Order Now
Currency:
Select Currency:

Acceptable Usage Policy

Guidelines for responsible use of our bulletproof hosting services. Understand what's allowed, what's restricted, and what's strictly prohibited.

Zero Tolerance Policy
Content Guidelines
Resource Usage
Enforcement Policy

Generally Allowed

Most content is permitted on our bulletproof hosting, including controversial or copyright-challenged material. We believe in free speech and content freedom.

Restricted Activities

Activities that harm our network or other users are restricted, including DDoS attacks, spam, and resource abuse.

Absolutely Prohibited

Zero tolerance for child exploitation, terrorism, or activities causing direct physical harm. These result in immediate termination and reporting.

Last Updated: January 04, 2026 | Effective Date: January 15, 2024

IMPORTANT NOTICE: This Acceptable Usage Policy (AUP) is part of our Terms of Service. By using our Services, you agree to comply with this AUP. Violations may result in suspension or termination of your account without refund.

1. Introduction

This Acceptable Usage Policy ("AUP") outlines the acceptable and prohibited uses of the hosting services provided by 247 Servers Hosting ("we," "us," or "our"). This policy is designed to protect our network, infrastructure, and users while allowing maximum freedom within ethical and legal boundaries.

As a bulletproof hosting provider, we operate with fewer content restrictions than traditional hosting companies. However, certain activities are strictly prohibited to maintain the integrity of our services and comply with fundamental ethical standards.

This AUP applies to all users of our Services, including but not limited to website hosting, VPS, dedicated servers, game servers, and any related services. All users are responsible for compliance with this AUP.

2. Definitions

  • "Services" means all hosting services provided by 247 Servers Hosting.
  • "User" means any individual or entity using our Services.
  • "Content" means any data, information, or material uploaded, stored, or transmitted through our Services.
  • "Network Abuse" means activities that disrupt or harm our network infrastructure.
  • "Zero Tolerance Content" means content that is absolutely prohibited under Section 5.
  • "Resource Abuse" means excessive consumption of server resources beyond reasonable limits.

3. General Principles

3.1 Freedom of Expression

We believe in freedom of expression and provide hosting services with minimal content restrictions. Users are generally free to host controversial, political, or unpopular content.

3.2 Ethical Boundaries

While we support free speech, we maintain ethical boundaries. Certain activities are strictly prohibited regardless of jurisdiction or legal status.

3.3 Shared Responsibility

Our network is shared among many users. All users must use resources responsibly and avoid activities that negatively impact other users.

3.4 Legal Compliance

Users are responsible for ensuring their use of our Services complies with applicable laws in their jurisdiction.

BULLETPROOF HOSTING NOTE: As a bulletproof hosting provider, we operate with servers in multiple jurisdictions and generally do not respond to standard DMCA or content complaints. However, we maintain absolute prohibitions for certain content types as outlined in Section 5.

4. Content Policy

Our content policy is designed to maximize freedom while maintaining basic ethical standards. The following table outlines our content categories:

Content Category Status Description
Political Content Allowed Political websites, campaigns, controversial political material
Copyrighted Material Allowed Filesharing, streaming, torrent trackers (with DMCA considerations)
Adult Content Allowed Legal adult content, adult websites (must comply with Section 5)
Gambling Content Restricted Allowed in jurisdictions where legal; user responsible for compliance
Hacking/Cracking Restricted Educational content allowed; active hacking tools restricted
Spam Operations Prohibited Bulk email, spam campaigns, phishing sites
Malware Distribution Prohibited Virus, ransomware, or malware distribution

GENERALLY ALLOWED CONTENT: Most types of content are permitted on our services, including but not limited to: filesharing sites, streaming platforms, adult content (legal), political sites, controversial material, gaming servers, forums, blogs, e-commerce, and personal websites.

5. Prohibited Content

ZERO TOLERANCE: The following content types are absolutely prohibited and will result in immediate account termination without refund and may be reported to appropriate authorities:

5.1 Child Exploitation Material

  • Child sexual abuse material (CSAM) in any form
  • Content depicting minors in sexual situations
  • Child pornography or exploitation content
  • Links to or promotion of such material

5.2 Terrorism & Violence

  • Content promoting terrorism or terrorist organizations
  • Instructional material for terrorist activities
  • Content inciting violence against individuals or groups
  • Recruitment material for violent extremist groups

5.3 Direct Physical Harm

  • Content that directly facilitates physical harm to individuals
  • Assassination services or hitman solicitations
  • Instructions for creating weapons of mass destruction
  • Content promoting self-harm or suicide

5.4 Non-Consensual Intimate Media

  • Revenge porn or non-consensual intimate images
  • Sexually explicit content without participant consent
  • Upskirt or creepshot photography

ENFORCEMENT: We actively investigate reports of prohibited content. If we identify any of the above content types, we will:

  1. Immediately suspend the account
  2. Preserve evidence for law enforcement
  3. Report to appropriate authorities in the server's jurisdiction
  4. Cooperate fully with legitimate law enforcement investigations

6. Restricted Activities

The following activities are restricted and may result in warnings, suspension, or termination depending on severity and impact:

6.1 Network Abuse

  • Distributed Denial of Service (DDoS) attacks originating from our network
  • Port scanning or network probing without authorization
  • IP spoofing or packet forgery
  • Operating open proxies, VPNs, or TOR exit nodes without notification

6.2 Email Abuse

  • Sending unsolicited bulk email (spam)
  • Operating phishing websites or email campaigns
  • Email bombing or harassment
  • Forging email headers (spoofing)

6.3 Fraud & Illegal Activities

  • Credit card fraud or stolen financial data
  • Identity theft services or data
  • Sale of stolen goods or services
  • Counterfeit products or currency

6.4 System Abuse

  • Attempting to gain unauthorized access to systems
  • Exploiting security vulnerabilities
  • Distributing hacking tools for malicious purposes
  • Botnet command and control servers

INVESTIGATION PROCESS: For restricted activities, we typically follow this process: 1) Warning and request to cease activity, 2) Temporary suspension if activity continues, 3) Permanent termination for repeated violations or severe incidents.

7. Resource Usage

All users must use server resources responsibly to ensure fair access for all customers.

7.1 Shared Hosting Limits

  • CPU Usage: Must not exceed 25% for more than 90 seconds
  • Memory Usage: Must not exceed allocated RAM limits
  • Process Count: Maximum 50 simultaneous processes
  • I/O Operations: Must not degrade disk performance for other users

7.2 Bandwidth Usage

  • Must comply with purchased bandwidth limits
  • Must not use bandwidth for DDoS attacks or amplification attacks
  • Must not create excessive inbound traffic that impacts network performance

7.3 Disk Usage

  • Must not exceed purchased disk space
  • Must not use disk for storage of illegal or prohibited content
  • Must maintain reasonable file organization

7.4 VPS & Dedicated Servers

While VPS and dedicated servers have dedicated resources, users must still avoid:

  • Saturating network ports or causing network congestion
  • Generating excessive support requests due to mismanagement
  • Activities that impact other users on shared network infrastructure

8. Security Requirements

All users must maintain basic security standards to protect our network and other users.

8.1 Account Security

  • Use strong passwords (minimum 12 characters, mixed characters)
  • Enable two-factor authentication where available
  • Do not share account credentials
  • Regularly update software and applications

8.2 Server Security

  • Keep operating systems and software updated
  • Configure firewalls appropriately
  • Disable unnecessary services
  • Implement intrusion detection where practical

8.3 Vulnerability Management

  • Patch known security vulnerabilities promptly
  • Monitor for security advisories
  • Report security issues to our team
  • Cooperate with security investigations

COMPROMISED SERVERS: If we detect that your server has been compromised and is being used for malicious activities (DDoS, spam, etc.), we reserve the right to temporarily suspend the server until the issue is resolved. Repeated compromises may result in termination.

9. DMCA & Copyright

As a bulletproof hosting provider, our approach to copyright complaints differs from traditional hosting companies.

9.1 General Policy

  • We generally do not respond to standard DMCA takedown notices
  • Our servers are located in jurisdictions with favorable copyright laws
  • We do not proactively monitor for copyright infringement
  • We evaluate legal requests on a case-by-case basis

9.2 Legal Requests

We may respond to properly formatted legal requests from:

  • Legitimate law enforcement in the server's jurisdiction
  • Court orders from appropriate jurisdictions
  • Valid international legal procedures

9.3 Counter-Notification

If we do act on a copyright complaint and you believe it was in error, you may submit a counter-notification. We will forward counter-notifications to the complainant.

COPYRIGHT NOTE: While we generally ignore DMCA complaints, users are responsible for ensuring their use of copyrighted material complies with applicable laws. We cannot provide legal advice regarding copyright matters.

10. Enforcement

We enforce this AUP through a graduated response system based on the severity of the violation.

10.1 Violation Categories

Severity Examples Typical Response
Critical Child exploitation, terrorism, severe network attacks Immediate termination, no refund, possible reporting to authorities
High Spam operations, DDoS attacks, fraud activities Immediate suspension, possible termination if not resolved
Medium Resource abuse, security negligence, minor violations Warning, possible temporary suspension
Low Minor resource overages, technical issues Notification, request to resolve

10.2 Enforcement Actions

  • Warning: Formal notification of violation with request to correct
  • Suspension: Temporary disabling of services until violation resolved
  • Termination: Permanent cancellation of services without refund
  • Network Blocking: Blocking of specific IPs or ports causing issues
  • Legal Action: Cooperation with law enforcement for serious violations

10.3 Appeal Rights

Users have the right to appeal enforcement actions except in cases of Zero Tolerance Content violations. See Section 12 for appeal procedures.

11. Reporting Violations

We investigate reports of AUP violations, particularly for prohibited content.

11.1 How to Report

To report a violation, please send detailed information to:

  • Email: abuse@247servers-hosting.com
  • Support Tickets: Through our client area (preferred method)
  • Emergency: For immediate threats, use the emergency contact in your client area

11.2 Required Information

Please include in your report:

  • URL or IP address of the violation
  • Description of the violation
  • Evidence (screenshots, logs, etc.)
  • Your contact information

11.3 Report Handling

  • We investigate all reports promptly
  • We maintain reporter confidentiality when requested
  • We provide updates on investigation status when possible
  • False reports may result in action against the reporter

12. Appeals Process

Users may appeal enforcement actions except for Zero Tolerance Content violations.

12.1 Appeal Submission

Submit appeals through your client area with:

  • Account information and ticket reference
  • Detailed explanation of why you believe the action was incorrect
  • Evidence supporting your appeal
  • Steps taken to resolve the issue (if applicable)

12.2 Appeal Review

  • Appeals are reviewed by senior staff
  • Review typically takes 3-5 business days
  • We may request additional information
  • We provide written decision

12.3 Appeal Outcomes

  • Upheld: Original enforcement action stands
  • Modified: Enforcement action adjusted (e.g., suspension reduced)
  • Overturned: Enforcement action reversed, service restored
  • Conditional: Service restored with specific conditions

NO APPEAL FOR ZERO TOLERANCE: There is no appeal process for violations involving Zero Tolerance Content (Section 5). These violations result in immediate permanent termination without possibility of appeal or refund.

13. Changes to This Policy

We may update this AUP from time to time to reflect changes in our services, legal requirements, or operational needs.

13.1 Notification of Changes

When we make significant changes to this AUP, we will:

  • Update the "Last Updated" date at the top of this policy
  • Post the updated policy on our website
  • Notify users via email or in-service notification
  • Provide at least 30 days' notice for significant changes

13.2 Continued Use

Your continued use of our Services after changes to this AUP constitutes acceptance of the changes. If you do not agree with the changes, you must discontinue use of our Services.

13.3 Historical Versions

Previous versions of this AUP are available upon request for a period of 12 months after changes.

14. Contact Information

For questions about this AUP or to report violations, please contact us:

14.1 Primary Contact

  • Abuse Department: abuse@247servers-hosting.com
  • Support Tickets: Through your client area (preferred)
  • Emergency: Use emergency contact in client area for urgent issues

14.2 Legal Contact

  • Legal Department: legal@247servers-hosting.com
  • For Law Enforcement: lawenforcement@247servers-hosting.com

14.3 Response Times

  • Abuse Reports: Initial response within 24 hours
  • General Inquiries: Response within 48 hours
  • Emergency Issues: Response as soon as possible

FINAL NOTE: This Acceptable Usage Policy is designed to balance maximum freedom with basic ethical standards and network integrity. We strive to be transparent about what is and isn't allowed on our services. When in doubt about whether an activity is permitted, please contact us before proceeding.