iHost – Terms and Conditions
Users need to fulfil the following requirements when they use the iHost service to host their websites or applications (collectively referred as “websites” as follows).

Role and Responsibilities 

A business owner (or project owner) owns the iHost account and the website contents or data that the account is hosting.  Besides defining all business requirements of the websites, a project owner also needs to appoint a technical owner (or a vendor) to help take care of the technical requirements imposed by iHost services.

Policies and Guidelines

iHost account owners should observe and follow the policies and guidelines below.

Cybersecurity Requirements

Health-check Scanning and Security Vulnerabilities

  • Before launching your websites for production, a health-check scanning is recommended.
  • You are also requested to carry out health-check scanning to your websites after each major update.  

Account Renewal & Archival 

Hosting accounts will be valid for one year initially.  Your departmental Cybersecurity coordinators (CSCs) will receive email notification from ITSC when it is time to renew the website. If your CSCs do not respond to our emails by the deadline listed in the emails, the websites will then be disabled and archived. 
In case the websites are no longer needed, please ask your departmental CSCs to inform us to arrange to remove and archive the websites.

Regular Security/ Maintenance, End-of-life Schedule and Migration

iHost servers will be regularly patched for security updates.  It would, although it is rare, potentially break some of your programs when applying the security updates.  The technical owners (or your vendors) are required to resolve the issues if it happens. 

When an iHost server reaches the end of its supported date (i.e. end-of-life date), users having websites on that iHost server will need to migrate their contents to another supported server.

iHost Servers

Support End Date