Acceptable Use Policy
Acceptable Use Policy
The policy is currently available in English only. By using our services, you agree to comply with our Acceptable Use Policy. This policy constitutes a legally binding agreement between you, the user, and Senko Digital Ltd, a company registered in England and Wales.
General Principles
- Use the Services responsibly, without degrading performance, stability, or security for other customers.
- Comply with all applicable laws, regulations, and industry standards.
- You are responsible for securing your systems, software, and access credentials.
- Maintain appropriate security measures including firewalls, updated software, and secure passwords.
- Report any security incidents or suspicious activity promptly to our support team.
- While we provide backup services, we strongly recommend keeping your own backups locally and/or on an external storage as an additional safety measure to protect your important data.
Prohibited Uses
- Any kind of activity that goes against the terms of service of Senko Digital.
- Any kind of activity that goes against the laws of the United Kingdom, the European Union, or any other applicable jurisdiction.
- DDoS, unauthorized port scanning, brute force, exploit or vulnerability scanning, malware distribution, botnets.
- Sending unsolicited bulk messages (spam), harvesting addresses, using purchased contact lists, or running bulk mailers.
- Hosting or distributing illegal, infringing, defamatory, deceptive, or harmful content.
- Phishing, impersonation, identity theft, or use of false identities.
- Resource abuse designed to monopolize shared resources or degrade network/platform stability.
- Interfering with or bypassing usage limits, monitoring, or security controls.
- Mining cryptocurrencies without explicit written permission.
- Engaging in activities that could damage our reputation or infrastructure.
- Use of services by individuals or entities subject to sanctions under OFAC, EU sanctions lists, or UK sanctions list.
Fair Use of Server Resources
- Our infrastructure utilizes shared CPU resources across VPS instances on the same hypervisor node, as most virtual servers typically operate below full capacity. This allows for efficient resource allocation.
- Short-term bursts and sustained workloads are allowed, but continuously running all allocated vCPU cores at or near 100% for prolonged periods is not permitted.
- If usage threatens platform stability or materially degrades service for others, we may temporarily limit resources, request workload changes, propose an upgrade, or take reasonable actions to restore normal operation.
- Cooperate with reasonable optimization requests related to CPU, memory, disk I/O, and network usage.
- Maintain reasonable I/O operations within the allocated resources and implement appropriate caching and optimization strategies for high-traffic applications.
- While we have fair use guidelines in place, temporary exceedance of these limits is permitted for brief periods without penalty, as we maintain flexibility in enforcement to support your workload needs.
Fair Usage Policy for Network Traffic
Our fair usage policy ensures optimal network performance for all users. We aim to provide high-quality service while preventing abuse that could negatively impact other customers. This policy helps us maintain consistent speeds and reliability across our network.
- Sustained excessive traffic patterns that risk degrading shared network capacity and impacting other users are not permitted.
- Excessive or wasteful traffic patterns that do not serve legitimate usage purposes are not permitted.
- Network traffic is monitored to ensure compliance with fair usage policies.
- If excessive usage is detected during the month, your speeds may be limited to either 10 Mbps or 100 Mbps (depending on your plan) until the end of the calendar month. This is done to prevent abuse and ensure stable network operation for other users.
- Your server will always have an unlimited traffic quota, even if a speed limit is applied.
- We may, where necessary, review and take action on accounts showing patterns of excessive utilization.
Email, Anti-Spam, and Port Policies
- To enforce anti-spam measures, outbound ports 25 (SMTP) and 465 (SMTPS) are closed on all plans by default.
- For EP-0, PROMO-1 and PROMO-2 plans: ports 25 and 465 cannot be opened; reverse DNS (rDNS) is unavailable.
- All other plans: you may request opening of ports 25 and/or 465 through a support request. Approval is discretionary and may require additional verification and compliance with anti-abuse conditions.
- You must comply with applicable anti-spam laws (e.g., consent, opt-out, identification). We may require proof of consent and acceptable complaint rates.
- You must maintain SPF, DKIM, and DMARC records for email authentication.
- You must regularly monitor email sending patterns for abuse prevention and compliance with anti-spam laws.
Contact Information and Account Integrity
- You shall ensure all contact information provided to us is accurate and up-to-date, including during signup and in the service management interface.
- For continuity of communications, we do not permit usage of Disposable Email Addresses (DEA) as contact email addresses. A DEA is any temporary or unmonitored email address used to bypass our registration requirements. We may, where necessary, invalidate such email addresses and/or suspend the account.
- You must maintain alternative contact methods that remain continuously accessible for emergency notifications.
- Any changes to your contact information must be promptly updated in your account within 7 days.
Security and Incident Response
- If your service is compromised or participates in abuse, we may temporarily suspend or restrict service to mitigate impact and will notify you when practicable.
- You must promptly remediate vulnerabilities, remove malware, re-install operating system and rotate credentials as requested.
- You agree to cooperate in good faith with investigations and provide relevant logs or details as legally permitted.
- We may comply with lawful requests from regulatory, law enforcement, or judicial authorities in applicable jurisdictions.
Enforcement
- We may warn, throttle, filter, temporarily suspend, or terminate Services for policy violations, depending on severity and impact.
- We may act immediately without notice where necessary to protect the network, other users, or third parties, or to comply with legal obligations.
- If you believe enforcement was made in error, contact support with relevant evidence for review.
- Multiple violations may result in permanent service termination.
Abuse Handling & Reporting
- Report abuse to abuse@senko.digital with details including timestamps, logs, and affected IPs/domains.
- We investigate abuse reports promptly and may contact involved parties for additional information.
- Malicious abuse reports are prohibited and may result in account suspension.
- You must assist with abuse investigations involving your services and implement requested remediation measures.
Changes to this policy
We may update this policy to reflect legal, technical, or operational changes within our company. Material changes will be posted via our website. Your continued use after changes take effect constitutes acceptance.