VPS Usage Terms
Guidelines and policies for acceptable use of our VPS services
Table of Contents
1. Introduction
These VPS Usage Terms outline the acceptable use policies for all virtual private server (VPS) services provided by CloudyVPS. By using our services, you agree to comply with these terms and ensure that all users of your VPS instances adhere to these guidelines.
Important: These usage terms are supplementary to our main Terms of Service. Both documents should be read together to understand your complete obligations.
Our goal is to provide a safe, reliable, and high-performance hosting environment for all customers. These policies help us maintain service quality and protect our infrastructure.
2. Permitted Uses
Our VPS services are designed to support a wide range of legitimate business and personal computing needs. The following activities are explicitly permitted:
Web Hosting & Applications
- Hosting websites, blogs, and web applications
- E-commerce platforms and online stores
- Content management systems (WordPress, Drupal, Joomla)
- Custom web applications and SaaS platforms
- API servers and microservices
Development & Testing
- Software development environments
- Continuous integration and deployment (CI/CD)
- Staging and testing environments
- Code repositories (Git, SVN)
- Database development and testing
Business Applications
- Email servers and communication tools
- CRM and ERP systems
- Data analytics and business intelligence
- File storage and backup solutions
- VPN servers for secure remote access
Gaming & Media
- Game servers (Minecraft, Counter-Strike, etc.)
- Voice chat servers (TeamSpeak, Mumble)
- Media streaming (within legal bounds)
- Content delivery networks
3. Prohibited Activities
The following activities are strictly prohibited and may result in immediate termination of your service without refund:
Illegal Activities
- Distribution of illegal content or materials
- Hosting pirated software, movies, music, or other copyrighted content
- Operating phishing websites or fraud schemes
- Identity theft or impersonation
- Money laundering or financial fraud
- Sale of illegal goods or services
Network Abuse
- DDoS attacks or participation in botnets
- Port scanning or vulnerability probing of external systems
- Sending spam or unsolicited bulk email
- IP spoofing or packet manipulation
- Operating open proxies or relays that facilitate abuse
- Brute force attacks against any system
Resource Abuse
- Cryptocurrency mining (unless on dedicated GPU plans with explicit approval)
- Running TOR exit nodes
- Excessive resource consumption affecting other customers
- Running processes designed to circumvent resource limits
Harmful Content
- Child exploitation material (zero tolerance - reported to authorities)
- Malware distribution or command and control servers
- Hate speech or content promoting violence
- Terrorism-related content
Zero Tolerance Policy: Any involvement in child exploitation, terrorism, or malware distribution will result in immediate account termination and cooperation with law enforcement authorities.
4. Resource Usage
While our VPS plans offer generous resource allocations, fair usage policies apply to ensure optimal performance for all customers:
CPU Usage
- CPU cores are shared resources on standard VPS plans
- Sustained 100% CPU usage should not exceed 4 hours continuously
- CPU-intensive workloads should use our dedicated CPU plans
- Burst capacity is available for short periods
Bandwidth & Network
| Plan Type | Monthly Bandwidth | Network Speed |
|---|---|---|
| VPS Starter | 2 TB | 1 Gbps |
| VPS Professional | 5 TB | 2.5 Gbps |
| VPS Enterprise | 10 TB | 10 Gbps |
| High Performance | Unmetered* | 10 Gbps |
*Fair use policy applies
Storage
- SSD/NVMe storage is allocated as advertised per plan
- IOPS limits may apply during peak hours
- Storage is for active data only - use external backup for archives
- File count limits may apply (typically 1M inodes per 100GB)
5. Security Policies
Security is a shared responsibility. You are responsible for:
- Access Security: Using strong passwords, SSH keys, and enabling 2FA
- Software Updates: Keeping your operating system and applications updated
- Firewall Configuration: Properly configuring firewalls and security groups
- Backup Strategy: Maintaining regular backups of your data
- Monitoring: Monitoring your server for unauthorized access or unusual activity
Security Notice: If your VPS is compromised and used for malicious activities, we may temporarily suspend your service to protect our network. You will be notified and given the opportunity to resolve the issue.
Our Security Commitments
- Enterprise-grade physical security at all data centers
- Network-level DDoS protection
- Regular security audits and penetration testing
- Encrypted management interfaces
- 24/7 security monitoring
6. Content Policy
You are solely responsible for all content stored on or transmitted through your VPS. This includes:
- Websites and web applications
- Databases and stored data
- User-generated content on your platforms
- Email content sent from your servers
- Files and media stored on your VPS
Copyright & DMCA
We respect intellectual property rights and comply with DMCA takedown requests. If you receive a DMCA notice:
- We will forward the notice to you
- You have 24 hours to respond or remove the content
- Repeated violations may result in account termination
- You may file a counter-notice if you believe the claim is invalid
Adult Content
Legal adult content is permitted only on designated plans and must:
- Comply with all applicable laws
- Not appear on shared IP addresses
- Have proper age verification
- Not involve minors in any way
7. Network Policy
To maintain a healthy network environment for all users:
IP Address Usage
- IP addresses remain the property of CloudyVPS
- IPs may be changed with 7 days notice if required
- Additional IPs require justification
- IPv6 is available upon request at no extra charge
Email Sending
- Port 25 is blocked by default (use 587 for SMTP)
- Email sending limits apply based on plan
- SPF, DKIM, and DMARC configuration is recommended
- Bulk email requires prior approval
DNS & Domains
- Reverse DNS (PTR) records can be set via control panel
- DNS queries should not exceed 1000 queries/second
- Domain ownership verification may be required
8. Enforcement
Violations of these usage terms are handled as follows:
| Violation Level | Action | Notice Period |
|---|---|---|
| Minor (First offense) | Warning + correction request | 72 hours |
| Moderate | Temporary suspension | 24 hours |
| Severe | Immediate suspension | None |
| Critical (Illegal activity) | Termination + law enforcement | None |
Appeals Process
If you believe an enforcement action was taken in error:
- Contact our abuse team within 48 hours
- Provide documentation supporting your case
- Our team will review within 72 hours
- Decision will be communicated via email
Pro Tip: If you're unsure whether your intended use is permitted, please contact us before proceeding. We're happy to clarify and help you find the right solution.
Questions About Usage Terms?
For questions about acceptable use or to request clarification:
Email: abuse@cloudyvps.com
Support: support@cloudyvps.com
Response Time: Within 24 hours