns, military police car certificates, Metal handcuffs, leg irons, thumb handcuffs, handcuff straps, interrogation chairs, net guns, riot shields, police flashlights, military police flashlights, etc.
5.4 Posting or storing trade information containing control tools which can cause others to temporarily lose their resistance and cause significant harm to others;;
Including but not limited to the following violations information: Adult-used crossbows, electric shock devices.
5.5 Posting or storing trade information containing controlled knives, crossbow accessories and control tools for harming others’ personal safety;
Including but not limited to the following violations information: 1) Super-long knives, blade longer than 10 cm (including 10 cm); 2) Knives with blood grooves; 3)
Folding knife that can be locked automatically by a spring or card lock after being unfolded; 4) Metal blade samurai sword; 5)
Minority knives: Tibetan knives, waist knives, boot knives, horse knives; 6) scraper for machinery; 7) Trilateral military stings, bayonets, fist stings, hand stings; 8) Metal darts: three-cornered darts, six-cornered darts etc.; 9)
Bamboo, wood, metal slingshots; 10) Crossbow accessories; 11) non-spring nunchakus.
5.6 Posting or storing trade information containing software and equipment for listening, stealing privacy or secrets;;
Including but not limited to the following violations information: 1) “mobile phone listening card”, telephone “snoops”, “monitoring equipment” and other software and equipment for eavesdropping, stealing privacy or secrets; 2)
Wireless or invisible headset, cheating headset, rubber receiver and other examination cheating devices; 3) invisible perspective glasses; 4)
Trojans, viruses, chickens and computer vulnerabilities that will seriously affect the computer security of Internet users, and goods or information; 5)
Decryption software, intrusion tools, forced entry software; 6) Using software to steal user chat tools, steal other’s privacy software or equipment, such as: QQ chat recorder, etc.; 7)
Remote control / monitoring software mainly used to deal with unauthorized monitoring of others’ computer operations, chat records, commodity or information.
5.7 Posting or storing trade information containing equipment for illegal shooting, recording, evidence collection etc;;
Including but not limited to the following violations information: 1)
Camouflage stealth candid products or information with shooting functions, such as smoke detector type, watch type, pen type, lighter type, glasses type, keychain type, bird watching type, U disk type and other disguised candid products; 2)
Camouflage stealth candid products or information with listening functions, such as wall-through listeners, strip plug-in types, car charger types, and other disguised listening products; 3) Anti-peephole peeping devices; 4)
Illegal keyboard recorders and software.
6、Banned Goods category:
6.1 Posting or storing trade information containing fireworks and firecrackers;
Including but not limited to the following violations information: 1) Fireworks, firecrackers, whips (including bumps, drops, etc.); 2) Cold fireworks, colored smoke, etc.; 3)
Military (military) exercise smoke, fire fighting exercise smoke, fire fighting exercise smoke cake, ship rescue signal, parachute rescue signal, etc.
6.2
Posting or storing trade information containing the forging/alteration of documents, certificates, certificates, official seals, anti-counterfeit labels, etc., issued by the state organs or specific institutions, illegal or services only provided by the state organs or specific institutions;;
Including but not limited to the following violations information: 1) Forged and altered documents, certificates, and certificates issued by state organs or specific institutions; 2) Seals with legal effect, such as contract seals, financial seals, invoice seals; 3)
Counterfeit currency; 4)Bank cards, credit cards, medical insurance cards, securities cards, provident fund cards, etc., issued or hosted by banks; 5)
Services that are illegal or can only be provided by state organs or specific institutions, such as loan services, investment financial services securities services, credit card cashing services, domain name filing services, etc.
6.3 Posting or storing trade information containing pre-opened or usable or reimbursable bills;
Including but not limited to the following violations information: Bills that can be used or used for reimbursement, such as train tickets, invoices, etc.
6.4 Posting or storing trade information containing personal privacy information and corporate internal data; providing personal mobile location, telephone list query, bank account query and other services;
Including but not limited to the following violations information: 1) Company business directory data: business directory, personal telephone of manager or boss, customer list data, etc.; 2)
Business information: agent catalog, exhibitors list of Canton Fair, network marketing buyer and seller data, etc.; 3)
Personal data: various training or course student name list, personal household registration file certificate data, vehicle registration driver’s license information, bank business information, mobile phone call list, personal mailbox forum information, personal consumption record, personal resume, etc.; 4)
Special crowd information: consumer crowd statistics name list, stock investor data, talent database, etc .; 5) Privacy information inquiry services.
6.5 Posting or storing trade information containing cheating and interference related information;;
Including but not limited to the following violations information: 1) The answer before the CET-4-6 English, the middle and high school entrance examination, civil servant examination, etc.; 2) Take the exam, replace the test, ghostwrite, etc.; 3)
Some tools for cheating: invisible pens, erasing spirits and other exam cheating tools; Cheating tools for weighbridge, meter, electronic scale, etc.
6.6 Posting or storing trade information that may be used to evade traffic management;
Including but not limited to the following violations information: 1) License plate frame that prevents electronic eye shooting, such as flip type, hidden type, built-in type, folding type, lock license plate frame; 2) Variant license plate digital sticker; 3)
Fake license plates; 4) License plate invisible spray, etc.; 5) Running horse machines and other driving school cheating tools; 6)
Car signal jammers, car key decoders, etc.
6.7 Posting or storing trade information containing lock-picking tools, lock-opening services, and related tutorials and books;;
Including but not limited to the following violations information: 1) Universal lock-picking, quick-opening tools, etc. ; 2) Lock opening services and lock opening tutorials, books.
6.8 Posting or storing trade information related to pseudo base stations;;
Including but not limited to the following violations information: Pseudo base station equipment, etc.
6.9 Posting or storing trade information containing endangered animals and plants;;
Including but not limited to the following violations information: Ivory, tiger, rhinoceros horn, pangolin, etc.
7、Illegal Activity category:
7.1 Posting or storing trade information containing illegal pyramid schemes;;
Including but not limited to the following violations information: Information that has been recognized as an illegal pyramid scheme by courts, public security organs, etc.
7.2 Posting or storing trade information containing illegal fundraising;;
Including but not limited to the following violations information: 1) Information that has been recognized as illegal fundraising by courts, public security organs, etc.; 2) Information on illegal fundraising through various means (such as: Internet loans, etc.).
7.3 Posting or storing trade information containing network hiring (for illegal events);;
Including but not limited to the following violations information: Network hiring of killers, network hiring of debt collectors, etc.
7.4 Posting or storing trade information containing human trafficking;;
Including but not limited to the following violations information: Trafficking in women and children, etc.
7.5 Posting or storing trade information containing human organs or services provided by specific organizations;;
Including but not limited to the following violations information: 1) Human placentas, kidneys, livers, corneas, etc.; 2) Services such as surrogate mother services in Hong Kong, parental identification services, fetal identification services.
7.6 Posting or storing trade information containing tobacco;;
Including but not limited to the following violations information: China, panda, Yellow Crane Tower, etc.
7.7 Posting or storing trade information containing prohibited car categories;;
Including but not limited to the following violations information: Black car, smuggled car, customs seized car, deck car, etc.
8、Fraud and Infringement Information category:
8.1 Posting or storing trade information containing fraud scams such as winning prizes, phishing websites, illegal cashing, speculation of trust, etc.;;
Including but not limited to the following violations information: 1) Uses website links to prompt false winning information, often luring users with prize/ bonus winning information, etc.; 2)
Forge regular websites (such as: Industrial and Commercial Bank), steal user-related information by using similar url forms; 3)
Establish high-return P2P investment platforms and lure netizens to inject huge capital and ultimately lose everything.
8.2 Posting or storing trade information of network games related to plug-ins and private servers;;
Including but not limited to the following violations information: 1) Game plug-ins: plug-in programs, software and clients, plug-in cards, etc.; 2)
Private server related: private server establishment services, private server programs, private server websites, private server source code, private server servers and spaces, etc..
8.3
Posting a violation of citizens’ portrait rights, privacy rights; a violation of the reputation of citizens, legal persons or other organizations; a violation of copyright; a violation of trademark rights; a violation of patent rights; imitation (fake) website information.
Including but not limited to the following violations information:1) Obtaining a citizen’s personal electronic information by other illegal means, selling or illegally providing a citizen’s personal electronic information to others; 2) Using language, text, cartoons, etc. to degrade citizens’ personality, damage citizens’, legal persons’ or other organizations’ reputation; 3) Posting works on the Internet without the permission of the copyright owner (unit); distorting, tampering and publishing others’ (unit) works on the Internet; 4) Without the permission of the trademark registrant (unit), using a trademark identical or similar to the registered trademark on the website or webpage; 5) Without permission, using others’ patent knowledge, forging or fabricating patent certificates, patent files, publishing on websites or webpages; 6) “Shanzhai websites” that imitate the official websites of party and government organs, schools, banks, news media, etc., and engage in fraudulent activities.
9、Other Violations of Constitution and Laws, Administrative Regulations.
Article 3 You shall not use the UCloud Global cloud services to engage in or attempt to engage in activities that endanger or harm the security of the computer system and the information network:
- Entering into computers and information networks or using computer and information network resources without permission;
- Deleting, modifying, or adding functions to computers and information networks without permission;
- Monitoring data or traffic of computers and information networks without permission;
- Monitoring or spying on computers and information networks without permission, and harming or destroying the monitored or spied on computer systems and information networks;
- Sending a large number of communication requests to the target without permission, resulting in the target being unable to respond to legitimate communications, or causing the target to respond too slowly and become ineffective;
- Manually or electronically bypassing any use restrictions set on the “system” without permission (such as: access and storage restrictions);
- Changed or attempting to change the system configuration provided by UCloud Global or coerced system security without permission;
- Providing any way to obtain illegal information abroad without network censorship or relying on technical means via UCloud Global cloud services without permission;
- Interfering with the normal operation of any computer and information network (such as: deliberately overloading the system with email bombs, news bombs, broadcast attacks, or overflow techniques);
- Falsifying the source (such as: falsifying the TCP-IP packet header, the title of the email, part of the source or path described in a certain file. But this does not include the behavior of using aliases or anonymously forwarding emails);
- Intentionally creating and disseminating destructive programs such as computer viruses;
- Engaging in irregular cross-border activities;
- Rendering security risks to the cloud service or any third party;
- Other hazards to the security of the computer system and the information network.
Article 4
If you are an information service unit providing interactive columns such as online forums, message boards, chat rooms, etc., you should ensure that your operation qualifications are complete, and the property rights and operation rights are clear; at the same time, you should standardize the links on the website to prevent illegal links from existing, and strengthen the review of information posting, implementing the moderator responsibility system, through the combination of technical filtering and manual patrols, further strengthen the blocking and filtering of harmful information, retain user login logs for no less than 60 days.
Article 5
You should strictly supervise and review the content of BBS, chat rooms, search engines, and each section, especially the BBS discussion section of current politics and military affairs, social current affairs and military horizontal, and the related types and sections of search engines. You should ensure that there are no reactionary tendencies, pornographic content, sensitive topics, and articles that have a negative impact on the forum and the company. Strictly prevent the appearance of bad information and/or behavior. If such information and/or behavior is encountered, immediately back up and record the original information of this information content and the author, including the time of posting, the username and IP address of the author, etc., and immediately delete this information and/or block this type of behavior. Take corresponding measures simultaneously.
Article 6
You shall not abuse email or other messages: You are not allowed to disseminate, publish, send or assist in sending unsolicited mass emails or other messages, promotional information, advertisements or requests, including commercial advertisements and information notifications. Without explicit permission from senders, sender identities should not be changed or masked. Messages sent from another Internet Service Provider (ISP) which violate these rules should not be collected, replied to, or disseminated.
Article 7 The information or services provided by you shall not infringe any third-party intellectual property rights; without authorization, you shall not re-lease UCloud Global products and services.
Article 8
In order to maintain the clear environment of UCloud Global products and the legitimate rights and interests of users, UCloud Global has the right to take necessary measures against rule violations or misuse of UCloud Global products and services, and also reserves the right to pursue civil or criminal liability, and unilaterally choose to terminate all cooperation with you. If UCloud Global takes corresponding measures, it shall not be deemed as breach of contract by UCloud Global, and it shall not need to assume any responsibility for this.
1.The necessary measures include but are not limited to:
(a) Blocking the violative content in the product
(b) Stopping the product containing violative content
(c) Freezing user accounts and preventing them from using all products of UCloud Global
2. Based on the nature of the product and the violation, different measures will be taken, including but not limited to the following products:
^ Type of violation ^ Corresponding treatment measure ^
Network Behavior Type | Includes but is not limited to: port blocking, network blocking, machine shutdown, freezing of users, clear out, etc. |
UHost | General violation handling: page access is prohibited; |
::: | Serious violation handling: website access is prohibited; |
::: | Especially serious violation handling: shutdown of host, account freezing. |
UFile | General violation handling: content blocking; |
::: | Serious violation handling: bucket freezing; |
::: | Especially serious violation handling: service stoppage, account freezing. |
UCDN | General violation handling: acceleration page offline; |
::: | Serious violation handling: acceleration domain name offline; |
::: | Especially serious violation handling: service stoppage, account freezing. |
ULB | General violation handling: page access is prohibited; |
::: | Serious violation handling: website access is prohibited; |
::: | Especially serious violation handling: ULB shutdown, account freezing. - |
Article 9 For violations requiring handling by the superior department, UCloud Global will directly handle according to the penalty opinion of the superior.
Article 10
UCloud Global can report any suspected illegal activities to relevant administrative authorities, judicial authorities, law enforcement agencies, regulatory agencies or other appropriate third parties. UCloud Global‘s reports may disclose appropriate customer information. UCloud Global may cooperate with relevant administrative authorities, judicial authorities, law enforcement agencies, regulatory agencies or other appropriate third parties to provide information related to the network and system and your content related to suspected violation of these rules, laws and regulations or infringement of third party rights, assisting in investigation and prosecution of illegal activities. UCloud Global is entitled to claim all costs and losses incurred by it for cooperating with national authorities for investigation, evidence collection and disposal requests, including but not limited to profit loss, reputation loss, etc., which are all borne by you.