Acceptable Use Policy
Guidelines for responsible hosting and prohibited activities. Learn about content restrictions, service limitations, and our commitment to maintaining a secure hosting environment.
Legal Compliance
All services must comply with applicable laws and regulations in all jurisdictions
Prohibited Content
Clear guidelines on prohibited content and activities to maintain service integrity
Security Standards
Security requirements and best practices to protect all users and infrastructure
Acceptable Use Policy Terms
Comprehensive guidelines for responsible hosting and service usage
General Principles
Vertex Hosting is committed to providing reliable, secure, and professional hosting services. This Acceptable Use Policy outlines the rules and guidelines that all customers must follow to ensure a safe and productive hosting environment for all users.
Core Principles:
- Legal Compliance: All activities must comply with applicable local, national, and international laws
- Respect for Others: Services must not be used to harm, harass, or infringe upon the rights of others
- Security: Customers must maintain appropriate security measures and not compromise system integrity
- Resource Management: Services must be used responsibly without excessive resource consumption
Prohibited Content and Activities
Illegal Content:
- Copyright Infringement: Hosting copyrighted material without proper authorization
- Illegal Software: Distribution of pirated software, cracks, or license bypasses
- Illegal Activities: Content promoting or facilitating illegal activities
- Fraudulent Content: Phishing sites, scams, or deceptive practices
Harmful Content:
- Malware Distribution: Hosting or distributing viruses, trojans, or other malicious software
- Spam and Unsolicited Content: Mass unsolicited emails, comments, or messages
- Harassment: Content designed to harass, threaten, or intimidate individuals
- Hate Speech: Content promoting discrimination, violence, or hatred
System Abuse:
- DDoS Attacks: Initiating or participating in distributed denial-of-service attacks
- Port Scanning: Unauthorized scanning of networks or systems
- Brute Force Attacks: Attempting to gain unauthorized access to systems
- Resource Abuse: Excessive CPU, memory, or bandwidth usage affecting other users
Security Requirements
Account Security:
- Strong Passwords: Use strong, unique passwords for all accounts
- Two-Factor Authentication: Enable 2FA where available
- Access Control: Limit access to authorized personnel only
- Regular Updates: Keep all software and systems updated
Data Protection:
- Encryption: Use encryption for sensitive data transmission and storage
- Backup Security: Secure backup procedures and storage
- Access Logging: Maintain logs of system access and changes
- Incident Response: Have procedures for security incident response
Policy Enforcement
Violation Consequences:
- Warning: First violations may result in a warning and request for compliance
- Suspension: Repeated violations may result in temporary service suspension
- Termination: Serious violations may result in immediate account termination
- Legal Action: Violations may be reported to appropriate authorities
Appeal Process:
- Review Request: Customers may request review of enforcement actions
- Evidence Submission: Provide evidence to support your case
- Timeline: Appeals are typically reviewed within 5 business days
- Final Decision: Our decision on appeals is final
Questions About Our Policy?
Our compliance team is available to help clarify any questions about our acceptable use policy.