Acceptable Use Policy Print

  • 0

Acceptable Use Policy
Published: 15.05.2024 (v24.05.15)


Abuse Definitions

Resource Abuse

  • Any activity, intentional or not, that uses enough system resources to negatively impact other clients or equipment.

Unsolicited Communication

  • Any email sent without the recipient's consent.
  • Allowing or initiating unsolicited emails will lead to immediate termination and a permanent ban from our services.

Malicious Content

  • Scripts, code, or files that perform harmful actions.
  • Content violating local laws.
  • Hosting or permitting malicious content will result in immediate termination and a permanent ban from our services.

Prohibited Actions

  • Introducing malicious programs (e.g., viruses, trojans, worms) into our network or servers.
  • Causing or attempting to cause security breaches or disruptions, such as unauthorized data access, server login attempts, port scans, flood pings, packet spoofing, and forged routing information.
  • Executing network monitoring to intercept data not intended for you.
  • Circumventing authentication or security of any host, network, or account.
  • Interfering with or denying service to others (e.g., denial of service attacks).
  • Using programs/scripts/commands or sending messages to interfere with or disable a user's session.
  • Harassment through language, message frequency, or size.
  • Unauthorized use or forging of mail header information.
  • Sending unsolicited messages or chain letters with the intent to harass or collect replies.

Prohibited Usage

A list of prohibited content and activities includes but is not limited to:

  • All kinds of cryptocurrency mining (e.g., Bitcoin/Ethereum mining, Chia plotting).
  • Child pornography.
  • Malware, viruses, or security exploit activities.
  • Terrorist activities.
  • Email spam.
  • Phishing.
  • Port scanning, brute forcing, or any other hacking attempts.
  • DDoS/DoS attacks, booters, network floods, or similar network attack activities.
  • Any illegal activity as defined by law.
  • Outbound TCP port 25 (SMTP) is blocked by default. This restriction can be removed with valid justification—contact us for more information.
  • IP spoofing.
  • Sending spam emails or distributing malware.
  • Hosting phishing sites.
  • Use of cracked or unlicensed software.

Remedial Action

Intentional/Malicious Abuse

  • Any knowingly harmful action performed by you or authorized persons.
  • All services on the account will be terminated without compensation, except when required by court order.
  • You will be permanently banned from Spaceberg services.

Handling Abuse Offenses

  • The offending service will be suspended.
  • A support ticket will be created detailing the offence and the necessary steps for resolution.
  • Once you acknowledge the issue and agree to resolve it, the service will be reactivated within 24 hours to prevent further abuse.

Failure to address abuse cases will result in suspension, and in severe cases, termination of your services.

Violation Consequences

  • Services violating these terms may be terminated. Spaceberg may suspend or close the service without notice in the event of a breach of these terms.

Was this answer helpful?