Acceptable Use Policy

This Acceptable Use Policy (AUP) outlines the rules, guidelines, and prohibited activities related to our Web Hosting, Cloud Hosting, and Email Hosting services. The purpose of this policy is to ensure that our services are used responsibly, ethically, and lawfully.

All customers and users of our hosting services must agree to comply with this AUP. Failure to adhere to these terms may result in the suspension or termination of services.

By using our services, you acknowledge that you have read, understood, and agreed to comply with this policy. If you do not agree with any part of this AUP, you should immediately stop using the services.

1. General Provisions

1.1 Compliance with Laws
You must comply with all applicable local, national, and international laws and regulations when using our services. This includes but is not limited to laws regarding intellectual property, data protection, privacy, and cybercrime.

1.2 Responsible Use
You agree to use the services in a manner that is ethical and respectful to others. You must not use the services for any purpose that is illegal, harmful, or that violates the rights of others.

1.3 Service Integrity
You must not engage in any activity that could harm the operation, security, or integrity of our hosting infrastructure. This includes activities that result in excessive resource usage, service disruption, or unauthorized access to other users’ accounts.

2. Web Hosting Usage

2.1 Content Restrictions
You may not use our web hosting services to store, host, or transmit content that is illegal, offensive, or harmful. This includes but is not limited to:

  • Illegal content: Content that violates any applicable laws or regulations, including but not limited to copyright-infringing material, child pornography, or any material that promotes illegal activities.
  • Offensive content: Content that promotes hatred, discrimination, or violence against individuals or groups based on race, religion, gender, sexual orientation, or ethnicity.
  • Malware or harmful content: Any content that contains viruses, worms, Trojans, or other malicious code designed to damage or disrupt the operations of our systems or others.

2.2 Spam and Mass Mailing
The use of web hosting services for sending unsolicited bulk emails (spam) is strictly prohibited. This includes any activities related to promoting unsolicited email lists, running mailing lists without proper consent, or participating in any activity that may result in blacklisting of our IP addresses.

2.3 Resource Usage
You are expected to use server resources (CPU, bandwidth, storage, etc.) within reasonable limits. Excessive resource usage that negatively impacts other users or the overall server performance is not allowed. If your usage exceeds normal thresholds, we may ask you to upgrade to a more suitable plan or limit your usage.

2.4 Prohibited Activities
The following activities are strictly prohibited on our web hosting services:

  • Running illegal or pirated software.
  • Hosting websites or content related to hacking, cracking, or other illegal cyber activities.
  • Using web hosting services as a backup or file storage system for large files unrelated to web hosting (e.g., videos, archives).

3. Cloud Hosting Usage

3.1 Service Customization and Management
Our cloud hosting services provide you with a flexible and scalable environment. You are responsible for managing and securing your applications, databases, and other software hosted on our cloud infrastructure.

3.2 Security and Unauthorized Access
You are responsible for maintaining the security of your cloud hosting environment. This includes regularly updating your software, applying patches, and following industry best practices for securing your applications and data. Any attempt to gain unauthorized access to our cloud infrastructure or other users’ environments is strictly prohibited.

3.3 Prohibited Activities
The following activities are not allowed when using our cloud hosting services:

  • Distributed Denial of Service (DDoS) attacks: You may not use cloud resources to initiate or participate in any form of DDoS attack.
  • Cryptocurrency mining: Using cloud resources for cryptocurrency mining is prohibited unless explicitly permitted in your service agreement.
  • Data scraping or harvesting: Activities such as scraping, data harvesting, or using bots to extract information from third-party websites without permission are not allowed.

3.4 Compliance with Resource Limits
Your cloud hosting plan may have specific limits for computing resources (e.g., CPU, memory, disk space, bandwidth). You must ensure that your usage stays within the allotted resources. Consistent overuse may result in additional charges or a requirement to upgrade to a higher-tier service.

3.5 Backup and Disaster Recovery
While we provide infrastructure reliability, you are responsible for ensuring that you have adequate backups of your data. We recommend using automated backup solutions and regularly testing your disaster recovery procedures.

4. Email Hosting Usage

4.1 Email Content and Delivery
You are responsible for ensuring that all email sent from your account complies with relevant laws and regulations, including those related to anti-spam. This means that emails must not be unsolicited, deceptive, or malicious.

4.2 Prohibited Email Use
You may not use our email hosting services to:

  • Send spam or unsolicited bulk emails.
  • Use false or misleading headers or sender information.
  • Phish for sensitive information such as usernames, passwords, or credit card details.
  • Distribute malware, viruses, or harmful links through email.

4.3 Email Storage and Quotas
Each email hosting plan comes with specific storage limits. You are responsible for managing your email storage within these quotas. Excessive storage usage beyond your allocated limit may result in additional fees or service interruptions.

4.4 Security and Privacy
You must take reasonable steps to secure your email accounts, including using strong passwords and enabling two-factor authentication where available. We are not responsible for any unauthorized access to your email accounts due to your failure to follow security best practices.

5. Prohibited Actions Across All Services

The following activities are prohibited across all of our hosting services:

5.1 Unauthorized Access
Attempting to gain unauthorized access to our systems, servers, or other users’ accounts or data is strictly prohibited. This includes exploiting vulnerabilities or engaging in any activity intended to compromise system security.

5.2 Network Abuse
Any activities that disrupt or interfere with the normal operation of our network or services are not allowed. This includes generating excessive traffic, consuming disproportionate resources, or launching attacks such as DDoS.

5.3 Fraudulent Activity
Engaging in fraudulent activities, such as impersonating others, creating fake accounts, or using our services for deceptive purposes, is prohibited.

5.4 Intellectual Property Violations
You may not use our services to infringe upon the intellectual property rights of others. This includes distributing or hosting pirated software, music, videos, or other copyrighted material without permission.

6. Consequences of Violation

6.1 Service Suspension or Termination
If we determine that you have violated this Acceptable Use Policy, we may suspend or terminate your services without notice. In severe cases, we may also report the violation to the appropriate legal authorities.

6.2 Liability for Damages
You may be held liable for any damages, costs, or legal fees that result from your violation of this AUP. We reserve the right to seek compensation for any harm caused to our systems, network, or other users due to your actions.

7. Modifications to the AUP

We reserve the right to modify this Acceptable Use Policy at any time. Any changes will be posted on our website, and it is your responsibility to review this policy regularly. Continued use of our services following any changes indicates your acceptance of the revised AUP.

8. Contact Information

If you have any questions about this Acceptable Use Policy, please contact our support team at support@decasix.com.

This Acceptable Use Policy is designed to ensure the responsible and lawful use of our services while protecting our users and maintaining a reliable hosting environment for everyone. Thank you for your cooperation.