Acceptable Use Policy (AUP)
Effective Date: January 1, 2023
Last Updated: December 11, 2024
1. Purpose and Scope
This Acceptable Use Policy ("AUP") governs the use of all services provided by Coropos Web Services, including web hosting, development services, email services, domain registration, and related products. This policy protects our infrastructure, other clients, and the internet community at large.
By using our services, you agree to comply with this AUP. Violation may result in service suspension or termination without refund.
2. Prohibited Activities
2.1 Illegal Activities
You may not use our services for any illegal purpose or in violation of any laws, including but not limited to:
- Violation of federal, state, or local criminal laws
- Violation of civil laws or regulations
- Violation of intellectual property rights (copyright, trademark, patent, trade secret)
- Fraud, identity theft, or financial crimes
- Distribution of controlled substances
- Money laundering or terrorist financing
- Child exploitation or abuse (including CSAM - Child Sexual Abuse Material)
- Human trafficking or exploitation
2.2 Malicious Activity
The following malicious activities are strictly prohibited:
- Malware Distribution: Hosting, distributing, or facilitating viruses, trojans, worms, ransomware, or any malicious code
- Hacking/Cracking: Attempting to gain unauthorized access to systems, networks, or accounts
- Phishing: Creating fake websites or emails to steal credentials or personal information
- DDoS Attacks: Participating in or facilitating distributed denial-of-service attacks
- Botnet Operations: Operating command-and-control servers or participating in botnets
- Port Scanning: Unauthorized scanning or probing of networks or systems
- Exploit Hosting: Hosting or distributing exploit kits or hacking tools
2.3 Spam and Unsolicited Communications
Spam and unsolicited communications are prohibited:
- Email Spam: Sending unsolicited bulk email (UCE/UBE)
- Forum/Blog Spam: Posting spam comments or links on forums, blogs, or social media
- SMS/Text Spam: Sending unsolicited text messages
- Address Harvesting: Collecting email addresses without permission
- Third-Party Lists: Using purchased or scraped email lists
- False Headers: Forging email headers or sender information
Email Marketing Requirements:
- Obtain explicit opt-in consent before sending marketing emails
- Include clear unsubscribe mechanism in every email
- Honor unsubscribe requests within 48 hours
- Include valid physical address in emails (CAN-SPAM Act)
- Use accurate "From" names and subject lines
2.4 Resource Abuse
Activities that degrade service performance are prohibited:
- CPU Abuse: Excessive CPU usage affecting server performance
- Bandwidth Abuse: Excessive bandwidth consumption beyond fair use
- Storage Abuse: Using services primarily for file storage/backup rather than active websites
- Database Abuse: Inefficient queries or excessive database connections
- Email Abuse: Sending excessive volumes of email
- Cryptocurrency Mining: Running cryptocurrency mining scripts or applications
2.5 Abusive Content
The following content types are prohibited:
- Child Exploitation: Any content involving minors in sexual or exploitative situations
- Violent Extremism: Content promoting terrorism, extremism, or violence
- Harassment: Content designed to harass, stalk, or threaten individuals
- Hate Speech: Content promoting violence or hatred based on race, religion, ethnicity, national origin, gender, sexual orientation, disability, or age
- Non-Consensual Intimate Content: "Revenge porn" or intimate images shared without consent
- Graphic Violence: Extremely graphic violent content (at our discretion)
2.6 Copyright and Intellectual Property Violations
Prohibited intellectual property violations include:
- Hosting pirated software, movies, music, or games
- Providing tools or services to circumvent DRM or copy protection
- Infringing on copyrights, trademarks, or patents
- Operating "warez" sites or torrent trackers for pirated content
- Violating software licensing agreements
2.7 Fraudulent Activity
Fraudulent schemes and scams are prohibited:
- Phishing Sites: Impersonating legitimate businesses to steal information
- Ponzi/Pyramid Schemes: Multi-level marketing scams
- Investment Fraud: Fake investment opportunities or pump-and-dump schemes
- Counterfeit Goods: Selling fake designer products or unauthorized replicas
- Fake Pharmacies: Selling counterfeit or prescription drugs without proper licensing
- Deceptive Practices: False advertising, fake reviews, or misleading claims
2.8 Adult Content Restrictions
Adult content policies:
- Adult content must comply with all applicable laws (18 U.S.C. 2257, etc.)
- Must include age verification mechanisms
- No content involving minors or appearing to involve minors
- No non-consensual content
- Must not violate our terms regarding resource usage
- May be restricted on shared hosting (dedicated servers may allow with prior approval)
3. Network Abuse
3.1 Network Security
You must not:
- Attempt to breach or circumvent security measures
- Interfere with other users' services or accounts
- Access data or systems without authorization
- Share login credentials or allow unauthorized access
- Probe, scan, or test vulnerabilities without permission
3.2 Mail Server Abuse
Email server policies:
- No open relay configurations
- No email bombing or mail flooding
- No forging sender addresses
- Comply with SPF, DKIM, and DMARC best practices
- Monitor and secure email accounts
3.3 DNS Abuse
Prohibited DNS activities:
- DNS amplification attacks
- Hosting malicious domains
- Fast-flux DNS techniques
- Domain generation algorithms (DGA) for malware
4. Responsible Disclosure
4.1 Security Vulnerabilities
If you discover a security vulnerability in our services:
- Report it immediately to security@coroposws.com
- Do not exploit the vulnerability beyond what's necessary to demonstrate it
- Do not access, modify, or delete data belonging to others
- Provide reasonable time for us to address the issue before public disclosure
- We will not take legal action against good-faith security researchers
5. Monitoring and Enforcement
5.1 Our Rights
We reserve the right to:
- Monitor services for AUP compliance
- Investigate suspected violations
- Suspend or terminate services for violations
- Remove content that violates this AUP
- Report illegal activity to law enforcement
- Cooperate with legal investigations
- Implement rate limits or resource restrictions
5.2 Automated Monitoring
We employ automated systems to detect:
- Malware distribution
- Excessive resource usage
- Spam sending patterns
- DDoS activity
- Known malicious IP addresses
5.3 User Reports
We investigate reports of AUP violations from:
- Other clients
- Internet service providers
- Law enforcement
- Anti-spam organizations
- General public
6. Enforcement Actions
6.1 Violation Response
Depending on severity, we may:
- Warning: Email notification of violation with deadline to correct
- Suspension: Temporary service suspension until issue is resolved
- Termination: Permanent account closure for serious or repeated violations
- Legal Action: Pursuit of legal remedies for damages or illegal activity
- Law Enforcement: Report to authorities for criminal activity
6.2 Severity Levels
Level 1 - Minor Violations (Warning)
- Accidental spam (compromised form, etc.)
- Minor resource overages
- Technical violations without malicious intent
Level 2 - Moderate Violations (Suspension)
- Repeated minor violations
- Significant resource abuse
- Policy violations causing service degradation
Level 3 - Serious Violations (Immediate Termination)
- Malware distribution
- Phishing operations
- Child exploitation content
- DDoS attacks
- Any illegal activity
6.3 No Refunds for AUP Violations
Accounts terminated for AUP violations are not eligible for refunds. You remain responsible for all fees incurred through the termination date.
7. Client Responsibilities
7.1 Security Obligations
You are responsible for:
- Securing your account with strong passwords
- Keeping software and scripts up to date
- Monitoring your account for unauthorized access
- Securing file permissions appropriately
- Reporting suspected compromises immediately
- Implementing security best practices
7.2 Content Management
You must:
- Ensure all content complies with this AUP
- Monitor user-generated content on your sites
- Implement moderation for forums, comments, etc.
- Respond promptly to abuse reports
- Remove violating content when notified
7.3 Third-Party Services
If you integrate third-party services:
- Ensure they comply with our AUP
- You are responsible for their actions
- Violations may result in your account suspension
8. Reporting AUP Violations
8.1 How to Report
To report an AUP violation:
- Email: abuse@coroposws.com
- Include:
- URL or account identifier
- Description of violation
- Evidence (screenshots, headers, etc.)
- Your contact information
8.2 Investigation Timeline
- Critical violations: Immediate action (same day)
- Serious violations: Investigation within 24 hours
- Standard violations: Investigation within 3 business days
9. Legal Compliance
9.1 Applicable Laws
You must comply with all applicable laws, including:
- CAN-SPAM Act (email marketing)
- TCPA (telephone consumer protection)
- DMCA (copyright)
- CFAA (computer fraud and abuse)
- GDPR (data protection - EU)
- CCPA (consumer privacy - California)
- State and local laws
9.2 Law Enforcement Cooperation
We cooperate with law enforcement including:
- Responding to valid subpoenas and court orders
- Providing evidence of criminal activity
- Reporting CSAM to NCMEC
- Participating in investigations when legally required
10. Indemnification
You agree to indemnify and hold harmless Coropos Web Services from any claims, damages, or expenses arising from your violation of this AUP, including:
- Legal fees and court costs
- Damages to our reputation or infrastructure
- Third-party claims resulting from your actions
- Fines or penalties imposed on us
11. Updates to This Policy
We may update this AUP at any time:
- Updates effective immediately upon posting
- Continued use constitutes acceptance
- Material changes will be communicated via email
- Review this policy periodically for changes
12. Contact Information
12.1 Report Abuse
12.2 General Questions
This Acceptable Use Policy is part of our Terms of Service. Violation may result in service suspension, termination, legal action, and reporting to authorities. By using our services, you agree to comply with this policy.
Last Updated: December 11, 2024