Acceptable Use Policy
Last Updated: 1st Feb 2026
This Acceptable Use Policy ("AUP") governs the use of services provided under the FOXCLOUD brand by the legal entity identified in the applicable Terms of Service, Master Services Agreement, or other governing agreement (the "Provider").
This AUP forms an integral part of any agreement governing the provision of services (including Terms of Service, Master Services Agreements, or Order Forms) (the "Agreement") and applies to all services provided by the Provider (the "Services").
By using the Services, the Customer agrees to comply with this AUP.
1. Purpose
This AUP is intended to:
Protect the integrity and security of the Provider’s infrastructure;
Protect customers and third parties;
Ensure lawful and responsible use of the Services;
Maintain stability, reliability, and operational continuity of the network.
The activities listed below are prohibited. This list is non-exhaustive.
2. Compliance with Law
The Services may not be used to:
Violate applicable laws or regulations;
Infringe intellectual property rights;
Engage in fraud or misrepresentation;
Distribute unlawful content;
Facilitate criminal activity.
Customers are solely responsible for ensuring their activities comply with all laws applicable to their business and operations.
3. Prohibited Activities
3.1 Illegal or Harmful Content
The following are strictly prohibited:
Child sexual abuse material;
Terrorism-related content;
Content inciting violence or serious harm;
Distribution of stolen, unlawfully obtained, or confidential data without authorization.
3.2 Intellectual Property Violations
Hosting or distributing material that infringes intellectual property rights is prohibited.
The Provider may respond to infringement notices in accordance with applicable law and internal procedures.
3.3 Spam and Unsolicited Communications
The Services may not be used for:
Sending unsolicited bulk email;
Phishing campaigns;
Email harvesting;
Operating open mail relays;
Using third-party email lists without verifiable consent.
Mailing lists must use confirmed opt-in procedures.
3.4 Malware and Abuse Infrastructure
The Services may not be used to:
Distribute malware;
Operate command-and-control systems;
Host phishing kits or credential harvesting tools;
Conduct brute-force or credential stuffing attacks;
Operate botnets;
Distribute ransomware or exploit kits.
3.5 Network Abuse
Prohibited activities include:
Distributed denial-of-service (DDoS) attacks;
Network flooding or amplification attacks;
IP spoofing;
Unauthorized scanning or intrusion attempts;
Interference with networks or systems of third parties.
Security testing is permitted only with proper authorization from the relevant system owner.
3.6 Unauthorized Access
Customers may not:
Attempt to gain unauthorized access to systems or data;
Circumvent authentication or security controls;
Exploit vulnerabilities without authorization.
3.7 Fraud and Payment Abuse
It is prohibited to:
Obtain services without valid payment;
Use stolen or unauthorized payment methods;
Misrepresent identity;
Engage in financial fraud.
3.8 High-Risk Activities
Certain activities may materially increase abuse, operational, or reputational risk. Unless explicitly approved in writing, Customers may not operate:
Open proxy services;
Public anonymization services;
Public VPN exit nodes;
Tor exit nodes;
Large-scale cryptocurrency mining operations;
Services primarily designed to conceal identity for unlawful purposes.
3.9 Resource and Infrastructure Abuse
Customers may not use the Services in a manner that:
Excessively consumes network, compute, or storage resources beyond reasonable or contracted limits;
Materially degrades network performance;
Disrupts other customers or shared infrastructure;
Creates abnormal traffic patterns inconsistent with normal service use.
The Provider reserves the right to take corrective action where resource usage threatens infrastructure stability.
4. Sanctions and Trade Compliance
Customers are responsible for ensuring that their use of the Services complies with applicable trade and sanctions laws relevant to their activities.
The Provider may restrict, suspend, or terminate Services where necessary to comply with applicable legal or regulatory obligations.
5. Customer Responsibility
Customers are responsible for:
Activities of their users and end-clients;
Securing their infrastructure and credentials;
Maintaining accurate and responsive contact information;
Responding promptly to abuse notifications;
Implementing appropriate safeguards to prevent misuse.
Failure to cooperate in resolving abuse issues may result in suspension or termination.
6. Investigation and Enforcement
The Provider may:
Investigate suspected violations of this AUP;
Monitor relevant service metadata as necessary to protect infrastructure;
Cooperate with lawful authorities where legally required.
Services may be suspended where:
Ongoing abuse or security threats are identified;
Immediate action is required to protect infrastructure or third parties;
Legal compliance requires restriction.
Where appropriate, the Provider may allow remediation prior to further action.
7. Termination for Violations
In addition to any suspension rights described above, the Provider reserves the right to terminate the Services in the event of:
Material or repeated violations of this AUP;
Failure to remedy a violation within a reasonable period after notice, where applicable;
Activities that pose a significant operational, legal, security, or reputational risk to the Provider, other customers, or third parties;
Legal or regulatory requirements mandating termination.
Where reasonably practicable, the Provider may provide notice prior to termination. However, the Provider may terminate Services immediately where necessary to prevent harm, ensure security, mitigate risk, or comply with legal obligations.
Termination under this section shall be without prejudice to any other rights available to the Provider under the applicable Agreement.
8. Reporting Abuse
Abuse reports may be sent to: abuse@foxcloud.net
Customers operating public-facing services must maintain an abuse contact where required.
9. Amendments
The Provider may update this AUP from time to time.
Continued use of the Services after publication of updates constitutes acceptance of the revised AUP.
10. Governing Agreement
This AUP is governed by and incorporated into the applicable Agreement between the Customer and the Provider.
In the event of conflict, the governing Agreement prevails.
