Done5 Technologies

Abuse Policy

Abuse Policy

Last Updated: 17 January 2026

This Abuse Policy defines the standards, procedures, and enforcement actions related to misuse of services provided by Done 5 Technologies (“Done 5 Technologies”, “we”, “us”, or “our”). The purpose of this policy is to protect our network, customers, partners, and the wider internet community.

This policy must be read in conjunction with our Terms of Service (TOS), Acceptable Use Policy (AUP), and Fair Usage Policy (FUP).


1. Scope of This Policy

This Abuse Policy applies to:

  • All Done 5 Technologies customers

  • Resellers and their end users

  • Any third party using our infrastructure, IP addresses, or network

Customers are fully responsible for all activity originating from their services, including actions taken by end users, clients, or any delegated access.


2. Definition of Abuse

Abuse includes, but is not limited to, the activities outlined below.

2.1 Network & Infrastructure Abuse

  • Distributed Denial of Service (DDoS) or Denial of Service (DoS) attacks

  • Traffic flooding or intentional resource exhaustion

  • Port scanning, probing, or vulnerability testing without authorization

  • Any attempt to disrupt network stability or service availability

2.2 Email & Messaging Abuse

  • Spam or unsolicited bulk communications

  • Email spoofing or forged message headers

  • Operating open relays or insecure mail scripts

  • Hosting mailing lists without verified recipient consent

2.3 Security Violations

  • Unauthorized access to systems or data

  • Brute-force attacks or credential stuffing

  • Malware distribution, botnets, or command-and-control activities

  • Exploitation of software or system vulnerabilities

2.4 Content Abuse

  • Hosting illegal or prohibited content

  • Copyright or trademark infringement

  • Phishing, scams, or fraud-related material

  • Distribution of malicious or harmful files

2.5 Resource Abuse

  • Excessive CPU, memory, disk, or bandwidth consumption

  • Using hosting services primarily for file storage or backup purposes

  • Circumventing usage limits or combining plans deceptively


3. Prohibited Activities (Zero Tolerance)

The following activities are strictly prohibited and will result in immediate action, including suspension or termination without prior notice:

  • Child exploitation or abuse material

  • Malware, ransomware, spyware, or trojans

  • Fraudulent payment activity or intentional chargebacks

  • Activities causing IP blacklisting or upstream provider complaints

  • Repeated or severe policy violations


4. Abuse Reporting

Abuse complaints must include sufficient information to allow proper investigation.

4.1 How to Report Abuse

  • Email: dmca@done5.com

  • (For copyright-related issues and general abuse reports)

4.2 Required Information

Reports should include, where applicable:

  • Source IP address or domain name

  • Date and time of the incident (including time zone)

  • Clear description of the abuse

  • Supporting evidence such as logs, email headers, URLs, or screenshots

Incomplete reports may delay or prevent investigation.


5. Investigation Process

Upon receiving an abuse report, Done 5 Technologies may, at its discretion:

  • Temporarily suspend affected services to prevent further harm

  • Review logs, traffic patterns, and account activity

  • Request explanations or corrective actions from the customer

  • Cooperate with upstream providers or law enforcement where required

All investigations are conducted at our sole discretion.


6. Enforcement Actions

Depending on the severity, impact, and frequency of abuse, enforcement actions may include:

  • Warning notices

  • Resource limitations or service throttling

  • Temporary suspension of services

  • Permanent termination of services

  • Forfeiture of fees or imposition of penalties

  • Reporting to authorities or relevant organizations

Severe abuse may result in immediate termination without refund.


7. Customer Responsibilities

Customers are required to:

  • Secure servers, applications, and access credentials

  • Monitor usage and activity on their services

  • Respond promptly to abuse notifications

  • Take corrective action within the specified timeframe

Failure to respond may result in escalated enforcement actions.


8. Reseller Responsibilities

Resellers are fully responsible for:

  • Monitoring the activities of their clients

  • Enforcing all Done 5 Technologies policies

  • Handling first-level abuse issues when applicable

Abuse originating from an end client is treated as abuse of the reseller account.


9. False or Malicious Reports

Submitting knowingly false, misleading, or malicious abuse reports may result in:

  • Future reports being ignored

  • Account suspension or termination

  • Legal action where applicable


10. Limitation of Liability

Done 5 Technologies is not liable for damages resulting from:

  • Abuse-related suspensions or terminations

  • Actions taken to protect network integrity or security

  • Compliance with legal, regulatory, or law enforcement requests


11. Policy Modifications

Done 5 Technologies reserves the right to modify this Abuse Policy at any time. Continued use of our services constitutes acceptance of the updated policy.


12. Authority & Final Decision

Done 5 Technologies Networks retains sole authority to determine what constitutes abuse and the appropriate corrective action.

By using Done 5 Technologies services, you acknowledge that you have read, understood, and agreed to this Abuse Policy.