Acceptable Use Policy

Last updated: April 2, 2025

This Acceptable Use Policy ("AUP") sets out the standards and rules for use of all services provided by Zebra Hosting Cloud. By using our services, you agree to comply with this policy. Violations may result in immediate service suspension or termination without refund, and in serious cases, referral to the appropriate authorities.

1. General Conduct

You agree to use our services only for lawful purposes and in a manner that does not:

  • Violate any local, national, or international laws or regulations
  • Infringe the rights of any third party, including intellectual property rights, privacy rights, or contractual rights
  • Cause harm, harassment, or distress to any individual or organization
  • Interfere with the normal operation of our infrastructure, network, or other customers' services

2. Strictly Prohibited Activities

The following activities are strictly prohibited on all Zebra Hosting Cloud services:

Malicious & Harmful Content

  • Uploading, distributing, or hosting malware, ransomware, trojans, viruses, keyloggers, spyware, or any other harmful software
  • Hosting phishing pages, fraudulent websites, or fake login portals designed to steal credentials or deceive users
  • Operating command-and-control (C2) servers for botnets or any malicious network infrastructure
  • Distributing cracking tools, exploit kits, or software designed to bypass security controls

Network Abuse & Attacks

  • Launching or facilitating DDoS (Distributed Denial of Service) or DoS attacks against any target
  • Port scanning, network probing, or vulnerability scanning of systems without explicit authorization from the target system owner
  • Spoofing IP addresses, sending forged network packets, or conducting man-in-the-middle attacks
  • Any activity that causes disruption to shared infrastructure or other customers' services

Spam & Unsolicited Communications

  • Sending unsolicited bulk email (spam), SMS, or other mass unsolicited communications
  • Operating open mail relays or proxies that facilitate spam distribution
  • Harvesting email addresses or personal data without consent for use in marketing or spam campaigns

Illegal & Harmful Content

  • Hosting, distributing, or linking to child sexual abuse material (CSAM) — this will be immediately reported to law enforcement
  • Hosting content that glorifies, promotes, or facilitates terrorism, violence, or hate crimes
  • Distributing copyrighted material without authorization (piracy, warez, illegal streaming)
  • Hosting darknet marketplaces, illegal drug marketplaces, or services involved in human trafficking
  • Any content that violates applicable obscenity or decency laws in the jurisdiction where the content is hosted or accessed

Fraud & Financial Crime

  • Operating fraudulent websites, fake investment schemes, or Ponzi schemes
  • Carding, credit card fraud, or any payment fraud activity
  • Money laundering or facilitating financial crimes
  • Impersonating businesses, government agencies, or individuals

Resource Abuse

  • Excessive use of CPU, memory, bandwidth, or storage in ways that degrade service for other customers on shared infrastructure
  • Cryptocurrency mining without our express written consent on shared hosting plans
  • Running processes designed to consume resources without producing useful output (e.g. intentional resource exhaustion)

3. Adult & Restricted Content

Adult content is permitted only where it is legal in the applicable jurisdiction, does not involve minors in any way, and complies with all relevant laws including age verification requirements. We reserve the right to decline to host adult content at our sole discretion.

4. Security Research

Legitimate security research, penetration testing, and ethical hacking activities are permitted only on systems you own or have explicit written authorization to test. Using our infrastructure to conduct unauthorized security testing against third-party systems is strictly prohibited.

5. Server Credentials & Access

You are solely responsible for securing your server and all services running on it. You must not share root or administrative credentials with unauthorized third parties, nor use your server access to exploit, attack, or probe other systems. Zebra Hosting Cloud will never ask you to share your server root password via support, email, or any other channel.

6. Enforcement

We take violations of this policy seriously. Our response may include:

  • Immediate suspension of services pending investigation
  • Permanent termination of the account without refund
  • Removal or disabling of specific content or services
  • Notification and reporting of illegal activity to relevant law enforcement agencies and authorities
  • Legal action where appropriate

We cooperate with law enforcement and abuse reporting organizations. Abuse reports can be submitted to our support team and will be investigated promptly.

7. Reporting Abuse

If you believe that any content hosted on our infrastructure violates this policy, please contact our abuse team through the contact form on our website or by submitting a support ticket. We investigate all credible reports and take appropriate action.

8. Changes to This Policy

We may update this Acceptable Use Policy at any time. Continued use of our services after changes are published constitutes your acceptance of the revised policy. We will notify active customers of material changes via email.