Legal

Acceptable Use Policy

Guidelines for responsible and lawful use of DanubeData cloud infrastructure services. Learn about prohibited activities, resource limits, and security requirements.

Last updated: March 28, 2026

1. Purpose

This Acceptable Use Policy ("AUP") outlines prohibited uses of DanubeData's services. By using our services, you agree to comply with this policy.

Violation of this AUP may result in suspension or termination of services without refund.

2. Prohibited Activities

2.1 Illegal Activities

You may not use our services for any illegal purpose or to violate any laws, including but not limited to:

  • Distribution of copyrighted material without authorization
  • Trademark or intellectual property infringement
  • Fraud, identity theft, or financial crimes
  • Child exploitation or illegal content
  • Drug trafficking or illegal substance distribution
  • Gambling services in prohibited jurisdictions
  • Money laundering or financing terrorism

2.2 Network Abuse

Activities that harm or disrupt networks, systems, or other users:

  • Denial of Service (DoS/DDoS): Launching attacks against any target
  • Port Scanning: Unauthorized network scanning or probing
  • Packet Sniffing: Intercepting network traffic
  • IP Spoofing: Forging IP addresses or headers
  • Brute Force Attacks: Attempting to crack passwords or break into systems
  • Traffic Amplification: DNS, NTP, SSDP, Memcached, or other amplification attacks

2.3 Email and Messaging Abuse

  • Spam: Sending unsolicited bulk email or messages
  • Phishing: Deceptive attempts to obtain sensitive information
  • Email Harvesting: Collecting email addresses without consent
  • Email Bombing: Overwhelming mail servers or recipients
  • Forged Headers: Falsifying email headers or sender information

2.4 Content Restrictions

Prohibited content includes:

  • Child sexual abuse material (CSAM)
  • Content promoting terrorism or violence
  • Hate speech or content inciting discrimination
  • Malware, viruses, or malicious code
  • Pirated software, movies, music, or other media
  • Leaked or stolen data

2.5 Resource Abuse

  • Cryptocurrency Mining: Not permitted without explicit written approval. This includes connecting to mining pools (e.g., Stratum protocol) and running mining software of any kind
  • BitTorrent and Peer-to-Peer (P2P) File Sharing: Running BitTorrent clients, seedboxes, or any P2P file-sharing software is strictly prohibited. This applies regardless of whether the content being shared is copyrighted
  • Excessive Resource Use: Activities that unreasonably burden infrastructure
  • Proxy/VPN Services: Public or open proxy services (SOCKS, HTTP proxy, etc.) are not permitted. Private VPN for your own use is allowed. Contact us for approval if you intend to run a proxy or VPN service for others
  • Tor Exit Nodes: Running Tor exit nodes or relays is not permitted due to abuse potential and upstream provider restrictions

2.6 Security Violations

  • Attempting to breach security measures
  • Accessing other customers' systems or data
  • Vulnerability scanning without permission
  • Penetration testing without prior authorization
  • Running malware or botnet command & control

3. Permitted Security Testing

Security testing is allowed on your own infrastructure with these conditions:

  • Tests must be limited to your own systems
  • Notify us at least 48 hours in advance
  • Provide details of the testing scope and methodology
  • Use moderate resource levels
  • Follow responsible disclosure if vulnerabilities are found

4. Compliance with Third-Party Policies

You must comply with policies of third-party services you use, including:

  • Payment processor terms (Stripe)
  • Domain registrar policies
  • SSL certificate authority requirements
  • CDN and DNS provider terms

5. Reporting Violations

5.1 How to Report

If you become aware of AUP violations, report them to:

Email: abuse@danubedata.ro
Include: Detailed description, evidence, and your contact information

5.2 What We Need

  • Specific details of the violation
  • Relevant logs, screenshots, or evidence
  • Date and time of the incident
  • Your contact information for follow-up

6. Network Security Monitoring

6.1 Network-Level Abuse Detection

Like all hosting providers, DanubeData monitors network traffic at the infrastructure level to detect and prevent abuse. This is standard practice across the hosting industry.

Our network monitoring includes:

  • Traffic pattern analysis: Detecting DDoS attacks, spam, port scanning, brute force attempts, and other network abuse
  • Resource usage metrics: Monitoring CPU, memory, bandwidth, and disk I/O at the hypervisor level
  • IP reputation monitoring: Checking our IP ranges against public blocklists and responding to abuse reports from third parties
  • Upstream provider compliance: Responding to abuse notifications from our infrastructure provider (Hetzner)

6.2 What We Do Not Monitor

We do not access, scan, or inspect the contents of your VPS instances. This means:

  • We do not read your files, databases, or application data
  • We do not monitor your running processes or installed software
  • We do not inspect your cron jobs, startup scripts, or configurations
  • We do not browse your web directories or application content

Your VPS is your private environment. We only access your instance if you explicitly request support assistance, or if compelled by a valid legal order from a competent authority.

6.3 Infrastructure Access

As a virtualization provider, DanubeData has hypervisor-level access to the physical servers hosting your VPS. This is inherent to all virtualized hosting and is not unique to DanubeData. We use this access for hardware maintenance, emergency recovery at your request, and compliance with valid legal orders. We recommend full-disk encryption within your VPS if you require additional data isolation.

6.4 Abuse Report Response

When we receive an abuse report (from a third party, our upstream provider, or triggered by network monitoring), we will:

  • Notify you of the report and provide relevant details
  • Give you a reasonable deadline to investigate and resolve the issue
  • Only suspend your service if the abuse is severe, ongoing, and you fail to respond

7. Investigation and Enforcement

7.1 Our Response

When we receive abuse reports or detect violations through automated scanning, we:

  • Investigate promptly (typically within 24 hours)
  • Contact the customer to address the issue
  • Take appropriate action based on severity
  • Cooperate with law enforcement when required

7.2 Enforcement Actions

Depending on severity, we may:

  • Warning: First-time or minor violations
  • Temporary Suspension: Serious or repeated violations
  • Service Termination: Severe violations or non-compliance
  • Legal Action: Criminal activities or significant harm

7.3 Appeal Process

If you believe enforcement action was taken in error:

  • Contact abuse@danubedata.ro within 7 days
  • Provide detailed explanation and evidence
  • We will review and respond within 48 hours

8. Legal Compliance

8.1 GDPR and Privacy

You must comply with GDPR and other data protection laws when processing personal data.

8.2 Copyright (DMCA)

We comply with the Digital Millennium Copyright Act (DMCA). Copyright infringement reports should include:

  • Your contact information
  • Description of copyrighted work
  • Location of infringing material
  • Statement of good faith belief
  • Statement of accuracy under penalty of perjury
  • Physical or electronic signature

Send DMCA notices to: dmca@danubedata.ro

9. Resource Limits

9.1 Fair Use

While we provide generous resources, we expect fair use. Extreme cases may be subject to review.

9.2 Traffic Limits

Network traffic is generally unmetered, but abuse (DDoS amplification, etc.) will result in action.

10. Content Backup Responsibility

While we provide infrastructure backups, you are responsible for:

  • Your application data backups
  • Testing backup restoration
  • Maintaining off-site copies of critical data

11. Changes to This Policy

We may update this AUP at any time. Continued use of services after changes constitutes acceptance. We will notify users of significant changes via email.

12. Examples of Acceptable Use

To clarify, the following ARE generally acceptable:

  • Web hosting and application deployment
  • Development and testing environments
  • Database and cache services for your applications
  • Private VPN for your personal or business use
  • Legitimate email services with proper SPF/DKIM
  • Security testing of your own systems (with notice)
  • Media streaming of your own content
  • Game servers for private use

13. Contact Information

For questions about this policy:

Abuse Department
Ifas Consult SRL
Email: abuse@danubedata.ro
DMCA: dmca@danubedata.ro
General: Contact Form

Important: This policy is designed to protect all users and maintain service quality. If you're unsure whether your intended use is acceptable, please contact us before proceeding.

Questions about this policy?

If you have any questions or concerns, please contact our legal team.

Contact Us