Acceptable Use Policy (AUP)

Effective Date: 4th April 2025
Last Updated: 4th April 2025

1. Purpose

This Acceptable Use Policy ("AUP") outlines the rules and guidelines for using the infrastructure, software, services, and network systems provided by DPA Cloud Services Ltd ("we", "us", or "our"). It is designed to protect:

  • The integrity, security, and availability of our infrastructure
  • The rights and privacy of our users and clients
  • The reputation of DPA Cloud Services Ltd
  • Compliance with legal and regulatory obligations

This AUP forms part of your agreement with us and applies to all users, including employees, contractors, and third parties with access to our systems or services.

2. Prohibited Activities

You may not use our Services for any unlawful, abusive, or disruptive purposes. Prohibited uses include, but are not limited to:

2.1 Unlawful Use

  • Hosting, transmitting, or storing content in violation of any UK, EU, or international laws
  • Accessing or distributing illegal material
  • Violating intellectual property rights
  • Using VoIP or messaging systems to commit fraud or harassment

2.2 Network & System Abuse

  • Launching or participating in DoS/DDoS attacks
  • Bypassing authentication or gaining unauthorised access
  • Scanning or probing networks without permission
  • Excessive use of system resources

2.3 Malware & Exploits

  • Uploading or distributing malicious code
  • Running exploit tools or RATs
  • Sending spam or phishing content

2.4 Misuse of VoIP or Communication Tools

  • Sending unsolicited bulk messages
  • Caller ID spoofing
  • Harassment or impersonation

2.5 Abuse of Resources

  • Creating VMs/scripts that degrade system performance
  • Circumventing billing or service restrictions
  • Hosting unauthorised proxies or miners

3. Security Responsibilities

  • Keep login credentials secure
  • Use suitable endpoint protection when connecting
  • Notify us of suspected compromise
  • Ensure all access is traceable to an authorised individual

We reserve the right to audit usage logs for compliance and security purposes.

4. Monitoring and Enforcement

We monitor traffic and usage to ensure policy compliance. This includes:

  • Log and resource analysis
  • Abuse detection
  • Security audits

If violations are detected, we may suspend or terminate access, remove offending content, and notify authorities if needed.

5. Reporting Violations

Please report violations to:

📧 [email protected]
📧 [email protected]

All reports are confidential and reviewed by our compliance team.

6. Revisions to this Policy

This AUP may be updated as needed. The “Last Updated” date reflects the latest version. We will notify clients of material changes.