Acceptable Use Policy for Hydra Hosting
Effective Date: Dec 31, 2023
This Acceptable Use Policy ("AUP") governs your use of Hydra Hosting’s services, including virtual machines, dedicated servers, and related hosting solutions (collectively, the "Services"). By using our Services, you ("you" or "User") agree to comply with this AUP, our Terms of Service, and all applicable laws. Violation of this AUP may result in suspension or termination of your account.
1. Purpose
The purpose of this AUP is to ensure the security, reliability, and integrity of our Services for all users, while maintaining compliance with legal and ethical standards.
2. Acceptable Use
You may use our Services for lawful purposes that align with your selected plan, including but not limited to:
Hosting websites, applications, or databases.
Running virtual machines for development, testing, or production environments.
Operating dedicated servers for business, gaming, or other legitimate workloads.
Storing and processing data in compliance with applicable data protection laws.
3. Prohibited Activities
You agree not to engage in, or allow others to use your account for, the following activities:
3.1 Illegal Activities
Hosting, distributing, or linking to content that violates local, national, or international laws, including but not limited to:
Pirated software, media, or copyrighted material without authorization.
Content promoting illegal activities, such as hacking, fraud, or drug trafficking.
Material that violates privacy, data protection, or intellectual property laws.
Hosting, distributing, or linking to content that violates local, national, or international laws, including but not limited to:
Pirated software, media, or copyrighted material without authorization.
Content promoting illegal activities, such as hacking, fraud, or drug trafficking.
Material that violates privacy, data protection, or intellectual property laws.
3.2 Malicious Activities
Conducting or facilitating cyberattacks, including:
Denial-of-Service (DoS) or Distributed Denial-of-Service (DDoS) attacks.
Malware distribution (e.g., viruses, ransomware, spyware).
Phishing or unauthorized access to systems or networks.
Attempting to probe, scan, or exploit vulnerabilities in our infrastructure or other users’ systems.
Conducting or facilitating cyberattacks, including:
Denial-of-Service (DoS) or Distributed Denial-of-Service (DDoS) attacks.
Malware distribution (e.g., viruses, ransomware, spyware).
Phishing or unauthorized access to systems or networks.
Attempting to probe, scan, or exploit vulnerabilities in our infrastructure or other users’ systems.
3.3 Abuse of Resources
Overloading servers beyond the allocated resources (e.g., excessive CPU, memory, or bandwidth usage) in a way that impacts other users.
Using the Services for cryptocurrency mining unless explicitly permitted in your plan.
Running unauthorized bots, crawlers, or scripts that disrupt network performance.
Overloading servers beyond the allocated resources (e.g., excessive CPU, memory, or bandwidth usage) in a way that impacts other users.
Using the Services for cryptocurrency mining unless explicitly permitted in your plan.
Running unauthorized bots, crawlers, or scripts that disrupt network performance.
3.4 Inappropriate Content
Hosting or distributing content that is:
Obscene, defamatory, or harassing.
Discriminatory based on race, gender, religion, or other protected characteristics.
Harmful to minors or promotes violence.
Hosting or distributing content that is:
Obscene, defamatory, or harassing.
Discriminatory based on race, gender, religion, or other protected characteristics.
Harmful to minors or promotes violence.
3.5 Spam and Unsolicited Communications
Sending unsolicited emails, SMS, or other communications (e.g., spam) from our Services.
Hosting email servers or scripts designed for mass mailing without prior approval.
Sending unsolicited emails, SMS, or other communications (e.g., spam) from our Services.
Hosting email servers or scripts designed for mass mailing without prior approval.
3.6 Fraudulent Activities
Using fraudulent payment methods or engaging in activities that trigger fraud detection alerts (e.g., mismatched billing information, disposable email addresses).
Misrepresenting your identity or purpose when using the Services.
Using fraudulent payment methods or engaging in activities that trigger fraud detection alerts (e.g., mismatched billing information, disposable email addresses).
Misrepresenting your identity or purpose when using the Services.
4. User Responsibilities
You are responsible for:
Ensuring all content and activities on your virtual machines or dedicated servers comply with this AUP.
Maintaining the security of your account, including strong passwords and prompt reporting of unauthorized access.
Regularly backing up your data. Hydra Hosting is not liable for data loss due to user actions or failure to maintain backups.
Monitoring and securing your hosted applications to prevent abuse by third parties.
5. Monitoring and Enforcement
Monitoring: We may monitor server activity and resource usage to ensure compliance with this AUP and to protect the integrity of our Services.
Enforcement: If we detect a violation, we may:
Issue a warning and request corrective action.
Suspend or throttle your Services until the violation is resolved.
Terminate your account without refund for severe or repeated violations.
Report illegal activities to relevant authorities as required by law.
Monitoring: We may monitor server activity and resource usage to ensure compliance with this AUP and to protect the integrity of our Services.
Enforcement: If we detect a violation, we may:
Issue a warning and request corrective action.
Suspend or throttle your Services until the violation is resolved.
Terminate your account without refund for severe or repeated violations.
Report illegal activities to relevant authorities as required by law.
6. Reporting Violations
If you become aware of any violation of this AUP, please report it to [email protected]. We will investigate promptly and take appropriate action.
7. Cooperation with Legal Authorities
We may disclose user information or content to law enforcement or other authorities if required by law or to protect our rights, other users, or the public.
8. Modifications to the AUP
We may update this AUP at any time to reflect changes in our Services or legal requirements. Updates will be posted on our website, and significant changes will be communicated via email or account notifications. Continued use of the Services after changes constitutes acceptance of the updated AUP.
9. Contact Information
For questions or concerns about this AUP, please contact us at:
Email: [email protected]
By using Hydra Hosting’s Services, you acknowledge that you have read, understood, and agree to comply with this Acceptable Use Policy.