Fair Use Policy for Unlimited Storage on Our Shared Hosting Packages

At UKC, we take pride in offering unlimited resources as part of a selection of our hosting plans. However, it’s important to understand that “unlimited” resources must be governed by a fair use policy to ensure optimal service quality for all our clients. This policy outlines the responsible usage of our hosting resources, ensuring that every client gets the best possible hosting experience.

1. Purpose of Web Storage:

  • The unlimited hosting space provided is intended solely for the active files necessary for the running of your website. This includes your website’s code, databases, and media files essential for its operation.

2. Prohibited Uses of Web Storage:

  • The hosting space should not be used as a digital archive or for storing backups, large media files not used by your website, or any other files unrelated to the regular functioning of your website. Our goal is to maintain high-performance levels for all users, and using the space for unintended purposes could impair this goal.

3. One Account, One Entity:

  • To maintain the integrity of our hosting environment, each hosting account must only host websites belonging to a single entity. This policy is in place to prevent web agencies or developers from hosting multiple clients’ websites under one account. Each client or entity should have their own dedicated hosting account.

4. Monitoring and Enforcement:

  • We regularly monitor the usage of our hosting services to ensure compliance with this fair use policy. If we find that an account is not adhering to these guidelines, we will reach out to discuss appropriate solutions, which may include upgrading to a more suitable hosting plan or removing non-compliant files.

5. Adaptive Storage Allocation:

  • To enhance the security and efficiency of our hosting services, UKC implements an adaptive storage allocation strategy for our unlimited storage plans. Storage space is allocated in manageable chunks or blocks, and additional storage is provided as and when needed. This proactive approach serves a dual purpose: firstly, it safeguards against potential Distributed Denial of Service (DDoS) attacks, where excessive demands on storage could compromise server stability. Secondly, it prevents a malfunctioning or compromised website from consuming excessive resources, thereby ensuring that all clients on the server are protected from the cascading effects of such incidents. This method of allocation is part of our commitment to maintaining a secure, reliable, and high-performing hosting environment for all our clients.

6. Our Commitment to Quality Hosting:

  • This policy is designed to safeguard the quality and reliability of our hosting services for all clients. By ensuring that our resources are used appropriately, we can continue offering high-quality, unlimited hosting that genuinely meets your website’s needs.

We appreciate your understanding and cooperation in adhering to this fair use policy. It is our commitment to provide you with exceptional hosting services, and adhering to these guidelines helps us achieve this goal for all our clients.

Cookie Policy

cookieLike most websites, this one uses cookies.

Cookies are small text files stored on your computer by your browser. They’re used for many things, such as remembering whether you’ve visited the site before, so that you remain logged in – or to help us work out how many visitors we get each month.

They contain information about the use of your computer but don’t include personal information about you (they don’t store your name, for instance).

This policy explains how cookies are used on UKC websites in general – and, below, how you can control the cookies that may be used on this site (not all of them are used on every site).

About this Cookie policy

This Cookie Policy applies to all of our websites and our mobile applications (“the Website”).

In this Cookie Policy, when we refer to any of our Websites, we mean any website or mobile application operated by or on behalf of Colcatweb Limited or its subsidiaries and affiliates (collectively “UKC“), regardless of how you access the network. This Cookie Policy forms part of and is incorporated into our Website Terms and Conditions.

By accessing the Website, you agree that this Cookie Policy will apply whenever you access the Website on any device.

Any changes to this policy will be posted here. We reserve the right to vary this Cookie Policy from time to time and such changes shall become effective as soon as they are posted. Your continued use of the Website constitutes your agreement to all such changes.

Our use of cookies

We may collect information automatically when you visit the Website, using cookies.

The cookies allow us to identify your computer and find out details about your last visit.

You can choose, below, not to allow cookies. If you do, we can’t guarantee that your experience with the Website will be as good as if you do allow cookies.

The information collected by cookies does not personally identify you; it includes general information about your computer settings, your connection to the Internet e.g. operating system and platform, IP address, your browsing patterns and timings of browsing on the Website and your location.

Most internet browsers accept cookies automatically, but you can change the settings of your browser to erase cookies or prevent automatic acceptance if you prefer.

These links explain how you can control cookies via your browser – remember that if you turn off cookies in your browser then these settings apply to all websites not just this one:

Third-party service cookies

Social sharing, video and other services we offer are run by other companies. These companies may drop cookies on your computer when you use them on our site or if you are already logged in to them.

Here is a list of places where you can find out more about specific services that we may use and their use of cookies:

Site management cookies

These are used to maintain your identity or session on the Website. For instance, where our websites run on more than one server, we use a cookie to ensure that you are sent information by one specific server (otherwise you may log in or out unexpectedly).

We may use similar cookies when you vote in opinion polls to ensure that you can only vote once, and to ensure that you can use our commenting functionality when not logged in (to ensure you don’t see comments you’ve reported as abusive, for instance, or don’t vote comments up/down more than once).

These cookies cannot be turned off individually but you could change your browser setting to refuse all cookies (see above) if you do not wish to accept them.

Datacentres and Servers

On Demand IT Infrastructure

Our servers are housed in six state-of-the art datacentres, with On Demand IT Infrastructure backed by complete redundancy in power, HVAC, fire suppression, network connectivity and security.


Our datacentre partners own and manage 155,000 square feet of datacentre space, with an additional 12,000 square feet of expansion capability. Each facility — wholly owned, managed and operated by our datacentre partner — is equipped to handle any challenge based on these unique advantages:

Our secure datacentres are monitored 24×7 to ensure your servers are always safe

  • N+1 power generator architecture
  • N+2 redundant datacentre HVAC (heating, ventilation, air conditioning) systems
  • Advanced fire suppression systems to keep any fires localised
  • Preventive maintenance meets or exceeds manufacturers recommended practices
  • Maintenance performed regularly by our own highly trained personnel
  • Physical Datacentre Security

SecurityAccess to the datacentres is protected 24 hours a day. In order to gain entry into the data centre all guests must pass through two-factor authentication barriers. A Northern Proximity security badge is required for entry/exit on all data centre doors in the facility. Shifts patrol the data centre and facility area regularly, and motion-sensitive cameras throughout the facilities track all data centre activity.

Multiple-Layer Network Security

Our data centres take network reliability and performance to the next level. We maximise our network security protection by adding Cisco Guard XT appliances and Arbor Peakflow protection against DDoS attacks that could harm your business.


Our data centres combine cutting-edge security technology, best practices and a team of certified senior-level professionals to help ensure that you can safely manage and grow your business. Using state-of-the-art traffic profiling and anomaly detection capabilities, we manage and secure our networks, pinpoint and troubleshoot network attacks, monitor your servers and applications, and analyse network security performance issues.

DDoS Attack Response

Once a DDos attack is detected and confirmed by the Network Operations, the affected traffic is routed through a DDoS Mitigation Service. This filters out the attack traffic and allows the legitimate traffic to continue to its original destination. When the attack has subsided, the original direct path between the destination and the rest of the Internet is restored.

Fully Redundant Datacentre Power

If any of our datacentres were to experience a power disruption for any reason, you’re covered. That’s because we have a complete power management system, including backup generators in the unlikely event that normal power supplies fail.

Uninterrupted Power Supply

dc3Servers within our data centres are fed power through an Uninterrupted Power Supply (UPS) that takes raw power from a utility to control, modulate, and supply it to thousands of individual servers.

The UPS prevents power surges or local brown outs from affecting server performance.

Power typically flows from the local utility to our UPS system to power our servers and the building’s lighting, heating, ventilation and air conditioning systems. In the unlikely event that the local utility power supply is disrupted, our N+1 generator architecture assures that backup generators kick in automatically.

N+1 Backup Generators

Once the power transfer switches sense a decline in power from the local utility, they automatically signal diesel-powered generators to start up and switch power flow to the generators. In the few seconds between the decline in power from the utility and switch over to our backup generators, our UPS units are supplied with power through a battery system that ensures the power supply to servers is uninterrupted.

Should any generator fail, we have additional backup generators that kick in automatically to keep power supplies flowing. And if by any chance there is an extended power outage, on-site diesel generators can run indefinitely. Servers are fed by multiple uninterruptible power supply (UPS) units with redundant instant failover coverage should any single UPS unit fail.

From February 2010 we now automatically host all “Personal”, “Business” and “ProSSL” accounts in our UK datacentre. The “Budget” and “Starter” level accounts will continue to alternate between UK and US datacentres.

Abuse Policy

We take abuse claims seriously


We take the enforcement of all terms and conditions seriously, and we aim to run a clean network which operates on fair principles. We also investigate all reports of abuse.

If you encounter something you think might constitute abuse (for example, spam or inappropriate content) which you believe has come from our network or systems, please read through the information on this page carefully. It explains how you can report it.

This policy covers the following types of abuse

  • Spam, Hacking attempts, IRC activity, Phishing and Web space abuse

We work to minimise the amount of abuse that is generated on our servers. You can help us by reporting any abuse you spot which you believe has come from the UK Cheapest network.

Please report all abuse by Submitting an Abuse Ticket. Your report will automatically open a high priority ticket for the attention of our Abuse Team.

Please include as much information as you can about the type of abuse you’ve encountered. Please also provide log files (if applicable), URLs for site abuse and email headers for spamming. Once we’ve received your report, we’ll investigate the issue thoroughly, contact any relevant customers and resolve the issue as quickly as possible.

Reporting port scanning, attempted hacking and firewall activity

If your report is based on information from a firewall, please ensure that you send the relevant unedited firewall log (or excerpt). Please ensure that the log includes the time, date and time zone. If you see any other misuse on your own servers originating from a UKC IP address, please include in your report the website URL affected and the segments of your web log containing the abuse activity.