Rules and guidelines for using our hosting, cloud, and managed IT infrastructure services.
Last Updated: January 2026
1. Introduction
This Acceptable Use Policy ("AUP") governs the use of hosting services, cloud infrastructure, managed IT services, and related services ("Services") provided by Max-Tech I.T Solutions ("Service Provider," "we," "our," or "us") to clients ("Client," "you," or "your").
By using our Services, you agree to comply with this AUP. Violation of this policy may result in immediate suspension or termination of Services without notice or refund.
This AUP is incorporated by reference into your Service Agreement and Terms of Service. We reserve the right to modify this AUP at any time, with changes effective upon posting to our website.
2. Prohibited Activities
The following activities are strictly prohibited:
2.1 Illegal Activities
Any activity that violates local, state, national, or international laws
Distribution of illegal content, including pirated software, media, or materials
Facilitation of illegal activities or transactions
Violation of export control laws or regulations
Money laundering or financial fraud
2.2 Harmful or Malicious Content
Distribution of malware, viruses, trojans, or other malicious code
Phishing, spoofing, or social engineering attacks
Spam, unsolicited bulk email, or unsolicited commercial communications
Content that promotes violence, hate speech, or discrimination
Harassment, stalking, or threats against individuals or groups
2.3 Intellectual Property Violations
Infringement of copyrights, trademarks, patents, or trade secrets
Unauthorized distribution of copyrighted material
Reverse engineering or decompiling proprietary software
Use of content without proper authorization or licensing
2.4 System Abuse & Resource Misuse
Attempts to gain unauthorized access to systems, networks, or accounts
Denial of Service (DoS) attacks or Distributed Denial of Service (DDoS) attacks
Excessive resource consumption that impacts other clients
Running resource-intensive applications without authorization
Circumventing security measures or access controls
Scanning or probing networks without authorization
2.5 Prohibited Content
Adult content, pornography, or sexually explicit material (unless explicitly permitted)
Content promoting illegal drugs, weapons, or regulated substances
Gambling or online gaming (unless legally authorized)
Pyramid schemes or multi-level marketing scams
Content that violates privacy rights or contains personal information without consent
3. Email & Communication Policies
3.1 Spam & Bulk Email
Prohibited email practices include:
Sending unsolicited bulk email (spam)
Using harvested or purchased email lists
Falsifying email headers or sender information
Operating open mail relays or proxies
Sending emails to recipients who have opted out
3.2 Legitimate Email Marketing
Legitimate email marketing must comply with:
CAN-SPAM Act (if applicable) and local anti-spam laws
Opt-in consent from recipients
Clear unsubscribe mechanisms
Accurate sender identification
Reasonable sending limits (as defined by your service plan)
4. Resource Usage & Fair Use
4.1 Resource Limits
Resource usage must comply with your service plan limits:
CPU usage, memory, and processing power
Storage space and bandwidth
Database connections and queries
Concurrent processes and connections
4.2 Fair Use
Services are provided for normal business operations. Prohibited practices include:
Excessive resource consumption that impacts other clients
Running cryptocurrency mining or similar resource-intensive operations
Hosting file-sharing or peer-to-peer services
Operating public proxies or VPN services
Running automated scripts that consume excessive resources
4.3 Resource Monitoring
We monitor resource usage and may:
Notify you of excessive usage
Request optimization or upgrade to a higher plan
Temporarily throttle or suspend services if usage threatens system stability
Charge for overage usage as specified in your service plan
5. Security Requirements
5.1 Account Security
Clients are responsible for:
Maintaining strong, unique passwords
Enabling two-factor authentication when available
Protecting account credentials and access keys
Promptly reporting suspected security breaches
Keeping software and applications updated and patched
5.2 Application Security
Applications hosted on our infrastructure must:
Follow security best practices and coding standards
Be protected against common vulnerabilities (SQL injection, XSS, etc.)
Use secure communication protocols (HTTPS, TLS)
Implement proper access controls and authentication
Not expose sensitive system information or credentials
5.3 Data Protection
Clients must:
Comply with applicable data protection laws (GDPR, etc.)
Implement appropriate data encryption
Maintain regular backups of critical data
Protect personal information and sensitive data
Notify us immediately of data breaches
6. Backup & Data Responsibility
While we may provide backup services, clients are responsible for:
Maintaining their own backups of critical data
Verifying backup integrity and restoration procedures
Understanding backup retention policies and schedules
Testing backup restoration processes regularly
Ensuring compliance with data retention requirements
We are not responsible for data loss resulting from client actions, application errors, or circumstances beyond our control.
7. Compliance & Legal Requirements
7.1 Applicable Laws
Clients must comply with all applicable laws and regulations, including:
Data protection and privacy laws (GDPR, CCPA, etc.)