ACCEPTABLE USE POLICY
Last updated 08 September 2025
This Acceptable Use Policy ("Policy," "AUP") outlines rules and restrictions regarding the use of online services ("Services") provided by the Self Hosted Project LLC ("SHP," "we," "us," "our").
This Policy applies to all SHP customers ("you," "users," "customers") who access our Services by visiting our resources, purchasing Services, or registering an account.
By using our Services, you agree to comply with this Policy and all applicable laws.
If you violate the terms of this Policy, we reserve the right to:
- temporarily suspend or permanently terminate your access to the Services;
- delete your account.
This document does not contain an exhaustive list of possible violations.
We may amend this Policy at any time by posting an updated version on our website. By continuing to use the Services after changes have been posted, you automatically accept the updated version of this Policy.
1. Lawful and Appropriate Use
You agree to use the Services only for lawful and appropriate purposes and are prohibited from engaging in any illegal, harmful, fraudulent, or abusive activities.
2. Email and Messaging Abuse
You must not engage in or facilitate spamming, including sending unsolicited bulk messages, advertisements, or promotions. Manipulating message headers or assuming identities without explicit permission is prohibited.
3. Network and System Abuse
You must not violate the security, stability, or integrity of any network, device, or system. Prohibited activities include:
- Unauthorized monitoring or interception of traffic or data.
- Conducting denial-of-service (DoS/DDoS) attacks or intentionally disrupting service performance.
- Operating open proxies, open mail relays, open recursive DNS servers, or TOR exit nodes.
- Using unauthorized methods to bypass system limitations or restrictions.
4. Sensitive Data and Privacy
You must not publicly store, share, or otherwise expose sensitive, personal, financial, health-related, or confidential data without proper authorization and compliance with applicable privacy laws.
5. Prohibited Content
You must not upload, post, transmit, store, distribute, or facilitate any content that:
- Is defamatory, obscene, abusive, harassing, discriminatory, threatening, misleading, or invasive of privacy.
- Incites hatred, violence, discrimination, or intolerance towards individuals or groups based on race, religion, nationality, gender, or other characteristics.
- Depicts or promotes child pornography, bestiality, sexual acts, or excessive violence.
- Promotes illegal drugs, illegal gambling, trafficking, or other criminal activities.
- Exposes confidential or proprietary information without consent.
- Violates intellectual property rights, including unauthorized distribution or use of protected content.
- Contains malicious software designed to disrupt, harm, or impair systems or data.
6. Resource Usage Limits
You must not disrupt normal service operations or excessively consume system resources. We reserve the right to limit or suspend access to maintain fair usage and service stability.
7. Vulnerability Testing
You are strictly prohibited from probing, scanning, penetration testing, or otherwise attempting to breach or test system vulnerabilities.
8. Enforcement
We reserve the right, at our sole discretion, to investigate, monitor, and enforce compliance with this Policy. Violations may result in immediate suspension or termination of services without prior notice and cooperation with law enforcement authorities, including reporting violations and disclosing information as required by law.
9. Amendments
We reserve the right to modify this Policy at any time. Continued use of the Services after modifications constitutes your acceptance of the updated Policy.