Last updated: August 10, 2025

Acceptable Use Policy

Acceptable Use Policy (AUP)
Martical.com
Last updated: August 10, 2025

This Acceptable Use Policy governs your use of Martical.com services, including Shared Hosting, Cloud Hosting, Reseller Hosting, Email Hosting, Cloud VPS, Storage VPS, VDS, Dedicated Servers, Domain Names, and Website Security services (Services). By using the Services, you agree to this AUP, our Terms of Service, Refund Policy, Privacy Policy, SLA, and any service‑specific terms. Violations may result in warning, filtering, rate‑limiting, suspension, or termination without refund where applicable.


  1. General principles
  • Use the Services lawfully, responsibly, and without disrupting others.

  • You are responsible for all content and activity on your account and any sub-accounts or downstream users (including reseller clients).

  • We may investigate suspected violations and cooperate with law enforcement.


  1. Prohibited content and activities
    You may not use the Services to:

  • Illegal activities: Violate any law or regulation; host, distribute, or facilitate illegal content, goods, or services.

  • Intellectual property infringement: Host or distribute content that infringes copyrights, trademarks, patents, trade secrets, or publicity/privacy rights; enable piracy/warez or circumvention tools.

  • Security abuses: Run, launch, promote, or participate in DDoS/DoS, port scans, brute force, malware, botnets, C2 servers, keyloggers, exploit kits, or distribute viruses/Trojans/ransomware.

  • Fraud and deception: Phishing, impersonation, deceptive schemes, fake shops, drops, or social engineering; cryptocurrency or financial scams.

  • Spam and unsolicited communications: Send unsolicited bulk or commercial email/SMS/IM; harvest addresses; sell or use purchased lists; send without valid consent or a functioning opt‑out.

  • Harmful or offensive content: Content that is excessively violent, promotes terrorism or hate, or exploits minors; CSAM is strictly prohibited and will be reported.

  • Privacy violations: Doxxing, stalking, data scraping of personal data in violation of law; intercepting communications; unauthorized tracking.

  • Network/resource abuse: Activities that degrade or bypass fair use limits; open proxies/relays/resolvers; unsecured public services that enable abuse; crypto mining on shared/multi‑tenant hosting.

  • Interference: Attempt to bypass security, quotas, or isolation; alter or obscure headers; manipulate routing; evade suspension/blocks.

  • Export/sanctions violations: Use in or for the benefit of sanctioned countries, entities, or persons; prohibited end uses (e.g., WMD).


  1. Email and messaging requirements
  • Consent: Send only to recipients with valid, provable consent (or other lawful basis).

  • Identification: Must include accurate sender/domain information and a physical contact address.

  • Unsubscribe: Include a clear, working opt‑out honored within 10 days or sooner if required by law.

  • Authentication: Publish and correctly configure SPF, DKIM, and DMARC for sending domains.

  • Hygiene and reputation: Maintain low bounces/complaints; remove invalid or unsubscribed contacts promptly; no snowshoeing or list washing.

  • Prohibited on Shared/Reseller/Email Hosting: Bulk mailing platforms, purchased/rented lists, and high‑volume cold outreach. Use appropriate dedicated services for compliant bulk sending.


  1. Security requirements
  • Keep systems, CMS, plugins, and dependencies updated; change default passwords; use strong, unique credentials and MFA where available.

  • Secure publicly exposed services (databases, admin panels, SMTP, Redis, Elasticsearch, etc.) and disable anonymous access.

  • Prevent open relays/resolvers/proxies and block abusive ports where not required.

  • Use only licensed software and maintain valid licenses/keys.

  • Promptly investigate and remediate compromises; we may isolate, filter, or suspend affected services to protect the network.


  1. Resource usage and fair use
  • Stay within plan limits for CPU, RAM, I/O, inodes, processes, storage, and bandwidth.

  • Shared/Cloud/Reseller/Email Hosting: No background daemons, persistent listeners, crypto mining, game servers, or excessive cron jobs; we may throttle or require an upgrade.

  • VPS/VDS/Dedicated: You may run daemons and custom services provided they are secure, compliant, and not abusive. Excessive network, PPS, or disk IO may be rate‑limited.

  • Backups: Backup space (if provided) is for backups only; no streaming, distribution, or mirror hosting.


  1. Specific service rules
  • Domains: Must comply with registrar/registry/ICANN policies, including accurate WHOIS/RDAP and verification.

  • Website Security services (WAF/SSL/malware scanning): Do not attempt to bypass protections or misuse certificates; remediation assistance may require your cooperation and DNS changes.

  • IP addresses: Are non‑portable; no IP reputation abuse, hijacking, or announcement without authorization. We may null‑route abusive traffic.


  1. Resellers and downstream users
  • Resellers must pass through our AUP/ToS to their clients and enforce compliance.

  • You are responsible for your clients’ actions. Repeated downstream abuse may lead to account suspension.


  1. Reporting abuse
  • Report network abuse, spam, phishing, or security incidents to: abuse@martical.com or via the client area. Include full headers, logs, URLs, timestamps, and any evidence to expedite handling.

  • CSAM should be reported immediately; we will notify appropriate authorities and terminate related services.


  1. Enforcement actions
  • We may, at our discretion and without prior notice when necessary: warn, filter, rate‑limit, throttle, isolate, null‑route, or suspend/terminate services; remove or disable access to content; block ports or protocols; or require remediation steps.

  • Reinstatement may require confirmation of remediation, an upgrade to suitable resources, deposits, or administrative fees.

  • Services terminated for AUP violations are not eligible for refunds.


  1. Logging and monitoring
  • We may log and monitor network flows, system metrics, and security events for abuse detection and service reliability, consistent with our Privacy Policy.


  1. Data requests and legal process
  • We respond to valid legal requests consistent with applicable law. We may preserve data upon receipt of a lawful request. Notice to customers may be delayed or withheld where prohibited or where risk to safety/integrity exists.


  1. Changes to this AUP
  • We may update this AUP from time to time. Material changes will be communicated when feasible. Continued use of the Services constitutes acceptance of the updated AUP.


  1. Contact