Acceptable Use Policy
Last Updated: 17 January 2026
By using Done 5 Technologies services, you agree to comply with this policy, our Terms of Service, and all applicable laws. Violation may result in immediate suspension or termination without notice.
Scope of Acceptable Use
● All Done 5 Technologies customers
● Resellers and their end users
● Any third party using our servers, network, or IPs
● Account owners are responsible for all activity under their servicesGeneral Usage Rules
● Use services lawfully and responsibly
● Do not disrupt network or service stability
● Do not harm other customers or third parties
● Violations are determined solely by Done 5 TechnologiesProhibited Content
● Any illegal content
● Malware, viruses, ransomware, spyware, or trojans
● Phishing, scams, or deceptive material
● Child exploitation or abuse material
● Unauthorized copyrighted content
● Counterfeit goods or trademark infringement
● Hate speech, threats, or harassment
● Content violating privacy or data protection lawsFraud, Abuse & Misuse
● Payment fraud or identity theft
● False chargebacks or disputes
● Impersonation or fake identity use
● Bypassing billing or service limits
● Multiple accounts to avoid restrictions
● Abuse of promotions or discounts
● Confirmed fraud may lead to termination and legal actionResource & Fair Usage
● Do not exceed CPU, memory, disk, or bandwidth limits
● Do not use hosting mainly for storage or backups
● Do not store large unrelated files
● Do not run resource-exhausting processes
Limits:
● Non-web files must be under 70% of disk usage
● CPU must not exceed 90% of one core for long periods
● Excessive concurrent processes are not allowed
● Violations may cause throttling, suspension, or terminationEmail & Anti-Spam Rules
● No unsolicited bulk email (spam)
● No email spoofing or forged headers
● No open relays or insecure mail scripts
● No spam tools or bulk mailing databases
● Causing IP blacklisting can trigger immediate suspensionNetwork & Security Violations
● Unauthorized system or data access
● Port scanning or vulnerability testing
● Exploiting software or system weaknesses
● Traffic interception or sniffing
● Brute-force or credential stuffing attacks
● Incidents may be reported to authoritiesDenial of Service (DoS/DDoS)
● DoS or DDoS attacks
● Traffic flooding or resource exhaustion
● Coordinated attacks on any network
● Customers must secure their own applications and serversReselling & Third-Party Use
● You are responsible for your end users
● No reselling to known spam or abuse entities
● No use for blacklisted individuals or groups
● End-user violations count against the main accountIP Reputation & Network Protection
● IP blacklisting
● Network reputation damage
● Upstream provider complaints
● Services may be immediately suspended or terminatedCopyright & DMCA Compliance
● No copyright or trademark infringement
● Infringing material will be removed
● Repeat violations lead to termination
● No piracy or counterfeit distribution
● Reports: abuse@done5.comEnforcement Actions
● Warning notices
● Resource limits or throttling
● Temporary suspension
● Permanent termination
● Financial penalties for intentional abuse
● Severe abuse may result in termination without refundPolicy Updates
● Policy may be modified at any time
● Continued use means you accept updatesFinal Authority
● Done 5 Technologies has the final decision on violations and actions
By using the services, you confirm that you have read, understood, and agreed to this Acceptable Use Policy.