Acceptable Use Policy

The following activities are NOT permitted on our network, virtual machines, physical machines or on your collocated equipment:

  • Sending junk email, header forging, UCE and non-opt-in mailing lists
  • Use, reception or transmission of software or IP not in compliance with applicable license.
  • Use or transmission of malware, virus, trojans, worms, bots or spyware.
  • Hosting of command and control for harmful activities.
  • Participation in or initiation of denial of service attacks.
  • Enabling money laundering, or other illegal activities.
  • Hosting or retransmitting content that is defamatory, obscene, abusive, invasive of privacy, or otherwise objectionable.
  • Activities that may be harmful to others, including customers, our operations or reputation, including offering or disseminating fraudulent goods, services, schemes, or deceptive promotions.
  • Accessing networks or systems without permission, including attempting to probe, scan, or test the vulnerability of a system or to breach any security or authentication measures- unless contracted to do so by the target
  • Monitoring of data or traffic not destined for your network.
  • Forging of IP headers.
  • Intentionally interfering with the proper functioning of any system, including any deliberate attempt to overload a system by mail bombing, broadcast attacks, ddos, or flooding.
  • Cryptographic currency mining, or password cracking
  • Operating network services like open proxies, open mail relays, open ntp, or open recursive domain name servers, which are harmful.
  • Attempting to avoid any use limitations placed on a system, such as access, network, and storage restrictions.
  • Long running storage benchmarks which produce unreasonable levels of wear on our SSD storage.