Acceptable Use Policy

Last updated: 3/31/2026

1. Overview

This Acceptable Use Policy ("AUP") outlines the permitted and prohibited uses of Trcoms Hosting's services. By using our services, you agree to comply with this policy. Violations may result in immediate service suspension or termination.

2. Prohibited Activities

2.1 Illegal Activities

You may not use our services for any illegal purpose, including:

  • Distribution of malware, viruses, or malicious code
  • Hacking attempts or unauthorized access to systems
  • Phishing, fraud, or identity theft
  • Distribution of illegal content or copyrighted material
  • Terrorist activities or recruitment
  • Any activity violating local, national, or international laws

2.2 Network Abuse

The following network activities are strictly prohibited:

  • Port scanning, network enumeration, or vulnerability probing
  • Distributed Denial of Service (DDoS) attacks or participation in botnets
  • Spamming or unsolicited bulk email (UBE)
  • Email bombing or harassment via messaging systems
  • Excessive bandwidth consumption affecting other customers
  • Packet sniffing or unauthorized network interception

2.3 Content Violations

Hosting or distributing the following content is prohibited:

  • Child sexual abuse material (CSAM) - zero tolerance
  • Adult content without proper age verification
  • Hate speech, discrimination, or harassment
  • Violent or extremist content
  • Defamatory, libelous, or slanderous content
  • Content violating intellectual property rights

2.4 System Abuse

The following system-level activities are prohibited:

  • Cryptocurrency mining without authorization
  • Running proxy services without approval
  • Operating IRC bots or similar services
  • Excessive resource usage (CPU, RAM, disk I/O)
  • Circumventing account or resource limits
  • Exploiting software vulnerabilities

3. Permitted Activities

Our services support legitimate business use including:

  • Web hosting and application deployment
  • Email servers with proper authentication and anti-spam measures
  • Database hosting and data processing
  • Development and testing environments
  • E-commerce platforms (with legal compliance)
  • Content delivery networks
  • API services and integrations

If you're unsure whether your intended use is permitted, please contact our compliance team.

4. Security Requirements

Customers must maintain adequate security measures:

  • Keep software and operating systems updated
  • Use strong, unique passwords for all accounts
  • Implement proper firewall configurations
  • Enable and configure SSL/TLS certificates
  • Regular security audits and vulnerability assessments
  • Immediate patching of critical security vulnerabilities

5. Resource Usage

Fair usage guidelines:

  • Network usage should be consistent with your selected plan
  • CPU usage should not consistently exceed 80% for extended periods
  • Storage is for active data only; backup services should be used separately
  • I/O operations should not degrade overall system performance

Customers exceeding reasonable limits may be asked to upgrade to appropriate service tiers.

6. Intellectual Property

You must respect all intellectual property rights. Do not host, distribute, or transmit content that infringes on patents, copyrights, trademarks, or trade secrets. We comply with all valid DMCA takedown notices.

7. Email Policy

Email services must comply with CAN-SPAM Act, GDPR, and applicable regulations. All emails must include:

  • Accurate header information and sender identification
  • Valid physical postal address
  • Clear opt-out/unsubscribe mechanism
  • Honest, non-misleading subject lines

8. Monitoring & Enforcement

Trcoms Hosting actively monitors network traffic for policy compliance and security purposes. We reserve the right to investigate suspected violations and take appropriate action including:

  • Service suspension for investigation
  • Content removal or modification
  • Account termination for severe or repeated violations
  • Reporting to law enforcement when illegal activities are detected

9. Violation Reporting

To report violations of this policy, please contact abuse@trcoms.com with:

  • Detailed description of the violation
  • Evidence supporting the claim (logs, screenshots, etc.)
  • IP address or server information involved
  • Your contact information for follow-up

10. Policy Updates

We may update this Acceptable Use Policy at any time. Customers will be notified of material changes via email. Continued use of services constitutes acceptance of updated policies.

11. Acknowledgment

By using Trcoms Hosting services, you acknowledge that you have read, understood, and agree to be bound by this Acceptable Use Policy. Violations may result in immediate service termination without refund.

12. Contact Information

For questions about this policy or to report violations:

Abuse: abuse@trcoms.com
Compliance: compliance@trcoms.com