Introducing Zynoo General Purpose & CPU Optimized Servers

Acceptable Usage Policy

This Acceptable Usage Policy (“AUP”) applies to all use of Zynoo’s hosting, infrastructure, and related services (the “Services”). This AUP is incorporated by reference into our Terms of Service. Capitalized terms not defined in this AUP have the meanings given in the Terms of Service.

You are responsible for ensuring that anyone who accesses or uses the Services through your account (including employees, contractors, and end users) complies with this AUP.

1. Purpose

The Services are provided for lawful hosting and internet-related use. This AUP exists to protect the security, stability, and reputation of Zynoo’s network and customers and to ensure the Services are used as intended.

2. General Rules of Conduct

You must not use the Services in any way that:

  • violates any applicable law or regulation;
  • infringes the rights of others (including intellectual property and privacy rights);
  • is harmful, abusive, deceptive, or disruptive;
  • attempts to bypass security controls or access restrictions; or
  • creates a security, operational, or reputational risk for Zynoo, our customers, or third parties.

You must maintain reasonable security practices for your account and hosted environment and respond promptly to abuse or security reports related to your services.

3. Illegal, Harmful, or Exploitative Content

You may not host, distribute, store, or link to content or activity that is illegal, harmful, exploitative, or otherwise prohibited under this AUP, including (without limitation):

Adult content. Pornographic, sexually explicit, or adult content is not permitted on the Services, regardless of whether it is legal in your location.

  • child sexual abuse material (CSAM) or any content that exploits or endangers minors;
  • content involving human trafficking, exploitation, or coercion;
  • content supporting or promoting terrorist or violent extremist activity;
  • instructions that facilitate serious criminal wrongdoing (for example, fraud, unauthorized access, or distribution of malware); or
  • unlawful threats or unlawful incitement of violence.

Zynoo may take immediate action where required to protect users, protect the Services, or comply with legal obligations.

4. Malware, Unauthorized Access, and Security Abuse

You may not use the Services to:

  • create, distribute, host, or operate malware (including viruses, trojans, ransomware, or spyware), botnets, or command-and-control services;
  • perform phishing, credential harvesting, or deceptive login pages;
  • probe, scan, or attempt to gain unauthorized access to any system, network, account, or data; or
  • exploit vulnerabilities or perform penetration testing, vulnerability scanning, or port scanning.

Any attempt to bypass authentication, rate limits, access controls, or security safeguards is prohibited. Security testing or scanning of any kind is not permitted.

5. Spam, Email Abuse, and Messaging

You may not use the Services to send, relay, or facilitate:

  • unsolicited bulk email or spam;
  • email spoofing, forged headers, or deceptive sender identities;
  • campaigns using lists without valid consent, where required by law; or
  • messaging activity that generates repeated complaints, blocklisting, or reputational harm.

Zynoo may limit, queue, restrict, or suspend email functionality to protect deliverability, reputation, and network stability.

6. Denial-of-Service, Network Abuse, and Disruption

You may not:

  • conduct or facilitate DoS/DDoS attacks;
  • operate “booter” or “stresser” services;
  • intentionally generate excessive traffic or requests designed to disrupt services; or
  • interfere with, disrupt, or degrade the Services, our systems, or other customers’ systems.

7. Fraud, Deception, and Impersonation

You may not use the Services to:

  • commit fraud, financial scams, or identity theft;
  • impersonate individuals, brands, or organizations in a misleading manner;
  • host scam pages, deceptive support pages, or deceptive advertisements intended to mislead users; or
  • use stolen payment methods or engage in chargeback abuse.

8. Intellectual Property and Piracy

Zynoo does not permit hosting, distributing, or linking to pirated content or any Content that infringes copyrights, trademarks, or other intellectual property rights.

This includes (without limitation):

  • pirated software, cracks, keygens, or “warez”;
  • unauthorized copies of movies, music, games, books, or other copyrighted works;
  • sites or services that are primarily intended to share or distribute infringing material; or
  • Content that is posted without the required rights, licenses, or permissions.

If we receive a valid copyright or intellectual property complaint, we may remove or disable access to the relevant Content and may suspend or terminate accounts with repeated violations.

9. Privacy and Personal Data Misuse

You may not:

  • collect, store, or transmit personal data unlawfully or without appropriate notice and lawful basis;
  • host or distribute stolen personal data, credentials, or payment information; or
  • engage in doxxing, unlawful surveillance, or tracking activities designed to violate privacy.

You are responsible for compliance with applicable privacy and data protection laws for any personal data you collect or process.

10. Resource Use and Fair Use

You must use the Services in a way that does not harm the stability or performance of our network or other customers.

Plan limits and intended use. Each plan has technical limits and intended use. Some plans may include “unlimited” bandwidth, which is intended for normal website and application traffic and remains subject to this AUP and reasonable network management.

Not permitted use cases. The Services may not be used primarily for bulk file distribution, download portals, file mirroring, streaming delivery, or other sustained bandwidth-heavy delivery patterns that cause network congestion or operational risk.

Network protection actions. If your usage creates disruption or risk, we may apply traffic management measures such as rate limiting, restricting certain features, requiring configuration changes, requiring an upgrade to a more suitable service, or suspending the Service in accordance with the Terms of Service.

10.1 Acceptable Shared Hosting Usage

Shared Hosting is intended for general websites and typical web applications (including business websites, blogs, CMS-based sites, and eCommerce sites) and can support high-traffic websites when used within the limits of your selected plan.

Shared Hosting may not be used for:

  • sustained high CPU, memory, disk I/O, or bandwidth usage that materially impacts other customers or the shared environment;
  • websites or services designed primarily for mass downloading, bulk file distribution, file mirroring, “download portals,” or similar high-bandwidth distribution patterns;
  • continuous background processes or automation not suitable for shared environments;
  • cryptocurrency mining or other high-intensity computing workloads; or
  • open proxies, public VPN exit nodes, or similar relay services.

10.2 Acceptable VPS Hosting Usage

VPS Hosting supports broader workloads than Shared Hosting (for example: websites, applications, APIs, databases, and development environments), provided they comply with this AUP and the Terms of Service.

VPS Hosting is suitable for high-traffic websites and applications. VPS services may not be used primarily for bulk file distribution, mirroring, streaming, or other bandwidth-heavy delivery that creates network congestion, stability issues, or operational risk.

VPS Hosting may not be used for:

  • hacking, malware distribution, phishing, spam, DDoS/DoS activity, or illegal content;
  • operating open proxies, public VPN exit nodes, Tor exit nodes, or similar relay services without prior written approval;
  • cryptocurrency mining or proof-of-work workloads without prior written approval; or
  • activity that creates material network or reputational risk, including repeated abuse complaints or blocklisting.

11. Enforcement

If Zynoo reasonably believes there is a violation of this AUP (or an immediate risk), we may take actions such as requesting remediation, removing or disabling access to content, rate limiting, restricting features (including email), isolating impacted services, or suspending or terminating Services under the Terms of Service.

We may act without notice where necessary to protect the Services, other customers, third parties, or to comply with legal requirements.

12. Reporting Abuse

To report abuse or suspected AUP violations, contact:

  • Abuse: [abuse@zynoo.com]

Please include relevant details such as domain/IP, timestamps, logs (if available), and a description of the issue.

13. Updates to This AUP

We may update this AUP from time to time by posting a revised version on our website. Continued use of the Services after the effective date constitutes acceptance of the updated AUP.

Get started today with zynoo logo white
Starting at only $5.99/mo*

© 2026 ZYNOO Web Services FZC, LLC