Acceptable Use Policy (AUP)

1. Professional Conduct & Support Etiquette

BHR-Hosting is committed to providing a respectful and productive environment. When interacting with our staff via the ticket system:

  • Zero Tolerance for Abuse: Any communication containing threats, profanity, derogatory remarks, or harassment toward BHR-Hosting employees will result in immediate ticket closure and may lead to account suspension or termination without a refund.
  • Ticket Flooding: Users must refrain from "spamming" the system with multiple tickets for the same issue. Duplicate tickets create delays for all users and may be closed without a response.

2. Prohibited Content & Activities

To maintain the integrity of our hosting environment, the following activities are strictly prohibited:

  • Illegal Activity: Hosting, distributing, or linking to child exploitation material, pirated software (warez), or content that violates intellectual property rights.
  • Network Abuse: Engaging in Denial of Service (DoS) attacks, port scanning, or unauthorized access to other networks/accounts.
  • Spamming: Sending unsolicited bulk emails or hosting "spam-vertized" websites is grounds for immediate termination.
  • Resource Monopolization: Using excessive system resources (CPU, RAM, or bandwidth) that negatively impacts other users on the shared infrastructure.

3. Security Responsibilities

Users are solely responsible for the security of their accounts and the data hosted on BHR-Hosting servers.

  • Account Security: You must maintain strong passwords. Any account compromised and used for malicious purposes (e.g., sending spam) may be suspended until the security breach is resolved.
  • Software Updates: Users are required to keep all hosted scripts, CMS platforms (like WordPress), and plugins updated to the latest secure versions.

4. Enforcement and Termination

BHR-Hosting reserves the right to determine, at its sole discretion, what constitutes a violation of this AUP.

  • Suspension: We may suspend services immediately if we detect a violation that threatens the stability or reputation of our network.
  • Reporting: We cooperate fully with law enforcement agencies in investigating suspected illegal activity.