Acceptable Use Policy (AUP)
Last Updated: August 2024
This Acceptable Use Policy (“AUP”) sets forth guidelines for the acceptable use of services provided by Hostyt. By using our services, you agree to comply with this AUP.
1. General Use Guidelines
1.1 – Users are responsible for ensuring that their use of the services complies with all applicable laws and does not interfere with other users.
1.2 – Services may only be used for lawful purposes. Any activity that violates applicable laws, regulations, or industry standards is strictly prohibited.
1.3 – Users must ensure that their usage does not negatively impact the security, stability, or integrity of Hostyt’s infrastructure or that of our suppliers.
2. Prohibited Activities
The following activities are not permitted and may result in suspension or termination of services:
2.1 – Resource Abuse
2.1.1 – Excessive use of system resources that disrupts the stability or performance of Hostyt’s infrastructure or affects other users.
2.1.2 – Any activity that degrades network performance, disrupts operations, or overburdens the system.
2.2 – Unauthorized Access & Security Violations
2.2.1 – Any attempt to access accounts, systems, or networks without proper authorization.
2.2.2 – Distribution of malicious software, including viruses, worms, Trojans, or any code designed to harm, intercept, or misappropriate data.
2.3 – Unsolicited Communications
2.3.1 – Sending bulk, unsolicited, or deceptive communications (spam) is prohibited.
2.3.2 – Hosting services designed to send unsolicited emails, messages, or automated calls is not permitted.
2.4 – Malicious or Harmful Content
2.4.1 – Hosting, distributing, or linking to content that is intended to harm individuals, disrupt services, or violate applicable laws.
2.4.2 – Any material that promotes illegal activities, exploits vulnerabilities, or encourages unauthorized system access.
2.5 – Abuse of Services
2.5.1 – Engaging in activities that may lead to service interruptions or pose risks to the integrity of Hostyt’s network or that of its suppliers.
2.5.2 – Hosting services used for phishing, fraud, or identity theft.
3. Enforcement & Remedial Action
3.1 – Violations of this AUP may result in warnings, suspension, or termination of services at Hostyt’s discretion.
3.2 – In cases of severe or repeated abuse, Hostyt may immediately suspend or terminate the offending service.
3.3 – If required by law, Hostyt may cooperate with authorities and provide necessary information to assist investigations.
4. Data Processing & Third-Party Providers
4.1 – Hostyt may utilize third-party providers for infrastructure, security, and other operational needs.
4.2 – User data may be processed by Hostyt or its suppliers in various locations, subject to applicable regulations.
4.3 – By using Hostyt’s services, you acknowledge and agree that data processing may be carried out by multiple entities supporting service functionality.
5. Changes to This AUP
5.1 – Hostyt reserves the right to modify this AUP at any time. Continued use of our services constitutes acceptance of any changes.
For any inquiries regarding this policy, please contact us.