Legal
This document defines the operational, legal, and technical conditions under which Joy Services provides cloud infrastructure, network connectivity, and platform-level services. These Terms are written to reflect real-world infrastructure operations, including routing behavior, security enforcement, and enterprise usage.
Last Updated
22 Apr 2026
Scope
All Services
Version
Enterprise v2
By accessing, purchasing, or using any service provided by Joy Services, you enter into a legally binding agreement. These Terms govern all usage of infrastructure, networking, compute, storage, and platform-level services.
This agreement applies globally and is enforceable regardless of deployment region, routing path, or infrastructure location.
Joy Services operates distributed infrastructure across multiple data centers, IX locations, and transit networks. Service delivery depends on real-time routing decisions, upstream performance, and physical network conditions.
We provide compute, networking, and storage on a shared infrastructure model designed for scalability and performance. No guarantees are made for fixed routing paths or latency.
Customers are fully responsible for all actions executed through their account, including system deployments, network configurations, routing policies, and API interactions.
Compromised credentials, insecure configurations, or misuse of services remain the responsibility of the account owner.
Strict enforcement applies to all infrastructure misuse, including but not limited to:
Joy Services may immediately null-route IPs, disable interfaces, or terminate accounts without prior notice.
Customers using BGP must comply with global routing standards including RPKI validation, IRR registration, and prefix authorization.
We reserve the right to:
Routing is dynamic and may change without notice for performance, stability, or mitigation.
DDoS protection is provided on a mitigation basis, not a prevention guarantee.
Mitigation actions may include:
These actions are applied to protect overall network stability.
Customers retain full ownership of their data. However, they are solely responsible for backup, replication, and data recovery processes.
Data loss due to misconfiguration, deletion, or service termination is not the responsibility of Joy Services.
We maintain logs including authentication logs, API activity, and network telemetry. These logs are used for security, debugging, abuse detection, and infrastructure optimization.
Logs may be retained for operational and legal requirements.
All services are billed in advance. Automatic renewal applies unless cancelled before the billing cycle.
Failure to pay may result in:
Service uptime depends on infrastructure, upstream providers, and internet conditions.
Scheduled maintenance, emergency mitigation, and routing adjustments may affect performance temporarily.
Joy Services reserves the right to suspend or terminate services for policy violations, security risks, or non-payment.
Termination may occur without notice in critical situations.
Joy Services is not liable for indirect, incidental, or consequential damages, including revenue loss or data loss.
Total liability is limited to the amount paid for the affected service.
You agree to indemnify and hold Joy Services harmless from claims arising from your use of services, including legal violations, abuse, or third-party rights infringement.
Both parties agree to protect confidential information and not disclose it without authorization.
Terms may be updated periodically to reflect operational, legal, or infrastructure changes. Continued use of services implies acceptance of updated terms.
Need more clarity?
Whether you're deploying infrastructure, scaling workloads, or optimizing network performance, our team is available to assist with architecture decisions, deployment guidance, and service clarification across all Joy Services offerings.
Availability
Engineering assistance available around the clock for infrastructure and network issues.
Response
Priority response times based on service level and deployment type.
Infrastructure
Distributed presence across major IX and data centers for reliability.
Network
Direct peering, IX connectivity, and optimized routing paths.