...

Acceptable Use Policy

Published on

All data is current as of

This Acceptable Use Policy (“Policy”) describes the prohibited uses and acceptable uses of the network, services, sites, resources, products, services, and materials referred to collectively as the “Services” and provided by UAB ServerMall and its affiliates (referred to collectively as “Servermall Cloud,” “We,” “Our”) to its customers and users who have registered an account and accessed the Services (collectively, “You,” “Customers,” or “Users”).

This Policy is incorporated by reference into the Servermall Cloud Customer Agreement (the “Agreement”) and forms an integral part of it. Capitalized terms not defined in this Policy have the meanings given in the Agreement.

If there is any conflict between this Policy and any service-specific terms (including trial, promotional, or product-specific terms), the service-specific terms control to the extent of the conflict.

This Policy is non-exhaustive and applies to all Services unless otherwise stated.

1. General Provisions

1.1. Strict compliance. You must use the Services strictly in accordance with the Agreement, this Policy, and applicable law. Servermall Cloud retains the right to determine (acting reasonably and in good faith) whether any use of the Services violates this Policy or creates material risk for Servermall Cloud, the Services, other customers, or third parties.

1.2. Responsibility. You are responsible for:
(a) your use of the Services; and
(b) any use of the Services through your account (including by employees, contractors, agents, end users, or third parties you authorize, and including use resulting from your failure to secure credentials or instances).

1.3. End users and downstream compliance. If you allow third parties (end users, tenants, customers) to access or use the Services, you must ensure they comply with this Policy. Their violations are treated as your violations.

1.4. Changes. We may modify this Policy at any time by posting a revised version on our website. The revised Policy is effective immediately upon posting unless stated otherwise. Your continued use of the Services constitutes acceptance of the revised Policy.

1.5. Non-exhaustive. This Policy is not exhaustive. We may take action against conduct that is harmful, abusive, unsafe, deceptive, or creates legal/reputational/operational risk, even if not explicitly listed.

1.6. Contact. If you have questions about this Policy or wish to report suspected abuse, contact: [email protected]

1.7. Emergency actions. If we reasonably determine that your use poses an immediate or significant risk (e.g., ongoing abuse, malware activity, phishing, active exploitation, DDoS, compromised instances, spam, or fraud), we may immediately restrict, suspend, or terminate access to the Services without prior notice.

2. Definitions

2.1. “User Content” means any content, data, code, software, text, images, audio, video, or other materials uploaded, stored, transmitted, processed, or made available through the Services by you or your end users.

2.2. “System” means any network, computer, communications system, software application, cloud environment, API, endpoint, or computing device (including those owned or operated by Servermall Cloud or any third party).

2.3. “Malware” means any code, software, script, or technology designed to, or that may:
(i) damage, disrupt, disable, interfere with, or expropriate any System, data, or service;
(ii) enable unauthorized access;
(iii) covertly intercept data or communications; or
(iv) facilitate abusive or malicious activity (including viruses, trojans, worms, spyware, ransomware, botnets, droppers, and similar).

2.4. “Security Testing” (or “Vulnerability Testing”) means scanning, probing, enumeration, penetration testing, exploitation, reverse engineering of security controls, or security research that may affect Systems, networks, or data.

2.5. “Spam” means unsolicited bulk messages or unsolicited commercial messages (email, SMS, messaging platforms), and activities that materially contribute to unsolicited messaging (list harvesting, snowshoeing, header falsification, etc.).

2.6. “Search Engine Spam” means practices intended to manipulate search rankings through deceptive means, including link farming, doorway pages, hidden text/links, injected spam links, or similar “SEO poisoning”.

2.7. “Cryptocurrency Mining” means any activity intended to generate cryptocurrency or blockchain-based rewards through computation, including PoW mining, mining pools, “mining-as-a-service”, hashing workloads, and similar reward-generating computations.

2.8. “Cryptojacking” means covert installation or execution of mining software/scripts/containers without informed consent of the owner/administrator, or any mining output obtained through unauthorized access.

2.9. “Cryptocurrency Plotting / Farming” means generation, storage, or farming of large plot/data files for Proof-of-Space / Proof-of-Capacity / Proof-of-Spacetime networks (e.g., Chia-like workloads), typically causing excessive disk I/O and accelerated hardware wear.

2.10. “Excessive Use” means use of shared or underlying platform resources in a manner that unreasonably interferes with the Services, degrades platform performance, creates instability, or consumes a disproportionate share of compute, storage, I/O, or network capacity.

3. Basic Principles and Customer Obligations

3.1. Legal compliance. You must comply with all applicable laws and regulations, including laws relating to privacy and data protection, intellectual property, fraud, cybersecurity, consumer protection, export controls, and sanctions.

3.2. Accurate account information; verification (KYC). You must provide accurate, complete, and truthful account information and keep it up to date. Servermall Cloud may request additional verification (including identity and/or payment method verification) at any time to prevent fraud and abuse. Failure to provide requested verification, or providing materially inconsistent or misleading information, may result in restriction, suspension, or termination.

3.3. Security best practices. You must maintain reasonable security practices, including:
(a) strong authentication and credential protection;
(b) enabling multi-factor authentication where available;
(c) timely patching and updating of operating systems and applications;
(d) secure configuration of internet-facing services (firewalls, access controls, least privilege);
(e) monitoring and promptly remediating compromise.

3.4. Cooperation. You must promptly respond to Servermall Cloud’s requests related to security, abuse, compliance, and incident handling (including requests to stop abusive traffic, remove content, rotate credentials, patch systems, or provide logs within a reasonable timeframe).

3.5. Backups and data. Unless expressly stated otherwise, you are responsible for backups and data protection. Servermall Cloud does not guarantee data retention after suspension or termination.

4. Prohibited Content and Activities

You may not use, encourage, promote, facilitate, or instruct others to use the Services for any prohibited content or activity described below.

4.1 Illegal, Harmful, or Fraudulent Activity

Prohibited uses include, without limitation:
(a) illegal activity, criminal enterprise, or unlawful purpose;
(b) fraud, deception, phishing, pharming, identity theft, account takeover, or impersonation;
(c) money laundering, theft, scams, Ponzi/pyramid schemes, HYIP, or similar “investment” fraud;
(d) use of stolen or unauthorized payment methods, card testing, or attempts to validate payment instruments;
(e) abusive or bad-faith chargebacks, payment disputes, or refund abuse intended to avoid legitimate fees.

4.2 Child Safety and Exploitation (Zero Tolerance)

You may not use the Services to create, store, distribute, or facilitate child sexual exploitation or abuse material (CSAM), or any content/activity that endangers minors. We may report suspected violations to appropriate authorities and organizations as required or permitted by law.

4.3 Harmful, Abusive, or Offensive Content

You may not use the Services to transmit, host, or distribute content that:
(a) incites or threatens violence;
(b) is unlawfully hateful, harassing, or intimidating;
(c) promotes self-harm or suicide;
(d) is obscene or otherwise unlawful.

4.4 Intellectual Property Infringement and “Warez”

You may not infringe, misappropriate, or otherwise violate intellectual property or proprietary rights. This includes hosting, distributing, linking to, or facilitating access to pirated software, cracked software, license key generators, circumvention tools intended for unlawful use, or other “warez” ecosystems.

4.5 Privacy Violations, Surveillance, and Unauthorized Data Collection

You may not:
(a) unlawfully collect, access, disclose, sell, or trade personal data or confidential information;
(b) engage in doxxing, unlawful surveillance, or interception of communications;
(c) operate spyware, stalking tools, or credential harvesting pages;
(d) scrape or harvest data in violation of law or binding third-party terms.

4.6 Malware, Botnets, and Malicious Infrastructure

You may not use the Services to:
(a) create, distribute, host, or operate Malware;
(b) operate command-and-control (C2) infrastructure, botnets, exploit kits, droppers, credential theft systems, or malicious redirectors;
(c) distribute ransomware, steal credentials, or exfiltrate data;
(d) facilitate exploitation of vulnerabilities without authorization.

4.7 Spam, Messaging Abuse, and Search Engine Spam

You must comply with our No Spam Policy and applicable law. You may not:
(a) send or facilitate Spam (email, SMS, messaging platforms);
(b) operate open mail relays or otherwise abuse mail systems;
(c) falsify, forge, obscure, or misrepresent message headers or sender identity;
(d) engage in activities likely to cause Servermall Cloud IPs/domains to be listed on blocklists;
(e) engage in Search Engine Spam, link farming, or hosting “doorway pages” intended to manipulate search engine rankings via deceptive means, including injecting spam links into websites or applications.

Port 25 (SMTP) restrictions:
By default, Servermall Cloud may block outbound traffic on port 25 (SMTP) to prevent abuse. You may request removal of this block subject to identity verification and approval of your use case. We reserve the right to deny such requests or re-impose blocks at our discretion, including to protect platform reputation and prevent abuse.
(See also: https://cloud.servermall.com/documentation/remote_blocked_ports/)

4.8 Security Violations and Unauthorized Access

You may not:
(a) access or use any System without permission;
(b) attempt to probe, scan, enumerate, or test the vulnerability of any System you do not own/control or lack explicit authorization to test;
(c) breach or attempt to breach security or authentication measures;
(d) intercept or monitor data/traffic without permission;
(e) spoof identities or unlawfully manipulate packet headers or routing information.

4.9 Vulnerability Testing Rules

(a) Third-party targets. Security Testing of third-party targets is prohibited unless you have explicit written authorization from the target owner and the testing is lawful.
(b) Servermall Cloud infrastructure. Any Security Testing targeting Servermall Cloud systems, Servermall Cloud management interfaces, Servermall Cloud IP space, or shared platform components is prohibited without Servermall Cloud’s prior written consent and a defined scope.
(c) Your own resources. You may test your own instances only to the extent such testing does not cause disruption, excessive traffic, collateral impact, or otherwise violate this Policy. We may require you to stop, rate-limit, or coordinate testing.

4.10 Network Abuse

You may not:
(a) conduct or facilitate DoS/DDoS attacks or traffic flooding against any target;
(b) run amplification/reflection attacks or operate infrastructure enabling such attacks;
(c) operate open proxies, open recursive DNS resolvers, or other misconfigured services that enable abuse;
(d) port scan or probe networks/systems without explicit authorization;
(e) interfere with the proper functioning of any System or attempt to overload it;
(f) engage in actions likely to cause retaliation against Servermall Cloud or its network.

4.11 Resource Abuse and Prohibited High-Impact Workloads

You may not use the Services in a manner that causes Excessive Use or disrupts the platform. Unless explicitly authorized by Servermall Cloud in writing (or expressly permitted by a dedicated service plan), the following are prohibited:
(a) Cryptocurrency Mining (CPU/GPU mining, mining pools, mining-as-a-service);
(b) Cryptojacking in any form;
(c) Cryptocurrency Plotting / Farming (proof-of-space/capacity plotting workloads);
(d) continuous benchmarking, stress testing, burn-in workloads, or synthetic load intended primarily to consume resources;
(e) password cracking, credential stuffing, brute-force services, or “cracking-as-a-service”;
(f) click-fraud, ad-fraud, traffic-exchange schemes, or similar reward/profit-generation abuse;
(g) large-scale scraping that materially degrades Services or violates third-party terms/law.

Servermall Cloud reserves the right to throttle, quarantine, restrict, or suspend resources exhibiting sustained patterns indicative of prohibited activity.

4.12 Anonymization Services and Public Gateways

You may not:
(a) operate Tor exit nodes;
(b) operate public VPN/proxy/anonymization services offered to the general public or resold as a service without Servermall Cloud’s prior written consent;
(c) provide “VPN/proxy as a service” in a way that creates abuse or reputational risk.

Personal/private VPNs used strictly for your own secure access or internal business networking may be permitted, provided they are not operated as a public gateway and do not generate abuse.

4.13 Abuse-Adjacent Services (“Bulletproof Hosting” and Similar)

You may not use the Services to operate or support services commonly associated with abuse ecosystems, including:
(a) “bulletproof hosting” offerings;
(b) phishing kits, scam landing pages, or similar tooling;
(c) booter/stresser services (DDoS-for-hire) or related infrastructure;
(d) marketplaces or services for malware distribution, stolen data, or credential trading.

4.14 Misuse of IP Addresses, Routing, and BYOIP/BGP

You may not hijack, intercept, spoof, “park”, or otherwise misuse IP space or routing (including BYOIP/BGP features), or use routing features to facilitate abusive activity.

4.15 Circumvention and Evasion

You may not:
(a) circumvent service limits, restrictions, security controls, or network blocks;
(b) evade enforcement actions (including suspension/termination) by creating duplicate accounts, rotating identities, or otherwise attempting to restore access without authorization;
(c) use false identities or misleading information to obtain access to the Services.

4.16 Trial / Promotion Abuse

You may not:
(a) create multiple accounts to obtain additional trial or promotional benefits;
(b) use inaccurate, misleading, or non-verifiable information for trial/promotion access;
(c) use trial/promotion resources for prohibited workloads or for profit-generation abuse.

4.17 Resale, Subleasing, and Unauthorized Access

You may not resell, sublease, or provide access to the Services to third parties unless expressly authorized by Servermall Cloud in writing (e.g., via a reseller agreement).

4.18 High-Risk and Safety-Critical Uses

Unless expressly agreed in writing by Servermall Cloud, you may not use the Services in any application where failure could lead to death, serious bodily injury, or severe physical/environmental damage.

5. Monitoring, Investigation, and Enforcement

5.1. Monitoring and investigation. Servermall Cloud may (but is not obligated to) monitor indicators of abuse, investigate suspected violations, and take measures aimed at stopping illegal activity and misuse. We are not obligated to monitor or review all User Content or all traffic.

5.2. Enforcement actions. If we determine (or reasonably suspect) that you have violated this Policy, we may take actions including, without limitation:
(a) requesting additional information or verification from you;
(b) requiring you to stop activity or remediate within a defined timeframe;
(c) removing, disabling access to, or restricting User Content or resources;
(d) limiting resource usage, bandwidth, ports, protocols, or functionality (throttling/blocks);
(e) suspending or terminating the Services or your account (immediately if needed);
(f) deleting resources or data where required for safety, legal compliance, or platform protection.

5.3. Disclosure to third parties. To protect Servermall Cloud, the Services, customers, and the public, we may report suspected unlawful activity to law enforcement, regulators, and other appropriate parties, and may disclose relevant information as permitted by law and our privacy policy.

5.4. Fees, credits, refunds, and administrative charges. Consequences of violations (including treatment of fees, credits, chargebacks, and refunds) are governed by the Agreement and applicable service-specific terms. To the extent permitted by law and the Agreement, Servermall Cloud may deny refunds, retain fees/credits, and recover costs caused by abuse.
Where abuse is confirmed, Servermall Cloud may charge a reasonable administrative fee (e.g., starting at $50 USD per incident or the equivalent) to cover abuse handling, incident investigation, and IP reputation remediation (including delisting), and may recover additional direct costs where applicable (e.g., third-party claims, legal fees, or hardware wear caused by prohibited workloads such as plotting).

5.5. Data retention; preservation. We may retain, preserve, or delete data in accordance with the Agreement, applicable law, and operational needs. We do not guarantee data retention after suspension or termination. We may preserve evidence (logs, snapshots, records) for security, compliance, and legal purposes.

6. Reporting Violations

6.1. If you become aware of any violation of this Policy, you must promptly report it and provide reasonable cooperation to stop or remedy the violation.

6.2. Report suspected abuse to: [email protected].

7. Changes to This Policy

7.1. We may update this Policy at any time as described in Section 1.4. The “Last Updated” date indicates when changes were last made.

7.2. Your continued use of the Services after any update constitutes acceptance of the updated Policy.