Guidelines and restrictions for the use of WebOps Hosting services to ensure a secure, reliable, and lawful environment for all users.
Last Updated: November 19, 2025
1. Introduction
This Acceptable Use Policy ("AUP") outlines the permissible and prohibited uses of the services provided by WebOps Hosting. The purpose of this AUP is to ensure the security, reliability, and privacy of our systems and networks, and to foster a compliant and safe environment for all our customers and internet users at large.
By registering for, accessing, or using any WebOps Hosting services, you agree to comply with this AUP in its entirety. This policy applies to all customers, users, and any third parties accessing the services through your account.
Agreement by Use: Your use of WebOps Hosting services constitutes acceptance of this Acceptable Use Policy. WebOps Hosting reserves the right to modify this AUP at any time, effective upon posting the revised version on our website.
2. Prohibited Content
Customers may not use WebOps Hosting networks, systems, or services to transmit, distribute, or store any information, data, or material that violates any applicable local, state, federal, or international laws or regulations.
You may not host content that:
3. Prohibited Activities
WebOps Hosting prohibits any activity that interferes with the ability of others to use our services or the Internet safely and securely.
Network & System Abuse
- Unauthorized access to any network or system (cracking).
- Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks.
- Port scanning, packet spoofing, or network flooding.
- Operating open proxies or open mail relays.
Resource Abuse
- Cryptocurrency mining (Bitcoin, Ethereum, Chia, etc.).
- Running public torrent trackers or seedboxes.
- Intensive continuous computing tasks untethered to web hosting.
- Bypassing system limitations or quotas intentionally.
4. Network Usage
Customers are expected to use network resources responsibly. While some plans may offer "unmetered" or "unlimited" bandwidth, this is strictly subject to our Fair Use guidelines. Bandwidth must only be utilized for normal web hosting operations.
You may not use our network to operate applications that consume disproportionate network capacity or to route traffic acting essentially as a VPN, proxy, or anonymization node for public use.
5. Email Usage
WebOps Hosting maintains a zero-tolerance policy against Unsolicited Commercial Email (UCE) and spam.
All commercial emails must fully comply with the CAN-SPAM Act of 2003 and equivalent international legislation. Senders must include valid physical addresses and functional opt-out mechanisms.
Any mass email or mailing list must be strictly double opt-in. You must retain verifiable proof of consent for every subscriber. Purchasing or renting email lists is strictly prohibited.
You must actively manage and process email bounces. Continuing to send emails to invalid addresses resulting in high bounce rates may trigger automated network blocks to protect our IP reputation.
6. Security
Customers are responsible for maintaining the basic security of their applications, including keeping CMS software (like WordPress), plugins, and themes up to date.
You may not perform vulnerability scanning, penetration testing, or load testing against WebOps Hosting infrastructure without explicit, prior written consent from our security team. Any discovered vulnerabilities should be reported immediately via responsible disclosure.
7. Resource Usage
To ensure consistent performance for all customers in shared environments, accounts are subject to CPU, RAM, and I/O limits as defined by their specific hosting plan.
Features advertised as "unlimited" (such as storage or bandwidth) are provided for standard website operations. They are not intended for use as remote storage, personal backups, media archiving, or enterprise file sharing. We reserve the right to limit resources if an account's usage negatively impacts server stability or other customers.
8. Monitoring and Enforcement
WebOps Hosting does not actively monitor customer content as a matter of standard practice. However, we reserve the right to investigate suspected violations of this AUP.
During an investigation, we may suspend the account involved, restrict access, or remove suspected material from our servers. We will cooperate fully with law enforcement authorities in the investigation of suspected criminal violations.
9. Reporting Violations
If you believe a WebOps Hosting customer has violated this policy, please report the incident to our compliance team.
How to File an Abuse Report:
Send an email to abuse@webops.host and include the following details:
- The IP address, URL, or domain involved.
- The date and time of the incident (including time zone).
- Evidence of the violation (e.g., email headers, logs, screenshots).
- A brief description of how it violates our AUP.
Note: While we review all reports, we may not reply to every submission unless additional information is required.
10. Consequences of Violation
Violations of this Acceptable Use Policy may result in the following actions, at the sole discretion of WebOps Hosting:
No refunds will be provided for accounts terminated due to AUP violations. In cases of severe abuse causing damage to our network or reputation, WebOps Hosting reserves the right to seek civil remedies.
11. Contact Information
If you have questions about this policy or whether a proposed use is permissible, please contact us.