Acceptable Use Policy

Updated at 2024-01-01

1. Lawful and Prohibited Uses

The services provided are intended for lawful uses only. Users agree not to employ the services for:

  • 1.1 Any actions not aligned with the terms of your contract with our company.
  • 1.2 Causing harm or attempting to cause harm to individuals, including minors, or infringing on others' personal rights.
  • 1.3 Operating a Tor Exit Node.
  • 1.4 Conducting cryptocurrency-related activities, including mining.
  • 1.5 Violating the copyright, trademark, intellectual property rights, or trade secrets of others.
  • 1.6 Distributing unsolicited or unauthorized promotional materials, advertisements, or any form of solicitation (spam).
  • 1.7 Violating any local, national, or international laws or regulations.
  • 1.8 Defamatory, obscene, offensive, threatening, or abusive behaviors.
  • 1.9 Sending or uploading harmful materials like viruses, worms, or other destructive codes.
  • 1.10 Engaging in any fraudulent activities or any actions with fraudulent intentions.

2. Specific Unacceptable Practices

Without limiting the scope of prohibited behaviors, the following activities are expressly forbidden:

  • 2.1 Posting or transmitting materials that violate any laws, are threatening, obscene, indecent, or defamatory.
  • 2.2 Installing or distributing unlicensed software.
  • 2.3 Reselling our services without explicit written permission, unless as an authorized distributor.
  • 2.4 Engaging in deceptive marketing strategies.
  • 2.5 Sending unsolicited messages or engaging in email spam.
  • 2.6 Unauthorized mail header forging.
  • 2.7 Inhibiting others' use of our services or causing excessive network traffic through non-standard usage.
  • 2.8 Introducing malicious software into our network.
  • 2.9 Attempting security breaches or disruptions of internet communications.
  • 2.10 Unauthorized network monitoring or data interception.
  • 2.11 Circumventing authentication or security measures of networks, servers, or accounts.
  • 2.12 Denial of service attacks or interference with service to other users.
  • 2.13 Using scripts or commands to disrupt others' terminal sessions.
  • 2.14 Providing incorrect information on contract forms or attempting to bypass usage documentation processes.
  • 2.15 Harassing individuals via communication frequency or message size.
  • 2.16 Using our services to advertise without permission.
  • 2.17 Overusing server resources, particularly by using high CPU capacity (%80+) for extended periods ( 30min+)
  • 2.18 Using servers for network scanning operations.
  • 2.19 Exporting content in violation of UK laws or without necessary licenses.
  • 2.20 Chain letters or pyramid schemes creation and distribution.

3. Enforcement and Response

  • 3.1 We reserve the right to determine what constitutes a policy breach.
  • 3.2 Following a breach, we may take actions including, but not limited to:
    • 3.2.1 Revoking your service access temporarily or permanently.
    • 3.2.2 Removing your posts or materials.
    • 3.2.3 Issuing warnings.
    • 3.2.4 Pursuing legal actions for cost recovery on an indemnity basis, including legal fees.
    • 3.2.5 Further legal proceedings.
    • 3.2.6 Informing law enforcement authorities.

4. Exclusion of Liability

We are not liable for actions taken in response to breaches. We may take any appropriate actions beyond those described.

5. Agreement Terms Violation

Violations of these terms will be considered material breaches of the service agreement. This version rephrases and reorders the content to maintain the essence of the original policy while providing a unique structure and wording.

Contact Us

Don't hesitate to contact us if you have any questions.