1. Overview
This Acceptable Usage Policy (βAUPβ) governs the use of services provided by InterProWebHost (βInterProWebHost,β βwe,β βus,β or βourβ). By accessing or using our services, you agree to comply with this AUP, our Terms of Service, and any other applicable service-specific rules.
This policy exists to protect platform stability, service availability, customer trust, legal compliance, and the security of our network and systems.
2. Scope
This AUP applies to all InterProWebHost services, including but not limited to:
- Shared hosting, reseller hosting, VPS hosting, dedicated servers, and cloud hosting
- Email hosting and related communication services
- Domain-related services where usage affects hosted services or platform operations
- Website security, monitoring, backup, and recovery services
- SEO tools, website builder tools, and digital marketing-related services
- Any software, scripts, applications, APIs, or customer content deployed through our platform
3. General Rules of Acceptable Use
You agree to use our services lawfully, responsibly, and in a manner that does not:
- Violate any applicable law, regulation, or binding legal requirement
- Infringe the rights of others, including intellectual property, privacy, or contractual rights
- Interfere with platform performance, reliability, or security
- Harm our systems, network, customers, staff, partners, or third parties
- Damage the reputation, operations, or lawful business interests of InterProWebHost
4. Prohibited Activities
4.1 Illegal or Fraudulent Activity
- Using the services for unlawful activity of any kind
- Fraud, impersonation, deception, or identity misrepresentation
- Phishing, scam pages, fake checkout pages, or credential theft
- Hosting or distributing pirated software, counterfeit goods, or unlawful content
- Operating services in violation of sanctions, export restrictions, or regulatory prohibitions
4.2 Security Abuse
- Unauthorized access to systems, data, accounts, credentials, or networks
- Port scanning, vulnerability scanning, brute force attacks, or penetration testing without written authorization
- Distributing malware, ransomware, spyware, trojans, malicious scripts, or harmful executables
- Operating botnets, command-and-control infrastructure, malicious proxies, or abusive automation
- Attempting to bypass authentication, account restrictions, quotas, or security controls
4.3 Network and Platform Abuse
- Activities that overload, degrade, or destabilize shared infrastructure
- Running abusive cron jobs, excessive background tasks, or persistent high-load processes not suited to the service tier
- Denial-of-service activity, traffic flooding, reflection attacks, or other disruptive conduct
- Use of our services to relay, mask, or facilitate abusive traffic
- Reselling or redistributing services in violation of the applicable service plan
4.4 Content Abuse
- Defamatory, threatening, harassing, abusive, or unlawful content
- Content promoting violence, terrorism, hate, or discrimination
- Exploitative or abusive material, including child sexual abuse material or any content involving exploitation
- Misleading, fraudulent, or intentionally deceptive business claims
- Any content that creates legal, reputational, or security risk to our platform or customers
4.5 Intellectual Property Violations
- Hosting or distributing materials that infringe copyrights, trademarks, patents, or other proprietary rights
- Unauthorized duplication or redistribution of licensed software, media, templates, or code
- Use of our platform to facilitate infringement by others
4.6 Prohibited SEO and Marketing Conduct
- Black-hat SEO practices, including cloaking, hidden text, doorway pages, or manipulative link schemes
- Automated spam submissions, abusive scraping, or unauthorized data harvesting
- Misleading lead generation pages, fake reviews, deceptive ranking claims, or search engine manipulation intended to deceive users
- Campaigns that violate applicable advertising, privacy, consent, or platform rules
4.7 Prohibited File and Application Use
- Using hosting plans primarily as bulk file storage, offsite backup repositories, or download mirrors unless expressly permitted
- Hosting applications that are incompatible with the service tier purchased
- Running cryptocurrency mining or similar compute-intensive operations unless explicitly approved in writing
- Hosting malicious downloads, exploit kits, cracked software, or tools primarily designed for abuse
5. Email and Messaging Use
All email and messaging activity through our platform must comply with applicable anti-spam, privacy, and electronic communications laws.
You must not:
- Send unsolicited bulk email or spam
- Send marketing emails without lawful consent where required
- Use purchased, scraped, rented, or non-permission-based mailing lists
- Send deceptive messages using forged headers, spoofed domains, or misleading sender information
- Operate open relays, abusive forwarding chains, or high-risk mail configurations
We may suspend or restrict email services immediately if they generate abuse complaints, blacklist events, unusual bounce patterns, or deliverability issues that threaten platform reputation or service continuity.
6. Resource Usage and Fair Use
Our services are intended for normal, commercially reasonable usage consistent with the purchased plan. Shared and multi-tenant environments require fair use so that all customers receive reliable service.
- Customers must not consume excessive CPU, memory, disk I/O, database resources, or bandwidth in a way that disrupts others
- Applications must be configured responsibly and maintained in a stable, secure, supportable manner
- High-load or non-standard workloads may require migration to a higher-tier service such as VPS, cloud, or dedicated infrastructure
- We may limit, isolate, suspend, or require remediation where excessive usage affects service quality
| Area | Examples of Abuse | Possible Response |
|---|---|---|
| CPU / Memory | Persistent high-load scripts, runaway processes, abusive cron jobs | Throttle, suspend, or require upgrade |
| Storage | Using hosting as archival storage or non-website bulk repository | Restrict usage or require remediation |
| Spam, unusually high complaint rates, blacklist incidents | Immediate outbound mail suspension | |
| Network | Flooding, abusive traffic generation, attack-related activity | Immediate isolation or termination |
7. Customer Security Responsibilities
You are responsible for maintaining the security of your account and services, including:
- Using strong passwords and protecting login credentials
- Maintaining up-to-date software, plugins, themes, scripts, and dependencies
- Removing vulnerable, abandoned, pirated, or unsupported software
- Promptly responding to abuse, malware, compromise, or security notices
- Implementing reasonable security practices appropriate to your environment and use case
If your account, website, email system, or server is compromised and creates risk to our network or others, we may take emergency action, including isolation, suspension, or service restriction, until the risk is addressed.
8. Monitoring, Investigation, and Enforcement
To protect our services and customers, we reserve the right to monitor service usage, investigate suspected abuse, and take proportionate enforcement action where necessary.
Enforcement may include:
- Warnings and requests for corrective action
- Temporary service restrictions or partial suspension
- Outbound email blocking or network filtering
- Content removal or service isolation
- Account suspension or termination
- Preservation or disclosure of records where required by law
We are not obligated to provide advance notice in cases involving spam, phishing, malware, active compromise, legal risk, or other urgent abuse scenarios.
9. Abuse Reporting
If you become aware of misuse of our platform, please report it promptly with enough detail for us to investigate. Relevant information may include timestamps, IP addresses, headers, URLs, screenshots, affected services, and a brief description of the issue.
- Use our support or abuse reporting channel where available
- Include supporting evidence when possible
- Do not conduct unauthorized investigations on our infrastructure
10. Third-Party Services and Upstream Requirements
Some InterProWebHost services depend on third-party vendors, software providers, registrars, cloud platforms, security vendors, or integrated service partners. Your use of such services may also be subject to applicable third-party terms, platform restrictions, or upstream provider rules.
If a third-party provider requires suspension, restriction, remediation, or investigation due to abuse, security, or compliance issues, we may be required to take corresponding action on your account or service.
11. Policy Updates
We may update this Acceptable Usage Policy from time to time to reflect service changes, legal requirements, security developments, operational needs, or industry best practices.
Revised versions become effective when posted on this page unless otherwise stated. Your continued use of our services after an update constitutes acceptance of the revised policy.
12. Contact Information
If you have questions about this policy or need to report a violation, please contact us.
InterProWebHost Contact
Abuse Reports: abuse@interprowebhost.com
Legal Inquiries: legal@interprowebhost.com
General Support: support@interprowebhost.com
Contact Page: Contact Support