Acceptable-Use-Policy

Users must use services responsibly, avoid illegal activities, prevent misuse, and follow all security guidelines.

Purpose of This Policy

This Acceptable Use Policy ("AUP") defines prohibited uses of AiryHosting's hosting services. All customers must comply with this policy to maintain active services.

Violation of this policy will result in immediate account suspension or termination without refund.

By using AiryHosting services, you agree to comply with all terms of this Acceptable Use Policy.

ZERO TOLERANCE POLICY

AiryHosting has ABSOLUTELY ZERO TOLERANCE for:

🚫 SPAM - Any form of unsolicited commercial email
🚫 ABUSE - Resource abuse, server abuse, or network abuse
🚫 ILLEGAL CONTENT - Content violating Indian or international laws
🚫 MALICIOUS ACTIVITIES - Hacking, phishing, malware distribution

First Offense = Immediate Suspension
Confirmed Violation = Permanent Termination Without Refund
No Warnings Issued

PART 1: SPAM POLICY

What Constitutes Spam?

Spam includes ANY of the following:

Unsolicited Commercial Email (UCE)

  • Bulk emails to recipients who did not opt-in
  • Purchased or rented email lists
  • Scraped email addresses from websites
  • Emails to people who did not request them

Mass Mailing

  • Sending same/similar message to many recipients
  • Bulk email campaigns without permission
  • Newsletter to non-subscribers
  • Promotional emails without consent

Email Harvesting

  • Collecting email addresses from websites
  • Using email harvesting software/scripts
  • Buying email lists from third parties
  • Scraping contact forms

Spam Advertising

  • Hosting websites promoted through spam
  • Running services advertised via spam
  • Affiliate programs promoted via spam
  • Products/services marketed through UCE

Email Spoofing

  • Forging email headers
  • Impersonating other people/companies
  • Fake "From" addresses
  • Deceptive reply-to addresses

Anti-Spam Compliance

We comply with:

  • TRAI (Telecom Regulatory Authority of India) regulations
  • CAN-SPAM Act (USA)
  • GDPR email marketing rules (EU)
  • IT Act 2000 (India)

Required for legitimate email marketing:
✓ Recipients opted-in explicitly
✓ Clear unsubscribe mechanism
✓ Accurate sender information
✓ Legitimate subject lines
✓ Physical mailing address included
✓ Honor unsubscribe requests within 48 hours

Spam Enforcement

If spam is detected:

Step 1: Immediate Suspension (0 minutes)

  • Account suspended automatically
  • All services disabled immediately
  • Investigation begins

Step 2: Investigation (24-48 hours)

  • Review email logs and patterns
  • Check recipient complaints
  • Analyze sending behavior
  • Contact customer for explanation

Step 3: Decision

If Spam Confirmed:

  • ❌ Permanent account termination
  • ❌ No refund issued
  • ❌ All data deleted
  • ❌ Banned from future services
  • ❌ Reported to anti-spam organizations

If False Positive:

  • ✓ Account restored
  • ✓ Apology issued
  • ✓ Investigation findings shared

There are NO warnings for spam. First offense = immediate action.

PART 2: PROHIBITED CONTENT

Illegal Content

Child Sexual Abuse Material (CSAM)

  • Absolutely prohibited under all circumstances
  • Reported immediately to law enforcement
  • Account terminated instantly
  • Legal action guaranteed

Piracy and Copyright Infringement

  • Pirated software, games, apps
  • Cracked or nulled scripts
  • Copyrighted movies, TV shows, music
  • eBooks, audiobooks without rights
  • Warez sites or download portals

Trademark Violations

  • Fake products or counterfeits
  • Brand impersonation
  • Unauthorized use of trademarks
  • Phishing sites mimicking brands

Illegal Drugs

  • Online pharmacies without license
  • Illegal drug sales or promotion
  • Controlled substances
  • Drug paraphernalia

Harmful Content

Terrorism and Violent Extremism

  • Terrorist propaganda or recruitment
  • Bomb-making or weapon instructions
  • Violent extremist content
  • Incitement to violence

Hate Speech

  • Content promoting hatred against race, ethnicity, religion
  • Nazi symbols or ideology
  • Genocide denial or promotion
  • Discriminatory content

Violence and Gore

  • Extreme violence or torture content
  • Graphic death or injury content
  • Animal cruelty content

Self-Harm Content

  • Suicide promotion or instructions
  • Self-injury encouragement
  • Pro-anorexia or pro-bulimia content

Adult Content

Pornography (on shared hosting)

  • Adult videos or images
  • Escort or dating services
  • Adult live streams
  • Sex-related services

Note: Adult content may be permitted on VPS/Dedicated servers with prior approval. Contact us for details.

Gambling and Gaming

Online Gambling - Casino, poker, betting websites (unless properly licensed)
Lottery Systems - Online lottery or sweepstakes without proper authorization
Gaming Scripts - Illegal gaming or gambling scripts

Licensed gambling operators: Contact us with license documentation for special arrangements.

PART 3: PROHIBITED ACTIVITIES

Malicious Activities

Hacking/Cracking - Unauthorized access attempts to any system
Malware Distribution - Hosting or distributing viruses, trojans, ransomware
Phishing - Creating fake login pages to steal credentials
Spoofing - IP spoofing, email spoofing, or identity theft
DDoS Attacks - Participating in or launching denial-of-service attacks
Port Scanning - Scanning networks or servers without authorization
Exploits - Hosting or distributing security exploits
Brute Force - Password cracking or brute force attacks

Network Abuse

IRC Bots - Internet Relay Chat bots or bouncers
Proxy Services - Open proxies, VPN servers, Tor exit nodes
Torrent Seeding - BitTorrent trackers or seedboxes
File Sharing - Mass file sharing or download sites
Mirror Sites - Hosting mirrors of pirated content
Anonymous Remailers - Email anonymization services

Resource Abuse

Cryptocurrency Mining - CPU mining (Bitcoin, Ethereum, etc.) without authorization
Excessive CPU Usage - Scripts consuming excessive CPU resources
Memory Abuse - Applications exceeding RAM limits
Disk I/O Abuse - Excessive disk read/write operations
Bandwidth Abuse - Excessive bandwidth consumption
Mass File Storage - Using hosting for file backup/storage only

Cryptocurrency Mining:

  • Strictly prohibited on shared hosting
  • May be permitted on dedicated resources with prior approval
  • Contact us before implementing any mining operations

PART 4: EMAIL POLICIES

Email Sending Limits

Per Hour Limits:

  • 10 emails/hour
  • 50 emails/domain/hour

Exceeding limits:

  • First time: Warning + temporary throttle
  • Second time: 24-hour suspension
  • Third time: Account review + possible termination

Email Best Practices

You MUST:
✓ Only email people who opted-in
✓ Include unsubscribe link in every email
✓ Include physical mailing address
✓ Use accurate "From" name and address
✓ Honor unsubscribe requests within 48 hours
✓ Keep bounce rates under 10%
✓ Maintain complaint rate under 0.1%

You MUST NOT:
✗ Send emails to purchased lists
✗ Send emails without consent
✗ Hide or obscure unsubscribe links
✗ Continue emailing after unsubscribe
✗ Use misleading subject lines
✗ Forge email headers

Email Compliance

Your email marketing must comply with:

  • TRAI (India) anti-spam regulations
  • CAN-SPAM Act (USA)
  • GDPR (EU) consent requirements
  • IT Act 2000 (India)

We monitor:

  • Spam complaints via feedback loops
  • Bounce rates
  • Blacklist listings
  • Email sending patterns
  • Recipient complaints

PART 5: SECURITY REQUIREMENTS

Your Security Responsibilities

You MUST:
✓ Use strong, unique passwords
✓ Enable two-factor authentication (2FA)
✓ Keep software updated (WordPress, plugins, themes)
✓ Remove unused software and accounts
✓ Implement proper file permissions
✓ Use HTTPS/SSL for all sites
✓ Monitor your account for suspicious activity
✓ Report security incidents immediately

You MUST NOT:
✗ Share account credentials
✗ Use default passwords
✗ Leave admin accounts open
✗ Install nulled/pirated scripts
✗ Ignore security updates
✗ Store sensitive data unencrypted

Security Incidents

If you discover a security vulnerability:

  1. Report immediately to: security@airyhosting.com
  2. Do NOT exploit or publicize vulnerabilities
  3. Do NOT access other customers' data
  4. We will investigate and respond within 48 hours
  5. Responsible disclosure may earn recognition/rewards

Prohibited Security Testing

No Penetration Testing without written authorization
No Vulnerability Scanning without permission
No Social Engineering of our staff or other customers

Request authorization: security@airyhosting.com

PART 6: INTELLECTUAL PROPERTY

Copyright Compliance

✓ Only host content you own or have rights to use
✓ Respect copyright licenses (GPL, MIT, Creative Commons, etc.)
✓ Provide proper attribution where required
✓ Remove infringing content immediately upon notice

DMCA Takedown Process

Copyright holders can report infringement:

  1. Send notice to: dmca@airyhosting.com
  2. Include:
    • Your contact information
    • Description of copyrighted work
    • Location of infringing material (URL)
    • Statement of good faith belief
    • Statement of accuracy under penalty of perjury
    • Physical or electronic signature
  3. We remove/disable access to content within 24-48 hours
  4. Customer notified of takedown
  5. Customer can file counter-notice if content is legal

Repeat infringement:

  • 3 strikes = Account termination
  • No refunds for copyright-related terminations

PART 7: MONITORING AND ENFORCEMENT

Our Monitoring Rights

We reserve the right to monitor:

  • Server resource usage (CPU, RAM, bandwidth, disk)
  • Email sending patterns and volumes
  • Network traffic for security threats
  • Automated security scans for malware
  • Public content for policy compliance
  • Server logs for abuse patterns

We do NOT routinely monitor:

  • Private email contents (unless investigating abuse)
  • Private files (unless investigating security incident)
  • Database contents
  • Encrypted communications

Privacy Balance

We respect your privacy but:

  • Security and abuse prevention take priority
  • We can inspect content if abuse suspected
  • Law enforcement requests are honored
  • Malware scanning is automatic

Investigation Process

If abuse is suspected:

  1. Automated systems flag potential violation
  2. Human review of flagged content/activity
  3. If violation confirmed:
    • Account suspended immediately
    • Customer notified via email
    • 24-48 hours to respond
    • Evidence reviewed
    • Decision made (restore or terminate)

Appeals Process

If your account is suspended for AUP violation:

  1. Submit appeal to: support@airyhosting.com
  2. Explain the situation with evidence
  3. Describe corrective actions taken
  4. Management reviews appeal within 48 hours
  5. Decision is final

Note: Spam, CSAM, terrorism, and malware violations are NOT appealable.

PART 8: CONSEQUENCES OF VIOLATIONS

Immediate Suspension (No Warning)

These violations result in immediate suspension:

  • Spam or bulk unsolicited email
  • Child sexual abuse material (CSAM)
  • Terrorism or violent extremism
  • Malware or virus distribution
  • Hacking or unauthorized access
  • DDoS attacks
  • Server security compromise

Warning System (Other Violations)

For less severe violations:

First Warning:

  • Email notification of violation
  • 24 hours to remedy issue
  • Technical guidance provided
  • Account remains active

Second Warning:

  • Email notification of repeated violation
  • 12 hours to remedy issue
  • Review of account standing
  • Possible suspension if severe

Third Warning:

  • Suspension pending corrective action
  • 48 hours to respond
  • Mandatory account review
  • Possible termination

Permanent Termination

Permanent termination with no refund for:

  • Confirmed spam activity
  • CSAM or illegal content
  • Terrorism or extremism
  • Repeated policy violations
  • Fraudulent activity
  • Serious security breaches
  • Refusal to remedy violations

After termination:

  • All data permanently deleted
  • No backup recovery available
  • No refund issued
  • Banned from future services
  • May be reported to authorities

PART 9: REPORTING VIOLATIONS

How to Report Abuse

If you encounter a violation of this AUP:

For Spam:

  • Email: abuse@airyhosting.com
  • Include full email headers
  • Forward original spam message
  • Note IP address if known

For Illegal Content:

  • Email: abuse@airyhosting.com
  • Include URL of violating content
  • Description of violation
  • Your contact information

For Security Issues:

For CSAM (Child Sexual Abuse Material):

We Take Reports Seriously

When you report abuse:

  • We investigate within 24 hours
  • We take appropriate action if confirmed
  • We respond to reporter with outcome
  • We protect reporter identity
  • We thank responsible reporters

PART 10: LEGAL FRAMEWORK

Applicable Laws

This AUP is enforced under:

Indian Laws:

  • Information Technology Act, 2000
  • IT (Intermediary Guidelines) Rules, 2021
  • Indian Penal Code (IPC)
  • Copyright Act, 1957
  • TRAI Regulations

International Laws (where applicable):

  • CAN-SPAM Act (USA)
  • GDPR (EU)
  • DMCA (USA)
  • COPPA (USA)

Law Enforcement Cooperation

We cooperate with law enforcement:

  • Respond to valid legal requests
  • Provide account information under court order
  • Assist in criminal investigations
  • Report serious crimes (CSAM, terrorism)
  • Comply with Information Technology Act requirements

Data Preservation

For legal investigations:

  • We preserve data when legally required
  • Court orders honored promptly
  • Customer notification (unless prohibited)
  • Transparency report published annually

CONTACT INFORMATION

Report Abuse

Immediate Threats (CSAM, Terrorism):
Email: emergency@airyhosting.com
Phone: +91 9773880721

General AUP Violations:
Email: abuse@airyhosting.com
Expected response: 24-48 hours

Copyright/DMCA Issues:
Email: dmca@airyhosting.com

Security Vulnerabilities:
Email: security@airyhosting.com

General Support

Support Portal: https://my.airyhosting.com
Email: support@airyhosting.com
Phone: +91 9773880721
Hours: Monday-Saturday, 10 AM - 6 PM IST

Company Address

NXlogy Solutions Private Limited (AiryHosting)
D 31, 3rd Floor
Sector 10, Noida 201301
Uttar Pradesh, India

SUMMARY

ZERO TOLERANCE for spam, abuse, and illegal content
First offense = Immediate suspension
No warnings for serious violations
No refunds for AUP violations
Immediate termination for: spam, CSAM, terrorism, malware
Legal action for serious violations
Report abuse to abuse@airyhosting.com
Your responsibility to comply and monitor your account

We take abuse seriously to protect our customers, our reputation, and the internet community.

If you're unsure whether something is allowed, ask us BEFORE doing it: support@airyhosting.com

Last Updated: November 12, 2025
Version: 1.0
Effective Date: November 12, 2025

This Acceptable Use Policy is designed to protect AiryHosting, our customers, and the internet community from abuse. By using our services, you agree to comply with all terms of this policy.

Ready to Get Started?

Join hundreds of businesses trusting Airy Hosting with their web presence

© 2025 Airy Hosting. All rights reserved. Providing premium managed hosting services across India.