Acceptable Usage Policy

Version: 1.1 - Last Updated: July 13, 2025

Introduction

This Acceptable Use Policy ("AUP") governs the use of Hyonix services, infrastructure, and network resources ("Services") by all customers, users, and their end-users (collectively, "You" or "Customer"). By using our Services, you agree to comply with this AUP. Violation of this policy may result in service suspension, termination, or legal action.

This AUP should be read in conjunction with our:

- Terms of Service

- Privacy Policy

We reserve the right to modify this AUP at any time. Continued use of our Services constitutes acceptance of any modifications.

1. Prohibited Activities

1.1 Illegal Content and Activities

You may not use our Services for any illegal purpose or in violation of any applicable laws, including but not limited to:

- Child Exploitation: Storing, distributing, or accessing child pornography or any content that exploits minors.

- Adult Content: Hosting or distributing any form of adult content or pornography is strictly prohibited.

- Fraudulent Activities: Engaging in phishing, scamming, pyramid schemes, Ponzi schemes, or any deceptive practices.

- Identity Theft: Buying, selling, or distributing stolen personal identities, credit card details, or financial information.

- Illegal Goods: Trading in stolen accounts, illegal substances, weapons, or contraband.

- Copyright Infringement: Distributing copyrighted content without authorization, including warez, nulled software, or pirated media.

1.2 Security Violations

The following security-related activities are strictly prohibited:

- Unauthorized Access: Attempting to access systems, networks, or data without permission.

- Credential Attacks: Using tools or services to test stolen credentials, crack passwords, or check account validity.

- Brute Force Attacks: Attempting to gain unauthorized access through systematic password guessing or credential stuffing.

- Vulnerability Exploitation: Exploiting security vulnerabilities without explicit written permission.

- Network Scanning: Conducting unauthorized port scans, vulnerability scans, or network probing.

- Penetration Testing: Performing security testing without prior written authorization from target owners.

- Malware Distribution: Creating, storing, or distributing viruses, trojans, ransomware, or other malicious software.

- Botnets: Operating or participating in botnet activities.

- IP Spoofing: Falsifying IP addresses or packet headers.

- Retaliation Risk: Engaging in any conduct that may provoke retaliation against Hyonix or its partners, including actions that make servers vulnerable to denial of service attacks.

- Data Privacy Violations: Unauthorized collection, storage, or use of personally identifiable information, financial data, or health data.

1.3 Network Abuse

- DDoS Attacks: Launching or facilitating denial of service attacks.

- Email Services:

- All email ports (25, 465, 587) are blocked by default

- Sending any form of email is prohibited

- Using email testers, verifiers, or mass mailing tools

- Operating mail servers or relays

- Using email extractors or harvesting tools

- Public Proxies/VPNs: Operating public VPN services or open proxies without explicit permission.

- DNS Abuse: Running open recursive DNS servers or engaging in DNS amplification.

- BGP Hijacking: Inappropriate use of IP space or autonomous system numbers.

- IRC Services: Operating IRC servers, clients, bots, or any IRC-related services is strictly prohibited.

- File Sharing: All torrenting and peer-to-peer file sharing is prohibited.

1.4 Content Violations

- Hate Speech: Content that promotes discrimination, violence, or hatred based on race, religion, gender, or nationality.

- Harassment: Stalking, threatening, or harassing individuals or groups.

- Defamation: Publishing false or defamatory content.

- Terrorism: Content that promotes or facilitates terrorist activities.

1.5 Resource Abuse

- Cryptocurrency Mining: CPU or GPU mining without explicit written permission.

- Torrenting: All torrenting and peer-to-peer file sharing is prohibited.

1.6 Account Violations

- Ban Evasion: If your account has been terminated by Hyonix, you are prohibited from creating a new account or using any other account to access our services without first obtaining explicit written permission from Hyonix management.

- Multiple Accounts: Operating multiple accounts to circumvent restrictions or limitations.

2. Resource Usage Policies

2.1 CPU Usage

- Short-term CPU bursts to 100% are permitted.

- Sustained CPU usage above 90% for a period exceeding 2 hours may result in throttling.

- Services may be throttled if consistently maxing out resources.

2.2 Disk I/O

- Services should not exceed 300MB/s disk read/write average for more than 10 minutes.

- Excessive I/O operations that degrade server performance are prohibited.

2.3 Network Usage

- Sustained maximum bandwidth speed usage for more than 2 hours requires approval.

- Network abuse or activities that degrade network performance for other users are prohibited.

3. Compliance and Legal Obligations

3.1 Customer Responsibilities

- Maintain strong passwords and secure access credentials.

- Keep all software updated and patched.

- Report any security incidents immediately.

- Comply with all applicable local, state, federal, and international laws.

- Comply with all applicable export control laws and regulations.

3.2 Law Enforcement Cooperation

Hyonix may be required by law to submit customer information to law enforcement officials when presented with a valid subpoena from a court with proper jurisdiction. In such events:

- Information will be disclosed as directed pursuant to the subpoena.

- Customer privacy will only be compromised by court order or valid subpoena.

- Hyonix will notify the customer of information requests as allowed by law and the subpoena.

3.3 DMCA Compliance

- We will respond to valid DMCA takedown notices.

- Repeat copyright infringement will result in service termination.

4. Enforcement and Remedies

4.1 Violation Response

Depending on severity, we may:

- Issue a warning and request immediate remediation.

- Suspend Services until violation is resolved.

- Terminate Services without refund.

- Report illegal activities to law enforcement.

- Pursue legal action for damages.

4.2 Investigation Costs

- If external costs are incurred during investigation, Hyonix will pass these costs through to the customer.

- In cases of severe violations requiring significant administrative time to process or clean up, customers will be charged at a rate of $30/hour.

4.3 No Refunds

No refunds will be issued for Services terminated due to AUP violations.

4.4 Appeals Process

Customers may appeal service suspensions within three (3) business days by submitting a support ticket. Appeals require:

- Full cooperation with our investigation.

- Server credentials if requested by our team.

- Refusal to provide credentials will result in appeal denial.

- Successful appeals showing no intentional violations will result in service reinstatement.

- If Hyonix suspended the service and later found the service to be suspended wrongly after investigation (such as if the report was false), we will compensate per our Service Level Agreement.

5. Reporting Violations

To report AUP violations, please contact:

- Email: [email protected]

- Include: Date/time, IP addresses, evidence of violation.

5.1 Report Standards

- Hyonix will only consider reports from reputable sources or reports that include sufficient data for investigation.

- Sending a report does not guarantee that the reported service will be suspended.

- Services will only be suspended if our team can validate the report through investigation.

6. Indemnification

You agree to indemnify, defend, and hold harmless Hyonix and its affiliates from any claims, damages, losses, or expenses (including attorney's fees) resulting from your violation of this AUP or your use of our Services.

7. Policy Updates

We reserve the right to update this AUP at any time. Changes will be effective immediately upon posting to our website. It is your responsibility to review this AUP periodically for updates. Continued use of Services after modifications constitutes acceptance of the updated policy.

Ready to get started?