Acceptable Use Policy
Last Updated: January 15, 2025
This Acceptable Use Policy (AUP) defines prohibited activities on Medhacloud's infrastructure and services. Violations may result in account suspension or termination.
IMPORTANT: By using Medhacloud services, you agree to comply with this Acceptable Use Policy. This AUP supplements our Terms of Service and applies to all customers, users, and resellers. Violations will be investigated and may result in immediate service suspension, account termination, and legal action.
1. Prohibited Activities
1.1 Illegal Activities
Strictly prohibited - immediate termination:
- ✗Child Exploitation: Any content depicting, distributing, or promoting child sexual abuse material (CSAM)
- ✗Terrorism & Violence: Content promoting terrorism, violence, or extremist activities
- ✗Human Trafficking: Facilitating human trafficking, slavery, or forced labor
- ✗Drug Trafficking: Sale or distribution of illegal narcotics or controlled substances
- ✗Fraud & Scams: Ponzi schemes, pyramid schemes, phishing, financial fraud, identity theft
- ✗Copyright Piracy: Unauthorized distribution of copyrighted content (movies, software, music, books)
- ✗Counterfeit Goods: Sale or distribution of counterfeit products or fake documents
- ✗Money Laundering: Financial transactions designed to conceal illegal funds
1.2 Network Abuse and Security Violations
- ✗Hacking & Unauthorized Access: Attempting to breach security, access systems without authorization, or exploit vulnerabilities
- ✗DDoS Attacks: Launching or participating in distributed denial-of-service attacks
- ✗Port Scanning: Unauthorized network scanning, vulnerability scanning, or penetration testing without prior approval
- ✗Malware Distribution: Hosting, distributing, or creating viruses, ransomware, trojans, worms, keyloggers, or malicious code
- ✗Botnet Operations: Operating command & control servers for botnets or compromised devices
- ✗Network Flooding: Excessive bandwidth usage designed to disrupt services or infrastructure
- ✗Brute Force Attacks: Automated attempts to crack passwords, keys, or authentication mechanisms
1.3 Spam and Email Abuse
- ✗Unsolicited Bulk Email (Spam): Sending unsolicited commercial email (UCE) or bulk email without recipient consent
- ✗Phishing: Email campaigns designed to steal credentials, financial information, or personal data
- ✗Email Harvesting: Scraping or collecting email addresses without permission
- ✗Relay Abuse: Using our mail servers as open relays or for email forwarding without authorization
- ✗Email Spoofing: Forging email headers or sender information to deceive recipients
- ✗Purchased Lists: Sending emails to purchased, scraped, or non-opt-in mailing lists
Note: Legitimate marketing emails must comply with CAN-SPAM Act (USA), GDPR (EU), and India's IT Rules. All emails must include unsubscribe options.
1.4 Resource Abuse
- ✗Cryptocurrency Mining: Unauthorized cryptocurrency mining (Bitcoin, Ethereum, etc.) without explicit approval
- ✗CPU/RAM Hogging: Running processes that intentionally consume excessive CPU, memory, or disk I/O on shared servers
- ✗Bandwidth Abuse: Excessive bandwidth usage beyond fair use policies (file sharing, torrenting)
- ✗Storage Abuse: Using hosting for backup storage, file dumps, or long-term archival (non-website content)
Permitted: Cryptocurrency mining IS allowed on dedicated servers and VPS with prior notification and resource limits.
1.5 Prohibited Content
- ✗Adult Content (Shared Hosting): Pornography, sexually explicit content, or adult entertainment on shared hosting (permitted on VPS/dedicated with age verification)
- ✗Hate Speech: Content promoting violence, discrimination, or hatred based on race, religion, ethnicity, gender, sexual orientation, or disability
- ✗Harassment & Doxxing: Content designed to harass, threaten, stalk, or publish private information (doxxing)
- ✗Defamation: Knowingly publishing false statements intended to harm reputation
- ✗Gambling (Unlicensed): Online gambling, betting, or casino operations without proper licenses
- ✗Weapon Sales: Sale of firearms, explosives, or weapons (unless legally licensed)
1.6 Proxy and Anonymization Services
Requires Prior Approval: The following services require written approval before deployment:
- • VPN Services: Publicly advertised VPN/proxy services (must disclose customer base and abuse policies)
- • Open Proxies: HTTP/SOCKS proxies accessible to the public
- • Tor Exit Nodes: Operating Tor exit nodes (increased abuse risk)
- • Anonymization Services: Services designed to mask user identity for third parties
Private VPNs for personal/corporate use are permitted. Commercial VPN services must have abuse prevention measures in place.
2. Acceptable & Encouraged Activities
We welcome and support the following legitimate uses:
- ✓Business Websites & Applications: E-commerce, SaaS platforms, corporate websites, blogs
- ✓Development & Testing: Application development, staging environments, CI/CD pipelines
- ✓Data Analytics: Big data processing, machine learning, AI model training (with adequate resources)
- ✓Video Streaming: Legitimate video streaming with proper licensing (Netflix-style platforms, educational content)
- ✓File Sharing: Legitimate file sharing for business collaboration (Dropbox-style services)
- ✓Gaming Servers: Minecraft, CS:GO, game hosting (dedicated servers recommended)
- ✓Marketing Emails: Permission-based email marketing with double opt-in and unsubscribe options
3. Enforcement and Penalties
3.1 Investigation
We actively monitor for AUP violations using automated systems and manual reviews. We may investigate accounts based on:
- • Abuse complaints from third parties or IP blacklist reports
- • Automated security alerts (malware detection, unusual traffic patterns)
- • Resource usage anomalies (excessive CPU, bandwidth spikes)
- • Legal notices, DMCA takedown requests, court orders
3.2 Immediate Suspension
No Warning: The following violations result in immediate account suspension without prior notice:
- • Child exploitation material (CSAM)
- • Active DDoS attacks or network flooding
- • Malware distribution or botnet C&C servers
- • Terrorist content or violent extremism
- • Active phishing campaigns
3.3 Warning & Corrective Action
For less severe violations, we may issue a warning and require corrective action within 24-48 hours:
- • First offense: Email warning with 48 hours to resolve
- • Second offense: 24-hour warning with account restrictions
- • Third offense: Account suspension pending resolution
- • Repeat offenses: Permanent termination
3.4 Legal Action
Serious violations may result in:
- • Reporting to law enforcement (Indian Cyber Crime Cell, FBI, Interpol)
- • Cooperation with legal investigations and subpoenas
- • Civil lawsuits for damages caused to Medhacloud or third parties
- • IP address blacklisting and ban from future services
4. Reporting Abuse
If you believe a Medhacloud customer is violating this AUP, please report it immediately:
Email Abuse
Email: abuse@medhacloud.com
Include: Full email headers, IP address, timestamps, evidence
Security Issues
Email: security@medhacloud.com
Include: IP address, attack logs, malware samples, timestamps
Copyright (DMCA)
Email: dmca@medhacloud.com
Follow DMCA notice requirements with proof of ownership
General Violations
Phone: +91 93536 44646
Support Portal: Submit ticket under "Abuse Report"
Response Time: We investigate abuse reports within 24 hours (critical issues within 2 hours). Anonymous reports accepted but detailed contact info helps expedite resolution.
5. Policy Updates
We reserve the right to update this AUP at any time. Material changes will be communicated via email with 30 days' notice. Continued use of services after updates constitutes acceptance. Current version always available at medhacloud.com/legal/acceptable-use-policy.
Contact Abuse Team
Report violations or ask questions about this policy.
India Headquarters (Governing Jurisdiction)
Medhacloud Solutions Private Limited
#74, 7th Cross, Krishna Garden
Bengaluru, Karnataka 560083, India
Abuse Email: abuse@medhacloud.com
Phone: +91 93536 44646
USA Office:
30 N Gould St Ste R, Sheridan, WY 82801
Phone: +1 646 775 2855
Related Policies
Governing Law: This AUP is governed by the laws of India. Jurisdiction: Courts of Bengaluru, Karnataka, India.