Acceptable Use Policy
- The Service Provider AUP is binding on all users of our services. All customers must comply with its terms. Inappropriate use can be divided into three main categories:
-
- Illegal Use
- Malicious Use
- Use that threatens network integrity
- The Service Provider reserves the right to make changes to this AUP at any time to address emerging threats. Changes to the AUP shall come into force from the moment they are published on the website in8inity.com.
Forbidden
-
Illegal Use
-
- Any activity deemed illegal in any of the territories in which the service is provided.
- Storage or transmission of materials that violate copyrights or trademarks.
- Possession or transmission of child pornography.
- Using the Services to engage in or assist in fraud, identity theft, or other malicious or fraudulent activities, including the solicitation or distribution of fraudulent activities, goods, services, schemes, or promotions.
- Use of services for distribution, control, or other interaction with malicious computer programs (viruses, trojans, worms, spyware, and other malicious software).
- Software or other media piracy.
- Violation of local import/export laws.
-
Malicious Use
-
- Harassment of any person or entity, whether through open threat, threatening language, or refusal to comply with a cease and desist request.
- Penetration/vulnerability testing or unauthorized access to the Service Provider network and any Service Provider operating or administrative systems.
- Unauthorized penetration/vulnerability testing or network access of any other object or system.
- Electronic impersonation of another person or organization or other methods of deception.
- Unauthorized Network Scanning/Probing: Conducting any network scanning (port scanning, vulnerability scanning, brute forcing, etc.) on external or internal systems without the explicit permission of the resource owner and, if required, prior coordination with the Service Provider.
- SPAM / Unsolicited Communications: This includes unsolicited emails, unsolicited advertising, messages designed to disrupt other services, messages containing malicious content, and mass mailings via email, social networks, messaging apps, SMS, or any other medium. Any activity that leads to IP blacklisting or other negative repercussions is strictly prohibited.
- Farming email addresses or other individual online identifiers; unauthorized data scraping from third-party resources without permission.
- Phishing.
- Unauthorized interception of messages or other data.
- Network services such as open proxies, open mail relays, or open recursive domain name servers.
-
Use that threatens the integrity of the network
-
- General interference with the Service Provider network or its monitoring systems.
- Actions as a result of which the Service Provider network becomes the object of a DDoS or other targeted attack.
- Anything that causes our IP space to be blacklisted in suspicious or malicious databases (Spamhaus, etc.).
- Actions that lead to the shutdown of the Service Provider network by a government decree.
- Any action that results in interruptions in the provision of services to other Service Provider customers.