Acceptable Use Policy
Service Usage Rules and Restrictions
Last Updated: 16 October 2025
Introduction
Data Technics IT Limited (Company Registration: 04605647) provides hosting and related services subject to this Acceptable Use Policy ("AUP"). This policy protects our network, systems, and other customers from abuse and illegal activity.
Our registered office: 60 Ascot Gardens, Southall, Middlesex, UB1 2SA, United Kingdom
Violation of this AUP may result in immediate service suspension or termination without refund.
1. Scope and Application
1.1 This AUP Applies To:
- All hosting services (shared, VPS, dedicated, cloud)
- Domain registration services
- Email services
- Any other services provided by Data Technics IT Limited
- All users, resellers, and end customers
1.2 Your Responsibilities:
- You are responsible for all activity under your account
- You must ensure your customers and users comply with this AUP
- You must take reasonable security measures to prevent unauthorized use
- You must monitor your account for suspicious activity
1.3 Enforcement:
- We reserve the right to suspend or terminate services for AUP violations
- Suspension may occur without prior notice for serious violations
- We may remove content that violates this AUP
- We may report illegal activity to law enforcement
2. Prohibited Activities
2.1 Illegal Activities:
- Using services for any illegal purpose
- Violating any local, national, or international law
- Distributing, publishing, or storing illegal content
- Facilitating illegal activities
- Infringing intellectual property rights
- Distributing pirated software, music, films, or other copyrighted material
2.2 Spam and Unsolicited Communications:
- Sending unsolicited bulk email (spam)
- Operating email lists without proper consent
- Sending emails that violate CAN-SPAM, GDPR, or PECR requirements
- Using purchased or harvested email lists
- Forging email headers or sender information
- Operating dictionary attack or email harvesting tools
- Hosting or linking to websites advertised via spam
2.3 Network Abuse:
- Port scanning or network probing
- Attempting to breach security or authentication measures
- Intercepting or monitoring network traffic without authorization
- Deliberate introduction of malicious programs (viruses, worms, trojans)
- Denial of service (DoS or DDoS) attacks
- Cryptocurrency mining without express written permission
2.4 System Interference:
- Interfering with service to other customers
- Consuming excessive server resources
- Running processes that negatively impact server performance
- Attempting to gain unauthorized access to systems
- Circumventing security or monitoring systems
- Modifying system files or configurations without authorization
2.5 Malicious Code and Hacking:
- Hosting or distributing malware, viruses, or trojans
- Operating command and control servers
- Hosting phishing websites
- Operating or facilitating hacking tools
- Hosting exploit kits or attack tools
- Participating in botnet operations
3. Content Restrictions
3.1 Prohibited Content:
- Child sexual abuse material (CSAM) - zero tolerance
- Content promoting or facilitating child exploitation
- Content that violates UK law or the laws of your jurisdiction
- Defamatory, libelous, or threatening content
- Content that incites violence, hatred, or discrimination
- Content that harasses, stalks, or threatens individuals
3.2 Adult Content Restrictions:
- Adult content must comply with UK law and regulations
- Age verification required where legally mandated
- Must not be accessible to minors
- Must comply with obscenity laws
- Advance notification required for adult content hosting
3.3 Copyright and Intellectual Property:
- You must own or have rights to all hosted content
- Pirated software, media, or content is prohibited
- We respond to DMCA and UK copyright infringement notices
- Repeat copyright infringers will have services terminated
4. Email Service Usage
4.1 Email Sending Limits:
- Shared hosting: Maximum 500 emails per hour per account
- VPS and dedicated: Reasonable limits based on plan
- Bulk email requires prior approval
- Limits may be adjusted based on reputation and usage patterns
4.2 Email Best Practices:
- Use double opt-in for mailing lists
- Include clear unsubscribe mechanisms
- Maintain proper SPF, DKIM, and DMARC records
- Monitor bounce rates and complaint rates
- Remove bounced and unsubscribed addresses promptly
4.3 Email Deliverability:
- We are not responsible for email deliverability issues
- Your sending reputation affects deliverability
- We may restrict email sending if reputation is poor
- Third-party email services recommended for bulk sending
5. Resource Usage
5.1 Shared Hosting Resource Limits:
- CPU usage must not consistently exceed allocated share
- Memory usage must remain within plan limits
- Disk space must not exceed plan allocation
- Bandwidth must not exceed plan allocation
- Database queries must not impact other users
5.2 Prohibited Resource-Intensive Activities:
- Cryptocurrency mining
- Proxy or VPN services (without prior approval)
- Tor exit nodes
- Game servers (on shared hosting)
- Video streaming servers (on shared hosting)
- File sharing or torrent services
5.3 Fair Usage:
- Unlimited plans subject to fair usage policy
- Resources must be used for normal website operation
- File storage or backup services prohibited on unlimited plans
- We may require upgrade to higher plans for resource-intensive sites
6. Security Requirements
6.1 Your Security Obligations:
- Maintain strong, unique passwords
- Keep software, scripts, and applications updated
- Install security patches promptly
- Remove unused scripts, plugins, and accounts
- Monitor account for unauthorized access
- Use secure protocols (HTTPS, SFTP) where available
6.2 Vulnerable Software:
- Outdated software with known vulnerabilities must be updated
- We may disable vulnerable scripts without notice
- Compromised accounts may be suspended for security
- You are responsible for securing your applications
6.3 Security Incidents:
- Report security incidents immediately
- Cooperate with security investigations
- Take corrective action as directed
- Failure to address security issues may result in suspension
7. Website and Application Usage
7.1 Permitted Website Types:
- Business websites and portfolios
- Blogs and informational sites
- E-commerce sites (with appropriate merchant services)
- Web applications and SaaS platforms
- Educational and non-profit sites
7.2 Restricted Website Types:
- High-traffic sites may require VPS or dedicated hosting
- Adult content requires notification and compliance
- Gambling sites must comply with UK Gambling Commission
- Financial services must comply with FCA regulations
- Healthcare sites must comply with data protection laws
7.3 Prohibited Website Types:
- Phishing or scam websites
- Pyramid schemes or multi-level marketing scams
- Counterfeit goods or trademark infringement
- Illegal pharmaceuticals or controlled substances
- Weapons, explosives, or illegal items
- Hacking, cracking, or exploit sites
8. Domain Name Usage
8.1 Domain Registration:
- Domains must be registered with accurate information
- Cybersquatting and trademark abuse prohibited
- Domains may not be registered for illegal purposes
- Registry policies must be followed
8.2 Domain Pointing:
- Domains pointing to our servers must comply with this AUP
- We may suspend DNS for AUP violations
- Malicious redirects are prohibited
9. Reseller Responsibilities
9.1 If You Are a Reseller:
- You must enforce this AUP with your customers
- You are responsible for your customers' AUP compliance
- You must include AUP requirements in your terms of service
- You must take action against customers who violate this AUP
9.2 Reseller Violations:
- Failure to enforce AUP may result in reseller suspension
- Repeated violations by your customers may result in termination
- You may be held liable for your customers' activities
10. Monitoring and Investigation
10.1 Our Rights:
- We may monitor network traffic for abuse and security
- We may investigate suspected AUP violations
- We may access account content if abuse is suspected
- We may suspend services during investigations
10.2 Your Privacy:
- We respect your privacy as outlined in our Privacy Policy
- Monitoring is conducted only as necessary for security and compliance
- We do not actively monitor content except for abuse
- Law enforcement requests will be handled per legal requirements
11. Enforcement and Penalties
11.1 Violation Responses:
- Warning notice for minor violations
- Temporary suspension for serious violations
- Permanent termination for severe or repeated violations
- Content removal for specific violations
- Account upgrade requirement for resource violations
11.2 Immediate Suspension:
- CSAM or child exploitation material - immediate termination and law enforcement report
- Active security threats or attacks
- Spam operations
- Malware distribution
- DDoS attacks
- Any activity causing significant harm to network or customers
11.3 No Refunds:
- No refunds for services terminated due to AUP violations
- Setup fees and domain registrations are non-refundable
- Outstanding fees remain due despite termination
11.4 Legal Action:
- We reserve the right to pursue legal action for violations
- You may be liable for damages caused by violations
- We cooperate fully with law enforcement
12. Reporting Abuse
12.1 How to Report:
- Email abuse reports to our abuse contact (see footer)
- Include detailed information about the violation
- Provide evidence (URLs, email headers, screenshots)
- Include your contact information for follow-up
12.2 What We Need:
- Description of the abuse
- Date and time of incident
- Relevant URLs, IP addresses, or domain names
- Any supporting documentation
12.3 Our Response:
- We investigate all abuse reports
- Response time depends on severity
- We may contact you for additional information
- We cannot always disclose actions taken
13. Exceptions and Waivers
13.1 Exceptions to this AUP require written approval from Data Technics IT Limited management.
13.2 Approved exceptions are documented and subject to additional terms.
13.3 Failure to enforce any provision does not waive our right to enforce it later.
14. Changes to This Policy
14.1 We may update this AUP to address new abuse types or legal requirements.
14.2 Material changes will be notified via email.
14.3 Continued use of services after changes constitutes acceptance.
14.4 We recommend reviewing this policy periodically.
15. Related Policies
This policy should be read in conjunction with:
- Terms of Service
- Privacy Policy
- Service Level Agreement
- Domain Registration Data Policy
16. Legal Framework
This AUP is designed to comply with:
- Computer Misuse Act 1990
- Data Protection Act 2018 and UK GDPR
- Privacy and Electronic Communications Regulations 2003
- Malicious Communications Act 1988
- Communications Act 2003
- Copyright, Designs and Patents Act 1988
- Other relevant UK and international laws