Done5 Technologies

Acceptable Use Policy (APU)

Acceptable Use Policy

Last Updated: 17 January 2026

By using Done 5 Technologies services, you agree to comply with this policy, our Terms of Service, and all applicable laws. Violation may result in immediate suspension or termination without notice.

  1. Scope of Acceptable Use

    ● All Done 5 Technologies customers
    ● Resellers and their end users
    ● Any third party using our servers, network, or IPs
    ● Account owners are responsible for all activity under their services

  2. General Usage Rules

    ● Use services lawfully and responsibly
    ● Do not disrupt network or service stability
    ● Do not harm other customers or third parties
    ● Violations are determined solely by Done 5 Technologies

  3. Prohibited Content

    ● Any illegal content
    ● Malware, viruses, ransomware, spyware, or trojans
    ● Phishing, scams, or deceptive material
    ● Child exploitation or abuse material
    ● Unauthorized copyrighted content
    ● Counterfeit goods or trademark infringement
    ● Hate speech, threats, or harassment
    ● Content violating privacy or data protection laws

  4. Fraud, Abuse & Misuse

    ● Payment fraud or identity theft
    ● False chargebacks or disputes
    ● Impersonation or fake identity use
    ● Bypassing billing or service limits
    ● Multiple accounts to avoid restrictions
    ● Abuse of promotions or discounts
    ● Confirmed fraud may lead to termination and legal action

  5. Resource & Fair Usage

    ● Do not exceed CPU, memory, disk, or bandwidth limits
    ● Do not use hosting mainly for storage or backups
    ● Do not store large unrelated files
    ● Do not run resource-exhausting processes
    Limits:
    ● Non-web files must be under 70% of disk usage
    ● CPU must not exceed 90% of one core for long periods
    ● Excessive concurrent processes are not allowed
    ● Violations may cause throttling, suspension, or termination

  6. Email & Anti-Spam Rules

    ● No unsolicited bulk email (spam)
    ● No email spoofing or forged headers
    ● No open relays or insecure mail scripts
    ● No spam tools or bulk mailing databases
    ● Causing IP blacklisting can trigger immediate suspension

  7. Network & Security Violations

    ● Unauthorized system or data access
    ● Port scanning or vulnerability testing
    ● Exploiting software or system weaknesses
    ● Traffic interception or sniffing
    ● Brute-force or credential stuffing attacks
    ● Incidents may be reported to authorities

  8. Denial of Service (DoS/DDoS)

    ● DoS or DDoS attacks
    ● Traffic flooding or resource exhaustion
    ● Coordinated attacks on any network
    ● Customers must secure their own applications and servers

  9. Reselling & Third-Party Use

    ● You are responsible for your end users
    ● No reselling to known spam or abuse entities
    ● No use for blacklisted individuals or groups
    ● End-user violations count against the main account

  10. IP Reputation & Network Protection

    ● IP blacklisting
    ● Network reputation damage
    ● Upstream provider complaints
    ● Services may be immediately suspended or terminated

  11. Copyright & DMCA Compliance

    ● No copyright or trademark infringement
    ● Infringing material will be removed
    ● Repeat violations lead to termination
    ● No piracy or counterfeit distribution
    ● Reports: abuse@done5.com

  12. Enforcement Actions

    ● Warning notices
    ● Resource limits or throttling
    ● Temporary suspension
    ● Permanent termination
    ● Financial penalties for intentional abuse
    ● Severe abuse may result in termination without refund

  13. Policy Updates

    ● Policy may be modified at any time
    ● Continued use means you accept updates

  14. Final Authority

    ● Done 5 Technologies has the final decision on violations and actions

By using the services, you confirm that you have read, understood, and agreed to this Acceptable Use Policy.