Acceptable Use Policy

Last updated: September 10, 2024

Purpose

This Acceptable Use Policy ("AUP") governs your use of Cloudmost's cloud platform services. It outlines prohibited activities and usage guidelines to ensure a secure, reliable, and lawful environment for all users.

Scope

This policy applies to all users of Cloudmost services, including:

  • Application hosting and deployment services
  • Database and storage services
  • Content delivery network (CDN)
  • Domain and SSL management
  • Monitoring and analytics tools
  • API and developer tools

Prohibited Activities

Illegal or Harmful Content

You may not use our services to host, distribute, or transmit:

  • Content that violates applicable laws or regulations
  • Copyrighted material without proper authorization
  • Obscene, defamatory, or harassing content
  • Content promoting violence, terrorism, or illegal activities
  • Child exploitation material or content harmful to minors
  • Hate speech or discriminatory content
  • Personal information without consent (doxxing)

Security Violations

Prohibited security-related activities include:

  • Unauthorized access to systems, networks, or data
  • Distributing malware, viruses, or malicious code
  • Conducting or facilitating hacking activities
  • Attempting to breach security measures
  • Scanning, probing, or testing vulnerabilities
  • Interfering with platform operations
  • Circumventing usage limitations or access controls

Network Abuse

The following network activities are prohibited:

  • Conducting distributed denial-of-service (DDoS) attacks
  • Network scanning or port scanning
  • IP spoofing or packet manipulation
  • Overwhelming network resources
  • Unauthorized network monitoring
  • Attempting to intercept communications

Spam and Unwanted Communications

  • Sending unsolicited bulk emails or messages
  • Operating mail servers for spam distribution
  • Harvesting email addresses without permission
  • Creating fake accounts or identities
  • Automated scraping or data collection
  • Phishing or social engineering attacks

Resource Abuse

Excessive or inappropriate resource usage includes:

  • Cryptocurrency mining without authorization
  • Running applications that consume excessive CPU, memory, or bandwidth
  • Operating proxy servers or anonymization services
  • File sharing or torrent applications
  • Game servers or high-traffic streaming
  • Load testing against external targets

Permitted Uses

Cloudmost services are designed for legitimate business and personal use, including:

  • Web applications and websites
  • API services and microservices
  • Development and testing environments
  • Data processing and analytics
  • Content management systems
  • E-commerce platforms
  • Educational and research projects
  • Open source software development

Resource Usage Guidelines

Fair Use

  • Use resources proportionate to your subscription level
  • Optimize applications for efficient resource consumption
  • Monitor and manage your resource usage
  • Contact support for legitimate high-usage requirements

Performance Limits

  • CPU usage should not consistently exceed allocated limits
  • Memory usage should be optimized and monitored
  • Network traffic should be reasonable for your application
  • Storage usage should align with your plan limits

Burst Usage

  • Short-term resource spikes are acceptable
  • Sustained high usage may require plan upgrades
  • We may throttle or suspend excessive usage
  • Contact support for planned traffic increases

Content Responsibilities

User-Generated Content

  • You are responsible for all content hosted on your account
  • Implement appropriate content moderation for user uploads
  • Respond promptly to abuse reports
  • Maintain backup copies of important data

Third-Party Content

  • Ensure proper licensing for third-party content
  • Respect intellectual property rights
  • Comply with content provider terms of service
  • Implement appropriate attribution where required

Security Requirements

Account Security

  • Use strong, unique passwords
  • Enable multi-factor authentication
  • Regularly review account access
  • Report security incidents immediately

Application Security

  • Keep software and dependencies updated
  • Implement proper input validation
  • Use secure coding practices
  • Configure appropriate access controls
  • Encrypt sensitive data

Monitoring and Compliance

Automated Monitoring

We may monitor your usage to:

  • Ensure compliance with this policy
  • Detect security threats and abuse
  • Maintain platform performance and stability
  • Investigate reported violations

Compliance Obligations

  • Comply with applicable laws and regulations
  • Respect data protection and privacy requirements
  • Maintain appropriate records and documentation
  • Cooperate with legal and regulatory requests

Reporting Violations

If you become aware of violations of this policy:

  • Report abuse via our support system
  • Include relevant details and evidence
  • Do not attempt to investigate or retaliate
  • Follow up if no action is taken within reasonable time

Report Abuse

Enforcement

Investigation Process

  • We will investigate reported violations promptly
  • Account holders will be notified of investigations
  • Evidence will be preserved for review
  • Decisions will be communicated clearly

Enforcement Actions

Violations may result in:

  • Warning notifications
  • Content removal or blocking
  • Service restrictions or throttling
  • Account suspension or termination
  • Legal action if required

Appeals Process

  • You may appeal enforcement actions
  • Provide additional context or evidence
  • Appeals will be reviewed by senior staff
  • Decisions will be communicated within 5 business days

Consequences of Violations

Service Restrictions

  • Temporary suspension of specific features
  • Reduced resource allocations
  • Restricted access to certain services
  • Enhanced monitoring and oversight

Account Termination

Serious or repeated violations may result in:

  • Immediate account suspension
  • Permanent account termination
  • Forfeiture of remaining service credits
  • Ban from creating new accounts

Updates to This Policy

We may update this Acceptable Use Policy periodically to:

  • Reflect changes in our services
  • Address new security threats
  • Comply with legal requirements
  • Improve clarity and understanding

Material changes will be communicated via email or platform notifications at least 30 days before taking effect.

Contact Information

For questions about this Acceptable Use Policy: