Acceptable Use Policy
Last updated: September 10, 2024
Purpose
This Acceptable Use Policy ("AUP") governs your use of Cloudmost's cloud platform services. It outlines prohibited activities and usage guidelines to ensure a secure, reliable, and lawful environment for all users.
Scope
This policy applies to all users of Cloudmost services, including:
- Application hosting and deployment services
- Database and storage services
- Content delivery network (CDN)
- Domain and SSL management
- Monitoring and analytics tools
- API and developer tools
Prohibited Activities
Illegal or Harmful Content
You may not use our services to host, distribute, or transmit:
- Content that violates applicable laws or regulations
- Copyrighted material without proper authorization
- Obscene, defamatory, or harassing content
- Content promoting violence, terrorism, or illegal activities
- Child exploitation material or content harmful to minors
- Hate speech or discriminatory content
- Personal information without consent (doxxing)
Security Violations
Prohibited security-related activities include:
- Unauthorized access to systems, networks, or data
- Distributing malware, viruses, or malicious code
- Conducting or facilitating hacking activities
- Attempting to breach security measures
- Scanning, probing, or testing vulnerabilities
- Interfering with platform operations
- Circumventing usage limitations or access controls
Network Abuse
The following network activities are prohibited:
- Conducting distributed denial-of-service (DDoS) attacks
- Network scanning or port scanning
- IP spoofing or packet manipulation
- Overwhelming network resources
- Unauthorized network monitoring
- Attempting to intercept communications
Spam and Unwanted Communications
- Sending unsolicited bulk emails or messages
- Operating mail servers for spam distribution
- Harvesting email addresses without permission
- Creating fake accounts or identities
- Automated scraping or data collection
- Phishing or social engineering attacks
Resource Abuse
Excessive or inappropriate resource usage includes:
- Cryptocurrency mining without authorization
- Running applications that consume excessive CPU, memory, or bandwidth
- Operating proxy servers or anonymization services
- File sharing or torrent applications
- Game servers or high-traffic streaming
- Load testing against external targets
Permitted Uses
Cloudmost services are designed for legitimate business and personal use, including:
- Web applications and websites
- API services and microservices
- Development and testing environments
- Data processing and analytics
- Content management systems
- E-commerce platforms
- Educational and research projects
- Open source software development
Resource Usage Guidelines
Fair Use
- Use resources proportionate to your subscription level
- Optimize applications for efficient resource consumption
- Monitor and manage your resource usage
- Contact support for legitimate high-usage requirements
Performance Limits
- CPU usage should not consistently exceed allocated limits
- Memory usage should be optimized and monitored
- Network traffic should be reasonable for your application
- Storage usage should align with your plan limits
Burst Usage
- Short-term resource spikes are acceptable
- Sustained high usage may require plan upgrades
- We may throttle or suspend excessive usage
- Contact support for planned traffic increases
Content Responsibilities
User-Generated Content
- You are responsible for all content hosted on your account
- Implement appropriate content moderation for user uploads
- Respond promptly to abuse reports
- Maintain backup copies of important data
Third-Party Content
- Ensure proper licensing for third-party content
- Respect intellectual property rights
- Comply with content provider terms of service
- Implement appropriate attribution where required
Security Requirements
Account Security
- Use strong, unique passwords
- Enable multi-factor authentication
- Regularly review account access
- Report security incidents immediately
Application Security
- Keep software and dependencies updated
- Implement proper input validation
- Use secure coding practices
- Configure appropriate access controls
- Encrypt sensitive data
Monitoring and Compliance
Automated Monitoring
We may monitor your usage to:
- Ensure compliance with this policy
- Detect security threats and abuse
- Maintain platform performance and stability
- Investigate reported violations
Compliance Obligations
- Comply with applicable laws and regulations
- Respect data protection and privacy requirements
- Maintain appropriate records and documentation
- Cooperate with legal and regulatory requests
Reporting Violations
If you become aware of violations of this policy:
- Report abuse via our support system
- Include relevant details and evidence
- Do not attempt to investigate or retaliate
- Follow up if no action is taken within reasonable time
Report Abuse
- Email: [email protected]
- Support: Contact Support
- Emergency: Use priority support for urgent security issues
Enforcement
Investigation Process
- We will investigate reported violations promptly
- Account holders will be notified of investigations
- Evidence will be preserved for review
- Decisions will be communicated clearly
Enforcement Actions
Violations may result in:
- Warning notifications
- Content removal or blocking
- Service restrictions or throttling
- Account suspension or termination
- Legal action if required
Appeals Process
- You may appeal enforcement actions
- Provide additional context or evidence
- Appeals will be reviewed by senior staff
- Decisions will be communicated within 5 business days
Consequences of Violations
Service Restrictions
- Temporary suspension of specific features
- Reduced resource allocations
- Restricted access to certain services
- Enhanced monitoring and oversight
Account Termination
Serious or repeated violations may result in:
- Immediate account suspension
- Permanent account termination
- Forfeiture of remaining service credits
- Ban from creating new accounts
Updates to This Policy
We may update this Acceptable Use Policy periodically to:
- Reflect changes in our services
- Address new security threats
- Comply with legal requirements
- Improve clarity and understanding
Material changes will be communicated via email or platform notifications at least 30 days before taking effect.
Contact Information
For questions about this Acceptable Use Policy:
- Email: [email protected]
- Support: Contact Support
- Abuse reports: [email protected]
- Related policies: Terms of Service