Acceptable Use Policy

Policies and Resources

1 – Resource Abuse

1.1 – All activities that consume an excessive amount of system resources to the point where it affects others negatively is considered to be an abuse of resources. These activities can be unintentional.

1.2 – All electronic communications sent without the consent of the recipient is an abuse of resources.

1.3 – Engaging in or allowing activity considered to be an abuse of resources is grounds for immediate suspension, and in the case of unsolicited communication, termination without compensation.

2 – Malicious Activity

2.1 – Running any scripts, code, or other files and software that perform harmful activities – either directed towards a single user or as part of a mass action – is considered to be malicious activity.

2.2 – Hosting any content in violation of the laws of the country in which it resides is considered to be malicious activity.

2.3 – Engaging in or allowing activity considered to be malicious activity will result in immediate suspension, termination without compensation, and appropriate legal action.

3 – Intentional Abuse

3.1 – Any actions knowingly performed by the user that are considered to be resource abuse or malicious activity will result in immediate termination of service without compensation.

3.2 – In cases where evidence may be required in a court of law, the service will be suspended immediately without compensation and the data will be held until it can be handed over to the proper authorities.

4 – Suspension

4.1 – Services will be suspended in all cases where resource abuse or malicious activity is detected.

4.2 – Support staff will open a ticket with details regarding the abuse and steps required, if any, to resolve the situation.

4.3 – If appropriate, as soon as the client demonstrates an understanding of the steps to correct the abuse, they will be granted permission back to the services with a limited time window to make corrections.

AMD EPYC
Supermicro
Qemu/KVM