1. Introduction
This Acceptable Use Policy ("AUP") defines what you may and may not do with Zunu Hosting services. It applies to all customers, users, and anyone accessing our infrastructure directly or indirectly. This AUP is incorporated by reference into our Terms of Service.
We've kept this readable on purpose. The short version: use our infrastructure for legitimate purposes, don't harm others, don't abuse resources. The detail is below.
2. Prohibited Content
The following types of content are not permitted on Zunu Hosting infrastructure under any circumstances:
- Child sexual abuse material (CSAM) or any content that sexualizes minors
- Content that facilitates, promotes, or glorifies violence or terrorism
- Malware, ransomware, spyware, or other malicious software distribution
- Phishing pages, credential harvesting sites, or fraud-enabling content
- Content that violates applicable copyright or intellectual property law
- Defamatory content, harassment campaigns, or doxxing material
- Content that violates applicable export control or sanctions regulations
Discovery of prohibited content will result in immediate suspension without notice. We cooperate fully with law enforcement investigations involving illegal content.
3. Prohibited Activities
The following activities are prohibited regardless of the content involved:
- Network attacks including DDoS, SYN floods, or any form of interference with other networks or systems
- Port scanning or probing of networks you do not own or have explicit permission to test
- Unauthorized access to systems, accounts, or data ("hacking")
- Operating open proxies, Tor exit nodes, or anonymization services that facilitate abuse
- Cryptocurrency mining without our express written approval
- Operating botnet command-and-control infrastructure
- Circumventing access controls, rate limits, or security measures on any system
- Spoofing IP addresses or other network identifiers
4. Email & Messaging
Zunu Hosting has a zero-tolerance policy for spam. You may not use our infrastructure to:
- Send unsolicited bulk email (spam) regardless of content
- Operate mailing lists without clear opt-in consent and functional unsubscribe mechanisms
- Forge email headers or sender identities
- Send email to harvested, purchased, or scraped address lists
- Operate bulk SMS or messaging campaigns without proper consent
Accounts generating spam will be suspended immediately. Repeated violations will result in permanent termination. We actively monitor outbound mail reputation and reserve the right to throttle or block outbound email from accounts showing abuse patterns.
5. Resource Usage
All plans come with defined resource allocations. You agree not to:
- Consume resources (CPU, RAM, disk I/O, bandwidth) at levels that degrade service for other customers on shared infrastructure
- Run sustained background processes, scrapers, or crawlers without prior approval on shared hosting plans
- Use shared hosting for large-scale data processing, video encoding, or compute-intensive tasks
- Artificially inflate resource consumption for any purpose
We will contact you before taking action on resource issues where possible, and work to find a resolution — including upgrading you to a plan better suited to your actual usage.
6. Security Responsibilities
You are responsible for maintaining the security of your own account and hosted applications. This includes:
- Keeping software (CMS, plugins, frameworks, libraries) up to date
- Using strong, unique passwords and enabling two-factor authentication where available
- Promptly addressing known security vulnerabilities in your applications
- Not storing unencrypted sensitive data (passwords, payment card data, SSNs) on shared infrastructure
If your account is compromised and used for abuse, it may be suspended while the issue is investigated and resolved. We will work with you to remediate — suspension is a containment measure, not a punishment.
7. Enforcement
We investigate reported and detected violations and take action proportionate to the severity. Possible actions include:
- Warning: For minor or first-time violations, we may contact you and allow time to correct the issue
- Content removal: We may remove specific content while leaving the account active
- Rate limiting or traffic filtering: For network abuse or resource overconsumption
- Suspension: For ongoing or serious violations, pending investigation or remediation
- Termination: For severe violations, repeat offenders, or illegal activity
Illegal content and activity may be reported to relevant law enforcement without prior notice to the account holder.
8. Reporting Abuse
If you've identified abuse originating from Zunu Hosting infrastructure — spam, attacks, malicious content — please report it via our contact form. Include as much detail as possible: timestamps, IP addresses, headers, log excerpts. We take abuse reports seriously and investigate all credible reports promptly.
Questions about this policy or a specific use case you want to check before proceeding? Get in touch. We'd rather answer a question upfront than deal with a problem after the fact.