Usage Policy
This policy defines the acceptable use of E5-Compute infrastructure.
1. System Integrity
Users may not attempt to circumvent system security or gain unauthorized access to other accounts or network segments.
2. Resource Usage
While we offer scalable solutions, intentional resource exhaustion that impacts other users is prohibited.
3. Prohibited Content
You may not host content that:
- Infringes on intellectual property rights.
- Promotes violence or illegal activities.
- Contains malware or phishing scripts.
4. Enforcement
Violation of this policy may lead to immediate suspension or termination of services without refund.

English
Deutsch
Français