Acceptable use policy
This policy outlines the kinds of activity that are not allowed on infrastructure or services we manage, plus the response steps we may take if abuse is detected.
1. Introduction
This Acceptable Use Policy (AUP) governs how Acefina services and managed infrastructure may be used. Violations can lead to suspension or termination.
2. Prohibited activities
You may not use our services for any of the following:
- Illegal activity: Anything that violates applicable local or international law
- Malicious software: Viruses, ransomware, malware, or similar harmful code
- Spam or abuse: Unsolicited bulk messages, scraping abuse, or reputation-damaging traffic
- Network attacks: DDoS attempts, unauthorized access, port scanning, or exploitation attempts
- IP infringement: Hosting pirated, infringing, or unauthorized content
- Fraud or deception: Phishing, identity theft, impersonation, or financial scams
- Harassment: Threatening, defamatory, hateful, or abusive material
- Child exploitation: Any harmful or illegal content involving minors
3. Resource usage
- Do not consume unreasonable bandwidth or resources that degrade service for others
- Do not run cryptocurrency mining without explicit written approval
- Do not use managed systems to stress test external services without permission
- Do not host open proxies, anonymization services, or other abuse-prone workloads without approval
4. Security requirements
Clients using managed systems are expected to:
- Keep software and plugins updated with security patches
- Use strong, unique credentials for every relevant account
- Enable two-factor authentication where available
- Report incidents or suspected abuse promptly
- Limit credential sharing to authorized personnel only
5. Content guidelines
You are responsible for content hosted on infrastructure we manage. You must have the necessary rights to publish and distribute that content, and it must comply with applicable law and platform rules.
6. Monitoring
We may monitor service usage to maintain reliability and investigate abuse. We do not actively review client content unless we receive a complaint, observe suspicious activity, or are required to investigate for security or legal reasons.
7. Enforcement
Depending on severity, violations may lead to:
- A warning and request to remedy the issue
- Temporary suspension of access or services
- Immediate termination without refund for serious abuse
- Escalation to law enforcement or upstream providers where required
8. Reporting violations
If you become aware of a potential violation, report it to hello@acefina.com so we can review it promptly.
We can explain how managed infrastructure, security expectations, and escalation paths work before the engagement starts.
If you are unsure whether a workflow or workload fits within our managed delivery model, ask us first and we will clarify the boundary.