1. Overview
This Acceptable Use Policy ("AUP") governs the use of all cloud infrastructure, hosting, managed services, and network resources (collectively, "Services") provided by Cloudvoid LLC ("Provider," "we," "us") through the Foundation platform. This AUP supplements your service agreement and our Terms of Service.
By using the Services, you ("Customer," "you") agree to comply with this AUP. You are responsible for ensuring that all users of your account — including employees, contractors, and end users — also comply with these terms.
This AUP is not exhaustive. Conduct not explicitly listed may still be prohibited if it threatens the security, performance, or integrity of our infrastructure or the experience of other customers.
2. Prohibited Content
You may not use the Services to store, distribute, transmit, or make available any content that:
- Violates any applicable local, state, federal, or international law or regulation
- Infringes on the intellectual property rights of any third party, including copyrights, trademarks, patents, or trade secrets
- Contains or distributes child sexual abuse material (CSAM) or any content that exploits minors — this results in immediate termination and law enforcement referral with zero tolerance
- Promotes or facilitates terrorism, extremist violence, or recruitment for violent organizations
- Constitutes or facilitates fraud, identity theft, phishing, or financial exploitation
- Contains defamatory, libelous, or unlawfully threatening material directed at any person or entity
- Hosts or distributes obscene material as defined under applicable law
- Facilitates the sale or distribution of controlled substances, illegal drugs, or unlicensed pharmaceuticals
- Promotes or provides instructional content for creating weapons of mass destruction
3. Prohibited Network Activities
You may not use the Services to engage in any activity that disrupts, degrades, or threatens the integrity of our network, infrastructure, or other customers' services. Prohibited activities include but are not limited to:
3.1 Denial of Service
- Launching or facilitating denial-of-service (DoS) or distributed denial-of-service (DDoS) attacks against any target
- Participating in or providing infrastructure for botnets, amplification attacks, or reflection attacks
- Intentionally consuming excessive resources in a manner designed to degrade service for other customers
3.2 Unauthorized Access
- Attempting to gain unauthorized access to any system, network, server, or account not belonging to you
- Port scanning, vulnerability scanning, or penetration testing of any system without explicit written authorization from the system owner
- Circumventing or attempting to circumvent authentication, encryption, or access controls on any system
- Intercepting, monitoring, or capturing network traffic not intended for your systems
3.3 Network Abuse
- IP address spoofing, packet forgery, or forging routing information
- Operating open proxies, open relays, or anonymizing services used to facilitate abuse
- Running network services that interfere with other customers' use of shared infrastructure
- Excessive bandwidth consumption that adversely affects platform performance, as determined by Provider at its sole discretion
4. Prohibited Security Activities
You may not use the Services for any of the following:
- Distributing, hosting, or transmitting malware, ransomware, spyware, rootkits, trojans, keyloggers, exploit kits, or any other malicious software
- Operating command-and-control (C2) servers, payload delivery infrastructure, or "drop sites" for stolen data
- Hosting phishing pages, credential harvesting tools, spoofed login portals, or social engineering schemes
- Developing, testing, or deploying tools intended to exploit vulnerabilities in third-party systems without authorization
- Operating brute-force or credential-stuffing infrastructure targeting any system
- Mining cryptocurrency without explicit written authorization from Provider — unauthorized mining is grounds for immediate suspension
5. Email and Messaging
You may not use the Services to send or facilitate unsolicited communications:
- Sending unsolicited bulk email ("spam"), unsolicited commercial email, or any messages that violate the CAN-SPAM Act of 2003 or equivalent legislation in other jurisdictions
- Operating unconfirmed mailing lists — all mailing lists must use confirmed opt-in (double opt-in) and provide a clear unsubscribe mechanism
- Forging, altering, or obscuring email headers, sender information, or message routing data
- Using the Services to collect replies to spam sent from another provider, or to advertise resources hosted on the Foundation platform via spam sent from any source
- Engaging in email bombing, mail flooding, or deliberately overloading any mail server
6. Resource Usage
Foundation services are provisioned with defined resource allocations. You agree to the following resource usage terms:
- Use allocated compute, storage, bandwidth, and network resources within the scope of your service agreement
- Do not intentionally or recklessly consume resources in a way that degrades performance for other customers on shared infrastructure
- Do not use the Services in a manner that generates excessive automated traffic, API calls, or I/O operations beyond your provisioned allocation without prior arrangement
- Do not resell, redistribute, or sublicense Services or allocated resources to third parties without explicit written authorization from Provider
Provider monitors resource utilization to ensure platform stability. If usage significantly exceeds your provisioned allocation, Provider will notify you and work to resolve the situation before taking enforcement action, except in cases where immediate action is necessary to protect the platform.
7. Customer Responsibility
You are responsible for all activity that occurs under your account, including activity by your employees, contractors, agents, and end users. This responsibility includes:
- Maintaining the security of your account credentials, API keys, and access tokens
- Ensuring all software and services running within your environment are properly licensed
- Keeping your operating systems, applications, and dependencies patched and up to date
- Responding promptly to abuse reports, security notifications, or compliance inquiries from Provider
- Implementing appropriate access controls, firewalls, and security measures within your environment
- Ensuring that your use of the Services complies with all applicable laws and regulations, including export controls and data protection requirements
8. Bare Metal and Colocation
In addition to the general provisions of this AUP, customers using bare-metal dedicated servers or colocation services must also comply with the following:
- Customer-owned hardware shipped to or dropped off at the datacenter facility must meet Provider specifications as described in the Terms of Service
- Customer is not permitted to access the datacenter facility or any physical infrastructure at any time — all hardware handling, racking, and cabling is performed exclusively by Provider
- Hardware must not generate excessive noise, heat, or power draw beyond agreed specifications
- Customer may not install or operate any device that could interfere with the operation of other equipment in the facility
- Customer is solely responsible for all software, configurations, and data on customer-owned hardware
9. Monitoring and Enforcement
Provider reserves the right to monitor service usage for compliance with this AUP. Provider does not routinely monitor the content of Customer Data, but may investigate when it has reason to believe a violation has occurred or upon receipt of a credible complaint.
9.1 Abuse Reports
If Provider receives an abuse complaint related to your account, you will be notified and must respond within 24 hours. Failure to respond within 48 hours may result in suspension of the affected services.
9.2 Enforcement Actions
When a violation is identified, Provider may take one or more of the following actions at its sole discretion:
- Issue a written warning identifying the violation and requiring corrective action
- Temporarily suspend the affected service, virtual machine, network port, or account
- Null-route or filter network traffic associated with the violation
- Remove or disable access to offending content
- Terminate the service agreement without refund
- Report the violation to law enforcement or other appropriate authorities
The severity and nature of the violation will determine the enforcement response. Violations involving illegal content (particularly CSAM), active attacks on third-party infrastructure, or imminent threats to platform stability may result in immediate suspension or termination without prior notice.
10. DMCA and Copyright
Provider respects intellectual property rights and complies with the Digital Millennium Copyright Act (DMCA). If you believe content hosted on the Foundation platform infringes your copyright, you may submit a DMCA takedown notice to our designated agent:
Your notice must include identification of the copyrighted work, identification of the infringing material with sufficient information to locate it, your contact information, a statement of good faith belief that the use is not authorized, and a statement under penalty of perjury that the information is accurate and you are authorized to act on behalf of the copyright owner.
Customers who receive a DMCA notice will be informed and given an opportunity to file a counter-notification. Repeat infringers are subject to account termination.
11. Reporting Violations
If you become aware of any violation of this AUP — whether by your own users, another customer, or a third party — please report it promptly:
Provider will acknowledge receipt of all abuse reports within one business day and will investigate in accordance with the severity of the reported activity.
12. Indemnification
You agree to indemnify, defend, and hold harmless Cloudvoid LLC, its officers, directors, employees, agents, and affiliates from and against any claims, liabilities, damages, losses, costs, or expenses (including reasonable attorneys' fees) arising from your violation of this AUP, your use of the Services, or any activity conducted under your account.
13. Changes to This Policy
Provider reserves the right to modify this AUP at any time. Material changes will be communicated at least 30 days in advance via email or through the management panel. Non-material clarifications or updates may take effect immediately upon posting.
Continued use of the Services after changes take effect constitutes acceptance of the revised AUP. The current version is always available at foundation.cloudvoid.com/aup.
14. Contact
For questions about this Acceptable Use Policy: