Acceptable Use Policy
The strict technical operating procedures preventing network contamination and resource exploitation on our infrastructure.
TL;DR: The Zero-Tolerance Actions
- No Network Contamination: Zero tolerance for outbound spam (SMTP abuse), phishing deployments, or malware distribution. Violations result in immediate null-routing.
- No CPU/IO Abuse: Continuous CPU-bound stress testing, un-throttled heavy workloads on shared cores, or severe I/O saturation exceeding defined bursting limits is prohibited.
- No AI/Data Scraping: Deploying resource-intensive visual scrapers or conducting unauthorized massive AI-model data harvesting that causes "noisy neighbor" impacts is strictly banned.
- No Network Abuse: Executing DDoS attacks, port scanning, IP spoofing, or crypto-mining from our network ranges is prohibited. Violations result in instant cluster termination.
- No File Hosting: Shared hosting accounts cannot be used as file storage, download hubs, or backup repositories. Hosting is for active websites and web applications only.
- No Illegal Content: Hosting CSAM, drug trafficking, terrorism content, counterfeit goods, or any material illegal under US/EU law results in immediate termination and law enforcement referral.
1. Architectural Purpose of AUP
This Acceptable Use Policy (AUP) defines the technical operating boundaries for all deployments on GOZEN HOST LLC infrastructure. Its purpose is to protect the integrity, throughput, and BGP reputation of our ASN, and to maintain a clean deployment environment for all tenants in our ISO 27001-certified facilities with N+1 redundancy. Enforcement runs via automated network telemetry and direct intervention by the Abuse Operations Team.
2. Network Output & Traffic Control
You are strictly restricted from utilizing our network allocations (IPv4/IPv6) for malicious broadcasts:
- Spam & SMTP Constraints: Transmitting unsolicited bulk email (UBE), CAN-SPAM violations, or maintaining open SMTP relays. Mail ports (25) may be blocked on new deployments to deter abuse vectors until identity verification is complete.
- DDoS & Packet Flooding: Generating anomalous UDP/TCP traffic volumes designed to overwhelm target networks or bypass downstream security measures.
- Scanning & Exploit Delivery: Unauthorized vulnerability probing, port scanning external IPs, or acting as a distribution node for trojans, worms, or exploit payloads.
- IP Spoofing: Forging source IP addresses or altering network headers to mask origin points is absolutely prohibited and will result in instant cluster termination.
3. Resource Exploitation Limits
Our shared resources rely on fair-use distribution across the hypervisor pool. Deliberately monopolizing hardware primitives creates "noisy neighbor" degradation. The following specific constraints govern bursting and utilization on VPS containers:
- Burst Allowances (CPU/RAM): You may burst to 100% vCPU allocation for periods not exceeding 15 continuous minutes within a 2-hour window. Sustained 100% utilization indicating continuous background processing requires a Dedicated Server upgrade. Note: VPS plans with dedicated vCPU cores are exempt from burst limits. These limits apply to shared hosting and burstable VPS tiers only.
- I/O Starvation: Running persistent read/write disk loops that deliberately saturate NVMe backend channels locally is banned. Disk I/O must remain within typical web/database operational thresholds.
- Crypto-Mining: Deploying Proof-of-Work (PoW) mining, Chia plotting, or any continuous CPU/GPU-bound cryptocurrency operations across non-dedicated infrastructure is strictly prohibited. This includes but is not limited to Bitcoin, Litecoin, Monero, and any altcoin mining scripts.
4. AI Crawlers & Scraping Operations
In light of the 2026 demands placed on global infrastructure by large language models, GOZEN HOST LLC strongly regulates dataset aggregation on our shared networks to prevent extreme volumetric bandwidth saturation:
- Permission & Scraping: Operating heavy, multi-threaded internet scrapers or crawlers designed to harvest vast amounts of external data for AI-model training without the explicit permission of the target networks is prohibited.
- Noisy Neighbor Impacts: Any scraper or crawler script that consumes excessive sustained bandwidth output, thereby degrading the localized network pool of neighboring tenants, will be automatically throttled and investigated.
5. Content Restrictions & DMCA Operations
We respect the "dumb pipe" safe harbor provisions but demand rapid compliance with legal notices. Deployments may not contain or distribute:
- Unlawful Operations: Any digital asset violating the local laws of the deployment region (e.g. Amsterdam, Virginia) or the State of Delaware.
- Copyright Violations: Pirated software repositories (warez), unlicensed streaming relays, or direct torrent-seeding directories neglecting DMCA valid takedowns.
- Phishing & Fraud: Replicating institutional interfaces to harvest authentication credentials or propagating financial scams.
- File Hosting & Sharing: Using shared hosting accounts as a file storage platform, public download hub, CDN origin, or remote backup repository is prohibited. Shared hosting is provisioned for active websites and web applications, not for distributing archives, media dumps, or personal backups. Accounts found operating primarily as file-hosting services will be suspended.
- Illegal Content: Hosting, storing, or distributing any content that is illegal under US federal law, EU regulations, or the laws of the datacenter's jurisdiction. This includes, without limitation: child sexual abuse material (CSAM), drug trafficking operations, terrorism-related content, sales of counterfeit goods, and materials promoting violence or discrimination in violation of applicable law. Discovery of such content results in immediate termination without notice and referral to law enforcement.
- Excessive Storage Abuse: Shared hosting disk allocations must support actively running websites. Using allocated storage primarily for archival backups, dataset repositories, or bulk file collections unrelated to a live web presence violates fair-use terms. Clients requiring dedicated storage should use our VPS or dedicated server plans.
DMCA Designated Agent: To report copyright infringement under the Digital Millennium Copyright Act (17 U.S.C. § 512), send DMCA takedown notices with all required statutory elements to our designated agent via the Abuse Report Center or email abuse@gozenhost.com. Include: (1) identification of the copyrighted work, (2) identification of the infringing material with URL, (3) your contact information, (4) a good-faith statement, and (5) a statement of accuracy under penalty of perjury.
6. Enforcement Protocols & Blacklisting
If our telemetry layers or external Abuse Desks flag a deployment for AUP violations, we follow an escalating mitigation matrix:
- Null-Routing: Immediate automated IP filtering to contain outward attacks.
- Instance Suspension: Pausing the container/hypervisor execution state to prevent further resource depletion.
- Ticket Notification: We open a mandatory High-Priority Support Incident with the tenant account. A 24-hour response window is typically provided for resolution (excluding severe criminal infractions).
- Termination: Continued non-compliance or severe initial infractions result in permanent data deletion without refund.
Related Legal Documents
Report an Abuse Vector
If you detect a GoZen Host IP address violating this AUP, report it immediately to our automated tracking desk. Include relevant PCAP evidence or server logs.