#1. Purpose & scope
DSI Hosting provides hosting-related infrastructure (including VPS and associated capacity). This policy keeps the platform fair, lawful, and safe for customers, partners, and the wider internet. Using our services means you agree to follow this policy as well as our Terms & Conditions and Privacy Policy.
#2. Who this applies to
This policy applies to everyone who orders, accesses, or administrates services from DSI Hosting, including individuals, teams, and organisations. If you allow others to use your account or credentials, you remain responsible for their behaviour.
#3. Lawful & responsible use
You must:
- Comply with all laws and regulations that apply to you and your use of the service.
- Use only resources and capabilities included in your plan, without attempting to bypass quotas.
- Respect third-party networks, services, and intellectual property when sending traffic or storing content through our infrastructure.
- Keep credentials confidential and notify us promptly at support@dsi-hosting.net if you suspect compromise.
#4. Prohibited uses
You must not use DSI Hosting services to:
- Break any criminal or civil law (including fraud, harassment, stalking, child safety offences, or sanctions violations).
- Send unsolicited bulk email (spam), phishing, smishing, or deceptive messages; operate open relays; or run campaigns without compliant consent and unsubscribe mechanisms where marketing laws apply.
- Distribute malware, ransomware, credential stealers, cryptojacking payloads, or similar harmful code.
- Attack or disrupt third parties — including denial-of-service, volumetric floods, SYN floods, credential stuffing against others, or unauthorised intrusion attempts.
- Scan, probe, or exploit networks or systems you do not own or lack explicit written permission to test.
- Operate services whose primary purpose is to facilitate infringement of copyright or other IP rights, without lawful authority.
- Host or facilitate hate speech, violent extremism, or unlawful discriminatory abuse directed at protected groups (subject always to applicable law).
- Misrepresent your identity to us or to third parties in connection with the service (including forged headers or deceptive WHOIS/contact data where you control it).
- Resell, sublicense, timeshare, or pool access to your subscription as a commercial offering unless we have agreed in writing.
- Reverse-engineer or scrape our customer portal, APIs, or billing flows beyond what we expressly permit, or automate against rate limits we impose.
- Circumvent technical controls such as connection limits, device limits, rate limits, or IP restrictions.
- Mine cryptocurrency if doing so materially degrades shared infrastructure or breaches fair-use expectations.
This list is illustrative, not exhaustive. We may treat conduct that poses comparable risk as a breach.
#5. Network & resource fairness
You must run workloads suited to your plan. Behaviour that degrades shared networking or neighbour performance — such as sustained abusive egress patterns not justified by legitimate use — may trigger rate limiting, suspension, or mandatory remediation.
If we allocate bandwidth, CPU, storage, or sessions according to plan tiers, exceeding those limits or attempting to conceal excess usage violates this policy.
#6. Security & credentials
Protect passwords, API tokens, SSH keys, and configuration exports. Do not publish credentials in public repositories, forums, or screenshots.
If we detect abnormal patterns consistent with credential leakage, credential stuffing against your own infrastructure without reasonable safeguards, or multi-party sharing beyond what your plan allows, we may throttle access or rotate credentials to protect the platform.
#7. Content & third-party rights
You are responsible for content you store, transmit, or process using our services. You must ensure you have the rights and licences needed for that content and that processing it does not violate applicable law or third-party rights.
We may remove or restrict access to material where we reasonably believe it violates this policy or the law, or where we are required to act by competent authorities.
#8. Reporting abuse
If you become aware that someone is using DSI Hosting infrastructure to harm others or violate this policy, email support@dsi-hosting.net with as much detail as you can safely share (timestamps, IPs, URLs, message IDs). We take credible reports seriously and may coordinate with upstream providers or law enforcement where appropriate.
#9. Enforcement
Depending on severity and repetition, we may warn you, throttle resources, suspend services, terminate accounts without refund, block traffic, preserve evidence, and cooperate with law enforcement or civil process where legally obliged or justified.
Nothing in this policy limits remedies available under our Terms & Conditions or applicable law.
#10. Relationship to Terms & Conditions
Our Terms & Conditions govern your purchase and ongoing contractual relationship. Section 7 of the Terms summarises acceptable use; this policy expands that summary for transparency. If anything conflicts, the Terms prevail unless we expressly state otherwise.
#11. Changes
We may update this policy as risks, laws, or products evolve. The “Last updated” date at the top reflects the current version. Material changes may also be communicated by email or an on-site notice.
#12. Contact
Questions about acceptable use?
Email us — we read everything and will clarify grey areas where we can.
Email support@dsi-hosting.net