Acceptable Use Policy (AUP)
Last updated: 2026-01-05
1. Scope
This AUP applies to all use of Coma Cloud hosting and cloud services by Customers and their users. It forms part of the Hosting and Cloud Services Terms of Service.
2. Prohibited activities
You must not use the Services to engage in, facilitate, promote, or support:
- Illegal content or illegal activities under applicable law.
- Malware, trojans, ransomware, phishing, credential theft, or other malicious code or behavior.
- Unauthorised access, scanning, probing, exploitation, or hacking of systems or networks.
- Distributed denial of service (DDoS) attacks, botnets, or traffic amplification.
- Spam or unsolicited bulk communications, including email, SMS, or messaging spam.
- Hosting or distributing content that infringes intellectual property rights, where the infringement is credible and not disputed in good faith.
- Child sexual abuse material (CSAM) – strictly prohibited and will be reported to authorities as required.
- Resource abuse that materially degrades service stability for other Customers, including uncontrolled scripts, excessive background jobs, or abusive storage patterns.
3. Email sending and deliverability
If the Customer sends email using the Services, the Customer must follow best practices and applicable laws (including consent where required), implement SPF/DKIM/DMARC where applicable, and maintain suppression lists. Coma Cloud may restrict or block outbound email if it risks IP reputation or causes abuse complaints.
4. Security requirements
- Keep software up to date and patched.
- Use strong credentials and MFA where available.
- Protect API keys, SSH keys, and admin access.
- Do not expose insecure services to the public internet without safeguards.
5. Enforcement
Coma Cloud may investigate suspected breaches and may request information from the Customer. Depending on severity, Coma Cloud may take actions including rate limiting, isolation, suspension, or termination.
For urgent security or legal situations, Coma Cloud may suspend Services immediately to mitigate harm.
6. Reporting abuse
Abuse reports should be sent to: [email protected] (or use [email protected] if a dedicated abuse inbox is not available). Include relevant logs, timestamps (with timezone), IP addresses, and any supporting evidence.