E5-Compute – Acceptable Use Policy (AUP)
Effective Date: Immediately upon publication
Last Updated: Automatically applies to all active services
By using E5-Compute services, you agree to comply with this Acceptable Use Policy. Failure to comply may result in suspension or termination of your account.
1. Purpose
1.1 Objective: The purpose of this Acceptable Use Policy (AUP) is to ensure the secure, stable, and lawful operation of E5-Compute's VPS hosting services.
1.2 Compliance: All users must comply with this policy in addition to the Terms of Service and Privacy Policy.
2. General Rules
2.1 Legality: Users may not use E5-Compute services for illegal activities, including but not limited to hacking, fraud, phishing, or copyright infringement.
2.2 Integrity: Users must not use the service to interfere with or degrade the network, servers, or other customers' services.
2.3 Accountability: Users are responsible for all activity originating from their accounts, VPS, or API keys.
2.4 Resource Limits: Users must not use excessive storage or network bandwidth beyond the allocated limits. CPU and RAM usage is allowed unless it negatively affects other users or service stability.
3. Prohibited Content
[!DANGER] Distributing malware or illegal content is grounds for immediate termination.
3.1 Illegal Material: Users must not host, transmit, or link to content that is illegal, defamatory, harassing, abusive, obscene, or discriminatory.
3.2 Defamation: Users must not defame E5-Compute, its staff, or services in any public or private channels.
3.3 Malicious Code: Users must not distribute malware, ransomware, viruses, or other harmful code.
4. Security and Vulnerability Reporting
4.1 Unauthorized Access: Users must not attempt to gain unauthorized access to E5-Compute services or other users' VPS instances.
4.2 Responsible Disclosure: Users are encouraged to responsibly report security vulnerabilities. Responsible reporting may result in a reward of up to $55 in service credit depending on the difficulty or impact of the issue.
4.3 Exploitation: Exploiting vulnerabilities for personal gain or disruption is strictly prohibited and may lead to immediate account termination and legal action.
5. Abuse and Spam
5.1 Spamming: Sending spam emails, bulk unsolicited messages, or using VPS for mass advertising is prohibited.
5.2 Network Abuse: Any activity causing unnecessary load on the network or servers that affects other users is considered abuse.
6. Enforcement
6.1 Consequences: Violations of this AUP may result in warnings, temporary suspension, or permanent termination of services.
6.2 Investigation: E5-Compute reserves the right to investigate suspected violations and take action without prior notice if necessary.
6.3 Liability: Users remain responsible for any costs, damages, or losses incurred due to AUP violations.
7. Reporting Violations
7.1 Contact: Users may report suspected violations by contacting E5-Compute support.
7.2 Confidentiality: Reports of abuse will be investigated confidentially, and appropriate action will be taken.
8. Resource Usage Policy (Detailed)
Fair usage applies to "unlimited" bandwidth claims to prevent abuse.
8.1 Crypto Mining: Mining cryptocurrency (Bitcoin, Ethereum, Monero, etc.) on E5-Compute VPS instances is strictly prohibited due to excessive resource strain.
8.2 Disk I/O: Constant high disk I/O operations that degrade performance for other users on shared nodes are prohibited.
8.3 CPU Abuse: Continuous 100% CPU usage for extended periods (e.g., > 4 hours) on shared VPS plans may result in throttling or temporary suspension.
8.4 Bandwidth: Use of bandwidth for public mirrors / heavy streaming that exceeds fair usage policies (if applicable) is prohibited.
9. IP Address Usage
9.1 Blacklisting: If a dedicated IP assigned to a user becomes blacklisted due to spam or abuse, the user may be charged a cleaning fee.
9.2 Spoofing: IP spoofing or any attempt to mask the source IP address of traffic is prohibited.
9.3 Scanning: Port scanning or probing external networks without authorization is strictly forbidden.
10. prohibited Software and Scripts
10.1 Stressers/Booters: Hosting or running network stress testing tools (booters) is prohibited.
10.2 Tor Exit Nodes: Running public Tor exit nodes is prohibited due to the high volume of abuse complaints they generate.
10.3 IRC Bots: Hosting malicious IRC bots or command-and-control servers is prohibited.
11. Reselling Policy
11.1 Responsibility: Resellers are responsible for the actions of their clients. AUP violations by a client may result in suspension of the reseller's service.
11.2 Support: E5-Compute does not provide direct support to reseller's clients.
12. Digital Rights and Copyright
E5-Compute respects DMCA and similar copyright laws.
12.1 DMCA: We comply with the Digital Millennium Copyright Act. Valid DMCA takedown notices will result in content removal or service suspension.
12.2 Repeat Infringers: Accounts repeatedly flagged for copyright infringement will be terminated.
13. VPN and Proxy Usage
13.1 Permitted Use: Personal VPNs and private proxies are generally permitted.
13.2 Public Proxies: Running open public proxies that are used for abuse is prohibited.
14. Disclaimer
14.1 No Warranty: E5-Compute makes no warranties or representations, either expressed or implied, concerning the service.
14.2 Indemnification: User agrees to indemnify and hold harmless E5-Compute from any claims resulting from the use of the service which damages the subscriber or any other party.

English
Deutsch
Français