Purpose of This Policy
This Acceptable Use Policy ("AUP") defines prohibited uses of AiryHosting's hosting services. All customers must comply with this policy to maintain active services.
Violation of this policy will result in immediate account suspension or termination without refund.
By using AiryHosting services, you agree to comply with all terms of this Acceptable Use Policy.
ZERO TOLERANCE POLICY
AiryHosting has ABSOLUTELY ZERO TOLERANCE for:
🚫 SPAM - Any form of unsolicited commercial email
🚫 ABUSE - Resource abuse, server abuse, or network abuse
🚫 ILLEGAL CONTENT - Content violating Indian or international laws
🚫 MALICIOUS ACTIVITIES - Hacking, phishing, malware distribution
First Offense = Immediate Suspension
Confirmed Violation = Permanent Termination Without Refund
No Warnings Issued
PART 1: SPAM POLICY
What Constitutes Spam?
Spam includes ANY of the following:
❌ Unsolicited Commercial Email (UCE)
❌ Mass Mailing
❌ Email Harvesting
❌ Spam Advertising
❌ Email Spoofing
Anti-Spam Compliance
We comply with:
Required for legitimate email marketing:
✓ Recipients opted-in explicitly
✓ Clear unsubscribe mechanism
✓ Accurate sender information
✓ Legitimate subject lines
✓ Physical mailing address included
✓ Honor unsubscribe requests within 48 hours
Spam Enforcement
If spam is detected:
Step 1: Immediate Suspension (0 minutes)
Step 2: Investigation (24-48 hours)
Step 3: Decision
If Spam Confirmed:
If False Positive:
There are NO warnings for spam. First offense = immediate action.
PART 2: PROHIBITED CONTENT
Illegal Content
❌ Child Sexual Abuse Material (CSAM)
❌ Piracy and Copyright Infringement
❌ Trademark Violations
❌ Illegal Drugs
Harmful Content
❌ Terrorism and Violent Extremism
❌ Hate Speech
❌ Violence and Gore
❌ Self-Harm Content
Adult Content
❌ Pornography (on shared hosting)
Note: Adult content may be permitted on VPS/Dedicated servers with prior approval. Contact us for details.
Gambling and Gaming
❌ Online Gambling - Casino, poker, betting websites (unless properly licensed)
❌ Lottery Systems - Online lottery or sweepstakes without proper authorization
❌ Gaming Scripts - Illegal gaming or gambling scripts
Licensed gambling operators: Contact us with license documentation for special arrangements.
PART 3: PROHIBITED ACTIVITIES
Malicious Activities
❌ Hacking/Cracking - Unauthorized access attempts to any system
❌ Malware Distribution - Hosting or distributing viruses, trojans, ransomware
❌ Phishing - Creating fake login pages to steal credentials
❌ Spoofing - IP spoofing, email spoofing, or identity theft
❌ DDoS Attacks - Participating in or launching denial-of-service attacks
❌ Port Scanning - Scanning networks or servers without authorization
❌ Exploits - Hosting or distributing security exploits
❌ Brute Force - Password cracking or brute force attacks
Network Abuse
❌ IRC Bots - Internet Relay Chat bots or bouncers
❌ Proxy Services - Open proxies, VPN servers, Tor exit nodes
❌ Torrent Seeding - BitTorrent trackers or seedboxes
❌ File Sharing - Mass file sharing or download sites
❌ Mirror Sites - Hosting mirrors of pirated content
❌ Anonymous Remailers - Email anonymization services
Resource Abuse
❌ Cryptocurrency Mining - CPU mining (Bitcoin, Ethereum, etc.) without authorization
❌ Excessive CPU Usage - Scripts consuming excessive CPU resources
❌ Memory Abuse - Applications exceeding RAM limits
❌ Disk I/O Abuse - Excessive disk read/write operations
❌ Bandwidth Abuse - Excessive bandwidth consumption
❌ Mass File Storage - Using hosting for file backup/storage only
Cryptocurrency Mining:
PART 4: EMAIL POLICIES
Email Sending Limits
Per Hour Limits:
Exceeding limits:
Email Best Practices
You MUST:
✓ Only email people who opted-in
✓ Include unsubscribe link in every email
✓ Include physical mailing address
✓ Use accurate "From" name and address
✓ Honor unsubscribe requests within 48 hours
✓ Keep bounce rates under 10%
✓ Maintain complaint rate under 0.1%
You MUST NOT:
✗ Send emails to purchased lists
✗ Send emails without consent
✗ Hide or obscure unsubscribe links
✗ Continue emailing after unsubscribe
✗ Use misleading subject lines
✗ Forge email headers
Email Compliance
Your email marketing must comply with:
We monitor:
PART 5: SECURITY REQUIREMENTS
Your Security Responsibilities
You MUST:
✓ Use strong, unique passwords
✓ Enable two-factor authentication (2FA)
✓ Keep software updated (WordPress, plugins, themes)
✓ Remove unused software and accounts
✓ Implement proper file permissions
✓ Use HTTPS/SSL for all sites
✓ Monitor your account for suspicious activity
✓ Report security incidents immediately
You MUST NOT:
✗ Share account credentials
✗ Use default passwords
✗ Leave admin accounts open
✗ Install nulled/pirated scripts
✗ Ignore security updates
✗ Store sensitive data unencrypted
Security Incidents
If you discover a security vulnerability:
Prohibited Security Testing
❌ No Penetration Testing without written authorization
❌ No Vulnerability Scanning without permission
❌ No Social Engineering of our staff or other customers
Request authorization: security@airyhosting.com
PART 6: INTELLECTUAL PROPERTY
Copyright Compliance
✓ Only host content you own or have rights to use
✓ Respect copyright licenses (GPL, MIT, Creative Commons, etc.)
✓ Provide proper attribution where required
✓ Remove infringing content immediately upon notice
DMCA Takedown Process
Copyright holders can report infringement:
Repeat infringement:
PART 7: MONITORING AND ENFORCEMENT
Our Monitoring Rights
We reserve the right to monitor:
We do NOT routinely monitor:
Privacy Balance
We respect your privacy but:
Investigation Process
If abuse is suspected:
Appeals Process
If your account is suspended for AUP violation:
Note: Spam, CSAM, terrorism, and malware violations are NOT appealable.
PART 8: CONSEQUENCES OF VIOLATIONS
Immediate Suspension (No Warning)
These violations result in immediate suspension:
Warning System (Other Violations)
For less severe violations:
First Warning:
Second Warning:
Third Warning:
Permanent Termination
Permanent termination with no refund for:
After termination:
PART 9: REPORTING VIOLATIONS
How to Report Abuse
If you encounter a violation of this AUP:
For Spam:
For Illegal Content:
For Security Issues:
For CSAM (Child Sexual Abuse Material):
We Take Reports Seriously
When you report abuse:
PART 10: LEGAL FRAMEWORK
Applicable Laws
This AUP is enforced under:
Indian Laws:
International Laws (where applicable):
Law Enforcement Cooperation
We cooperate with law enforcement:
Data Preservation
For legal investigations:
CONTACT INFORMATION
Report Abuse
Immediate Threats (CSAM, Terrorism):
Email: emergency@airyhosting.com
Phone: +91 9773880721
General AUP Violations:
Email: abuse@airyhosting.com
Expected response: 24-48 hours
Copyright/DMCA Issues:
Email: dmca@airyhosting.com
Security Vulnerabilities:
Email: security@airyhosting.com
General Support
Support Portal: https://my.airyhosting.com
Email: support@airyhosting.com
Phone: +91 9773880721
Hours: Monday-Saturday, 10 AM - 6 PM IST
Company Address
NXlogy Solutions Private Limited (AiryHosting)
D 31, 3rd Floor
Sector 10, Noida 201301
Uttar Pradesh, India
SUMMARY
✓ ZERO TOLERANCE for spam, abuse, and illegal content
✓ First offense = Immediate suspension
✓ No warnings for serious violations
✓ No refunds for AUP violations
✓ Immediate termination for: spam, CSAM, terrorism, malware
✓ Legal action for serious violations
✓ Report abuse to abuse@airyhosting.com
✓ Your responsibility to comply and monitor your account
We take abuse seriously to protect our customers, our reputation, and the internet community.
If you're unsure whether something is allowed, ask us BEFORE doing it: support@airyhosting.com
Last Updated: November 12, 2025
Version: 1.0
Effective Date: November 12, 2025
This Acceptable Use Policy is designed to protect AiryHosting, our customers, and the internet community from abuse. By using our services, you agree to comply with all terms of this policy.