Terms of Service

Last updated 2026-03-01

1. Scope

1.1 These Terms of Service (“Terms”) apply to all services provided by Torena (“Company”) and govern the use of the Company’s hosting, infrastructure, and related technical services. The Terms apply to all interactions with the Company’s systems and infrastructure, including but not limited to self-service portals, APIs, management interfaces, remote access systems, and network services. These Terms apply to both existing services and any future services or features introduced by the Company unless stated otherwise.

2. Purpose

2.1 The purpose of these Terms is to define the rules governing the use of the Company’s hosting and infrastructure services, establish clear responsibilities between the Company and its clients, and support the secure, stable, and lawful operation of the Company’s technical environment. These Terms are intended to protect the integrity, availability, and security of the Company’s infrastructure, prevent abuse or misuse of services, and ensure that all clients use the services in a fair, responsible, and compliant manner.

3. Services

3.1 The Company provides hosting, infrastructure, and related technical services to its clients. These services may include, but are not limited to, domain-related services, website hosting, virtual private servers (VPS), virtual dedicated servers (VDS), storage services, managed hosting services, colocation services, and other infrastructure or technical services offered by the Company.

3.2 The exact scope, specifications, and conditions of each service are defined in the applicable service description, order confirmation, service agreement, or service level agreement (SLA), where applicable.

3.3 The Company may update, modify, or improve its services as part of normal operational, technical, or security developments.

4. Payments and Renewal

4.1 Fees for services are defined in the applicable service description, order confirmation, or renewal notice provided to the client. By ordering or renewing services, the client agrees to the applicable fees and billing terms.

4.2 Unless otherwise agreed in writing, all services are provided on a prepaid basis, and payment must be received in advance for the applicable service period.

4.3 Invoices for service renewals are issued at least fourteen (14) days before the expiration of the current service period.

4.4 Failure to pay an invoice before the service expiration date may result in service suspension, termination, or deletion of the service and associated data without further notice. The Company shall not be responsible for any resulting loss of data or service availability.

4.5 Where services involve domain name registration or management, failure to complete payment before expiration may result in the loss of the domain name, including its possible release, expiration, or registration by third parties.

4.6 Unless otherwise explicitly stated in a service description or service agreement, payments for services are non-refundable. The Company is not obligated to provide refunds for unused service periods, early termination, or suspension resulting from violations of these Terms.

5. Acceptable Use

5.1 Clients may use the Company’s services only for lawful purposes and in accordance with these Terms, applicable service agreements, and all applicable laws and regulations.

5.2 Services must be used in a manner that does not interfere with the normal operation, security, or stability of the Company’s infrastructure or the services used by other clients.

5.3 Clients are free to deploy applications, systems, and content of their choice within the technical limits of the ordered service, provided that such use complies with these Terms and applicable laws.

5.4 The Company’s services are provided within a shared infrastructure environment. Clients must therefore ensure that their activities do not create operational risks, security threats, or unreasonable resource consumption affecting the Company’s infrastructure or other clients.

6. Prohibited Activities

6.1 Clients must not use the Company’s services for activities that are illegal, harmful, or that may negatively affect the security, stability, or reputation of the Company’s infrastructure or other clients.

6.2 The following activities are strictly prohibited:

  • hosting or distributing illegal content or engaging in unlawful activities.
  • distributing malware, ransomware, spyware, or other malicious software.
  • conducting phishing, fraud, identity theft, or other deceptive practices.
  • launching or participating in distributed denial-of-service (DDoS) attacks.
  • operating botnets, command-and-control servers, or similar malicious infrastructure.
  • sending unsolicited bulk email or operating spam-related services.
  • performing vulnerability scanning, penetration testing, or stress testing of the Company’s infrastructure without prior written authorization.
  • attempting to gain unauthorized access to systems, accounts, or networks.
  • interfering with or disrupting the normal operation of services or infrastructure.

6.3 The Company reserves the right to investigate suspected violations of these Terms and to take appropriate action to prevent or mitigate misuse of its services.

7. Resource Usage

7.1 Clients must use the Company’s services within the technical limits of the ordered service and in accordance with normal hosting and infrastructure usage practices.

7.2 The Company’s services operate within a shared infrastructure environment. Clients must ensure that their use of resources, including processing capacity, memory, storage, and network bandwidth, does not negatively affect the stability or performance of the infrastructure or the services used by other clients.

7.3 Where resource usage significantly exceeds normal operational patterns or affects service stability, the Company may implement reasonable technical measures to maintain infrastructure performance and availability.

8. Security and Monitoring

8.1 To maintain the reliability, security, and integrity of its infrastructure and services, the Company may implement monitoring, logging, automated abuse detection, and other technical and organizational security measures across its systems and networks.

8.2 Such measures are intended to detect operational issues, security incidents, or violations of these Terms and to protect the stability and availability of services.

8.3 Monitoring activities are performed for infrastructure protection purposes and do not involve reviewing client data or hosted content unless required by applicable law or reasonably necessary to investigate security incidents, service abuse, or violations of these Terms.

8.4 Where necessary to maintain infrastructure security and service availability, the Company may implement technical mitigation measures, including traffic filtering, rate limiting, or temporary network restrictions.

9. Client Responsibilities

9.1 Clients are responsible for the proper use and administration of the services they order from the Company.

9.2 The Client shall provide accurate and up-to-date contact information, including administrative and technical contact details, and is responsible for promptly updating such information if it changes. The Company shall not be responsible for any consequences arising from the Client’s failure to maintain accurate contact information.

9.3 Unless explicitly agreed otherwise in a managed services agreement, clients are responsible for the configuration, maintenance, and security of the operating systems, applications, and data hosted within their services.

9.4 Clients must ensure that access credentials to their accounts and systems are kept secure and are not disclosed to unauthorized persons.

9.5 The Client is responsible for maintaining the security and proper operation of all applications, software, and systems installed or managed within the services. This includes ensuring that software is regularly updated and supported by the respective vendors or maintainers.

9.6 The Company may limit or refuse support for software, operating systems, or environments that have reached end-of-life or are no longer supported by their developers. The Company reserves the right to require upgrades or take protective measures where outdated or insecure software poses a risk to the infrastructure, other clients, or service stability.

9.7 Clients are responsible for designing their systems with appropriate redundancy and fault tolerance according to their operational requirements. Services provided by the Company may not include built-in redundancy unless explicitly stated in the service description.

9.8 Clients must ensure that all content, applications, and activities conducted through the services comply with applicable laws and these Terms.

10. Abuse Handling

10.1 The Company reserves the right to restrict, suspend, or terminate services if it reasonably believes that the services are being used in violation of these Terms, applicable laws, or in a manner that threatens the security, stability, or reputation of the Company’s infrastructure or other clients.

10.2 Where possible, the Company will notify the client and provide an opportunity to resolve the issue within a reasonable timeframe. However, the Company may take immediate action without prior notice if such action is necessary to protect infrastructure security, prevent service disruption, respond to abuse incidents, or comply with legal obligations.

10.3 Clients are expected to cooperate with reasonable requests from the Company related to abuse investigations or security incidents involving their services.

11. Data Ownership

11.1 Clients retain full ownership and responsibility for all data, content, applications, and systems hosted within the services provided by the Company.

11.2 The Company does not claim ownership over client data and acts solely as a provider of technical infrastructure and related services.

11.3 Clients are responsible for ensuring that their data and hosted content comply with applicable laws and do not infringe the rights of third parties.

11.4 The Company does not monitor or control the content hosted by clients except where necessary to comply with applicable law, respond to abuse reports, or investigate violations of these Terms.

12. Data Protection

12.1 The Company applies technical and organizational measures designed to protect the security, integrity, and confidentiality of data processed within its infrastructure. Such measures are implemented in accordance with applicable legal requirements and recognized information security practices.

12.2 The Company operates in alignment with regulatory and industry frameworks including the General Data Protection Regulation GDPR, ISO/IEC 27001 information security standards, and relevant cybersecurity obligations such as those arising under the NIS2 Directive. Specific security or compliance commitments may be further defined in service agreements, data processing agreements, or other contractual documentation.

12.3 Unless explicitly stated in the service description or agreed in a separate service agreement, the Company does not guarantee the availability of data backups or the recovery of client data.

12.4 Clients remain responsible for maintaining appropriate and independent backups of their data and systems hosted within the services.

12.5 Where backup services are provided by the Company as part of a service plan or separate agreement, the scope, frequency, and retention of backups are defined in the relevant service documentation.

12.6 Clients are responsible for implementing appropriate business continuity, disaster recovery, and redundancy measures necessary to support their own operational requirements.

12.7 The Company shall not be liable for data loss or operational disruption resulting from the client’s failure to maintain adequate backup, recovery, or continuity arrangements.

13. Service Availability

13.1 The Company makes reasonable efforts to maintain the availability and reliability of its services. Service availability targets, where applicable, may be defined in a separate Service Level Agreement (SLA) or service description.

13.2 The Company may perform planned maintenance, upgrades, or infrastructure improvements that may temporarily affect service availability. Where reasonably possible, clients will be informed in advance of scheduled maintenance.

13.3 In certain situations, including security incidents, infrastructure failures, or other operational risks, the Company may perform emergency maintenance without prior notice in order to restore or protect service availability.

13.4 Temporary service interruptions may occur due to planned maintenance, infrastructure upgrades, or circumstances beyond the Company’s reasonable control.

14. Limitation of Liability

14.1 To the maximum extent permitted by applicable law, the Company shall not be liable for any indirect, incidental, consequential, or special damages, including but not limited to loss of profits, loss of revenue, loss of data, loss of business opportunities, reputational harm, or business interruption, arising from the use of or inability to use the services.

14.2 The Company’s total liability for any claims arising out of or related to the provision of services shall not exceed the total fees paid by the client for the affected services during the three (3) months preceding the event giving rise to the claim.

14.3 The Company shall not be liable for damages resulting from circumstances beyond its reasonable control, including failures of third-party networks, internet infrastructure, software errors, cyber attacks, or other external factors.

14.4 Nothing in these Terms shall limit or exclude liability where such limitation or exclusion is not permitted by applicable law.

15. Force Majeure

15.1 The Company shall not be liable for any failure or delay in the performance of its obligations where such failure or delay results from events beyond its reasonable control.

15.2 Such events may include, but are not limited to, natural disasters, fires, floods, earthquakes, power grid failures, failures of telecommunications or internet infrastructure, cyber attacks of significant scale, acts of war, civil unrest, government actions, or other similar events.

15.3 In the event of such circumstances, the Company will make reasonable efforts to restore services as soon as practicable.

16. Final Provisions

16.1 The Company may update or modify these Terms from time to time to reflect changes in legal requirements, operational practices, security policies, or the services provided. Updated versions of the Terms will be published on the Company’s website or otherwise communicated to clients through appropriate communication channels.

16.2 These Terms are governed by the laws of the Republic of Lithuania. Any disputes arising from or related to these Terms or the services provided by the Company shall be resolved in the courts of the Republic of Lithuania in accordance with applicable laws.

16.3 By ordering new services, extending existing services, or continuing to use the services, the client confirms that they have read, understood, and agree to these Terms and their future amendments.

16.4 If any provision of these Terms is found to be invalid or unenforceable under applicable law, the remaining provisions shall remain in full force and effect.