Acceptable Use Policy
Prohibited activities
- Distribution of spam and unsolicited email
- DDoS attacks and other forms of cyberattack
- Infringement of copyright
- Distribution of illegal content
- Use for cryptocurrency mining
- Resource abuse (bulk mailing, unauthorised proxy, brute force, port scanning)
- Hosting of malware, phishing or content that violates the law
Consequences of breach
In case of breach: first a warning and requirement to cease the breach; on repeated or serious breach — suspension of service until the cause is remedied; on failure to remedy or gross breach — termination of the agreement without refund.
We protect our infrastructure and other clients. Actions that threaten network stability or the security of other subscribers may result in immediate access restriction.