Last Updated: 17 January 2026
This Abuse Policy defines the standards, procedures, and enforcement actions related to misuse of services provided by Done 5 Technologies (“Done 5 Technologies”, “we”, “us”, or “our”). The purpose of this policy is to protect our network, customers, partners, and the wider internet community.
This policy must be read in conjunction with our Terms of Service (TOS), Acceptable Use Policy (AUP), and Fair Usage Policy (FUP).
This Abuse Policy applies to:
All Done 5 Technologies customers
Resellers and their end users
Any third party using our infrastructure, IP addresses, or network
Customers are fully responsible for all activity originating from their services, including actions taken by end users, clients, or any delegated access.
Abuse includes, but is not limited to, the activities outlined below.
Distributed Denial of Service (DDoS) or Denial of Service (DoS) attacks
Traffic flooding or intentional resource exhaustion
Port scanning, probing, or vulnerability testing without authorization
Any attempt to disrupt network stability or service availability
Spam or unsolicited bulk communications
Email spoofing or forged message headers
Operating open relays or insecure mail scripts
Hosting mailing lists without verified recipient consent
Unauthorized access to systems or data
Brute-force attacks or credential stuffing
Malware distribution, botnets, or command-and-control activities
Exploitation of software or system vulnerabilities
Hosting illegal or prohibited content
Copyright or trademark infringement
Phishing, scams, or fraud-related material
Distribution of malicious or harmful files
Excessive CPU, memory, disk, or bandwidth consumption
Using hosting services primarily for file storage or backup purposes
Circumventing usage limits or combining plans deceptively
The following activities are strictly prohibited and will result in immediate action, including suspension or termination without prior notice:
Child exploitation or abuse material
Malware, ransomware, spyware, or trojans
Fraudulent payment activity or intentional chargebacks
Activities causing IP blacklisting or upstream provider complaints
Repeated or severe policy violations
Abuse complaints must include sufficient information to allow proper investigation.
Email: dmca@done5.com
(For copyright-related issues and general abuse reports)
Reports should include, where applicable:
Source IP address or domain name
Date and time of the incident (including time zone)
Clear description of the abuse
Supporting evidence such as logs, email headers, URLs, or screenshots
Incomplete reports may delay or prevent investigation.
Upon receiving an abuse report, Done 5 Technologies may, at its discretion:
Temporarily suspend affected services to prevent further harm
Review logs, traffic patterns, and account activity
Request explanations or corrective actions from the customer
Cooperate with upstream providers or law enforcement where required
All investigations are conducted at our sole discretion.
Depending on the severity, impact, and frequency of abuse, enforcement actions may include:
Warning notices
Resource limitations or service throttling
Temporary suspension of services
Permanent termination of services
Forfeiture of fees or imposition of penalties
Reporting to authorities or relevant organizations
Severe abuse may result in immediate termination without refund.
Customers are required to:
Secure servers, applications, and access credentials
Monitor usage and activity on their services
Respond promptly to abuse notifications
Take corrective action within the specified timeframe
Failure to respond may result in escalated enforcement actions.
Resellers are fully responsible for:
Monitoring the activities of their clients
Enforcing all Done 5 Technologies policies
Handling first-level abuse issues when applicable
Abuse originating from an end client is treated as abuse of the reseller account.
Submitting knowingly false, misleading, or malicious abuse reports may result in:
Future reports being ignored
Account suspension or termination
Legal action where applicable
Done 5 Technologies is not liable for damages resulting from:
Abuse-related suspensions or terminations
Actions taken to protect network integrity or security
Compliance with legal, regulatory, or law enforcement requests
Done 5 Technologies reserves the right to modify this Abuse Policy at any time. Continued use of our services constitutes acceptance of the updated policy.
Done 5 Technologies Networks retains sole authority to determine what constitutes abuse and the appropriate corrective action.
By using Done 5 Technologies services, you acknowledge that you have read, understood, and agreed to this Abuse Policy.