Cynet Hosting Acceptable Use Policy (AUP)
Revised February 2026
1. Policy Overview
Cynet Hosting ("Cynet", "we", "us", or "our") is committed to providing services at a standard of excellence commensurate with the best practices in the industry.
All users of Cynet's services, and all customers upon signing up for Cynet's services, agree to comply with Cynet's Acceptable Use Policy ("AUP"). The spirit of the AUP is to ensure customers are using Cynet's services with due regard to the rights of other Internet users and in conformity with the requirements of Cynet's network environment. The AUP is not exhaustive and Cynet reserves the right to add, delete, or modify any provision of its AUP at any time without notice, effective upon either the posting of the modified AUP to Cynet's website or notification of the modified AUP.
2. UCE / Spam Policy
Definition of UCE / Spam
Customer shall not transmit or disseminate unsolicited commercial e-mail (UCE), or unsolicited bulk messages (Spam), including advertisements, informational distributions, and charitable or other solicitations. The abuse and misuse of e-mail is a serious problem, and Cynet cannot and will not tolerate it. This policy covers all servers and domains on our network.
Prohibited Activities:
- Bulk UCE/Spam, promotional material, or other forms of solicitation sent via e-mail that advertise any IP address belonging to Cynet or any domain hosted by Cynet.
- Unsolicited postings to newsgroups advertising any IP or URL hosted by Cynet.
- Setting up 'ghost sites' on other ISPs that directly or indirectly reference customers to domains or IP addresses hosted by Cynet.
- Advertising, transmitting, or making available any software, program, product, or service designed to facilitate spam.
- Forging or misrepresenting message headers to mask the true origin of messages.
3. Mailing Lists & Restrictions
We allow the use of mailing lists within the constraints of our spam policy. However, sending thousands of e-mails off of a given server can impact performance. Therefore, we limit the amount of e-mail allowed on our Shared Hosting Servers to no more than 200 e-mails per hour per account.
4. Adult Content Policy
Cynet has established a 'no adult sites' policy for our network. Although it is not our function to discriminate, technical and global communication reasons require us to restrict specific types of material.
Restricted Content Includes:
- Any site whose revenue is gained in part or whole from its adult content.
- Hyperlinks to adult sites, including sites that violate these policies.
- Sites featuring discussion boards that share information of an 'adult' nature.
- Sites that sell or promote 'adult' material.
5. Child Pornography
Child pornography includes related material, such as simulated child pornography, non-nude child pornography, or sites linking to such material, whether determined to be legal or not. Offenses of this nature will be reported to the relevant authorities and handled to the fullest extent of applicable law. Customers are held fully responsible for any misuse of their account, regardless of who committed the act.
6. Server Resource Abuse
Cynet allows CGI, PHP, Perl, and other normal processes. However, because virtual servers are shared, we must limit resource consumption. Any program or usage that consumes excessive CPU, memory, disk I/O, disk space, or database resources impacting other customers is considered abuse. Shared servers are shared and we all need to play fair.
Specific Resource Policies:
- Background Daemons/Processes: IRC bots, eggdrop, BitchX, XiRCON, warez sites, and any other program that interferes with normal server operation are strictly prohibited.
- Cron Jobs: Technicians may disable automated processes that take up considerable server resources.
- MySQL Database Limits: Keep databases optimized with less than 3000 tables per database, less than 5000 tables total across all databases per account, and less than 5GB total size combination of all databases per account.
- Archive/Backup Storage: Using shared hosting as a backup/storage device is not permitted. This includes but is not limited to Video, Music, ISO, archiving of electronic files, and log files.
- Exploitable Scripts: Many commonly used scripts can be exploited. We reserve the right to ban and disable scripts that allow unauthorized system access.
7. Illegal Activities & Security
Unauthorized access or use of data, systems, or networks is strictly prohibited. Security violations will be handled according to local and international law.
Prohibited Technical Activities:
- Hacking: Unauthorized access to or use of data, systems, or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization.
- Unauthorized Monitoring: Monitoring data or traffic on any network or system without express authorization of the owner.
- Interference: Mail bombing, flooding, deliberate attempts to overload a system, and broadcast attacks.
- Forging: Forging TCP-IP packet headers or any part of the header information in emails or newsgroup postings.
- Malware Distribution: Distribution of viruses, Trojans, or any forms of data which can cause considerable harm to any network, including portscanners, hacking tools, ping flooding programs, security/root exploits, packet sniffers, and spam software.
8. Conduct & Content
Cynet services must not be used to transmit offensive material or commit fraud.
Content Restrictions:
- Offensive Material: Material that threatens or encourages bodily harm or destruction of property.
- Fraud: Fake investment websites, speculation websites, fake banks, and investment institutions.
- Terrorism: Promoting terrorist activities, including forums for terrorists, personal websites for terrorists, and audio, photo, or video content of terrorist activities.
- Export Control: Exporting encryption software over the Internet.
- Other Illegal Activities: Engaging in activities determined to be illegal, including advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, and pirating software.
9. Suspension & Termination
Cynet reserves the right to disable or terminate service and remove content to investigate suspected AUP violations. We will make best efforts to notify customers of violations to allow for explanation or solution.
If the explanation or solution is accepted, customer is given a warning and/or incurs an abuse fee. If we determine the first offense was a deliberate attempt, the account and all associated accounts will be closed without warning and without a refund.
Failure to respond to emails from our abuse department within 10 days will result in the account being considered abandoned and deleted.
Severe Violations:
In critical cases affecting entire server operations, Cynet may disable or terminate service without prior notice. No refunds are issued for accounts terminated due to AUP violations. Any material that, in our judgment, is illegal, threatening, or violates our terms of service in any manner may be removed or suspended from our servers with or without notice. We reserve the right to refuse service to anyone.
10. Artificial Intelligence & Automated Systems
The use of AI and automated systems on our network is subject to the following restrictions:
Prohibited AI-Related Activities:
- AI Content Generation Abuse: Using our services to mass-generate spam content, fake reviews, or misleading information using AI tools.
- AI Training Data Scraping: Using our servers to scrape websites or collect data for training AI models without proper authorization from data owners.
- Deepfake Content: Hosting or distributing deepfake content intended to deceive, defame, or harm individuals.
- Automated Bot Abuse: Running bots that perform malicious activities, credential stuffing, or automated attacks against other systems.
- AI-Generated Phishing: Creating or hosting AI-generated phishing pages, emails, or social engineering content.
11. Cryptocurrency & Mining
The following cryptocurrency-related activities are restricted on our network:
Cryptocurrency Policies:
- Cryptocurrency Mining: Mining of any cryptocurrency is strictly prohibited on shared hosting, reseller hosting, and VPS plans unless explicitly permitted in writing.
- Blockchain Nodes: Running full blockchain nodes requires prior approval and may only be permitted on dedicated servers with appropriate resource allocation.
- Crypto Exchange Scripts: Hosting cryptocurrency exchange platforms requires prior approval and enhanced security measures.
- NFT Minting: Mass NFT minting operations that consume excessive resources are prohibited on shared hosting.
This policy is in place to protect the integrity of our network and the performance of our servers for all customers.
Questions? Contact us at [email protected]