Acceptable use Policy

Effective Date: 06/01/2015
Last Updated: 03/05/2026

 

1. General Principles

Users must use Zisker services in a lawful, responsible, and ethical manner.

You agree not to use our services in ways that:

  • Violate any applicable laws or regulations

  • Disrupt the stability of our infrastructure

  • Interfere with other customers’ use of services

  • Harm the security or reputation of our network

Zisker reserves the right to investigate any suspected violation of this policy.


2. Illegal Activities

Customers may not use Zisker services to engage in illegal activities including but not limited to:

  • Fraud or financial scams

  • Identity theft

  • Distribution of illegal drugs

  • Hosting illegal marketplaces

  • Sale of counterfeit goods

  • Distribution of illegal content

Any service used for illegal activity may be immediately suspended or terminated without notice.


3. Malware, Exploits, and Hacking

Customers may not use Zisker infrastructure to:

  • Distribute malware, trojans, ransomware, spyware, or viruses

  • Host exploit kits or malicious software

  • Attempt unauthorized access to networks or systems

  • Conduct password attacks or brute-force attacks

  • Run vulnerability scanners against networks without authorization

Security research activities must have explicit permission from the affected parties.


4. Network Abuse

The following activities are strictly prohibited:

  • Distributed Denial-of-Service (DDoS) attacks

  • DoS amplification attacks

  • Port scanning of external networks

  • Network flooding

  • Packet spoofing

  • IP reputation abuse

Any activity that degrades network performance or reliability may result in immediate suspension.


5. Resource Abuse

Customers must not use services in a manner that consumes excessive system resources.

Prohibited resource abuse includes:

  • Excessive CPU or memory usage impacting other users

  • Disk I/O abuse

  • Running automated scripts that overload servers

  • Hosting large file archives unrelated to websites

  • Using shared hosting as file storage

Zisker reserves the right to limit or suspend accounts causing server instability.


6. Cryptocurrency Mining

Cryptocurrency mining or blockchain validation operations are not permitted on shared hosting or reseller hosting services.

Such activities require dedicated infrastructure and may only be permitted with explicit written approval.


7. Spam and Unsolicited Email

Customers may not use Zisker services to send or facilitate:

  • Unsolicited bulk email (spam)

  • Purchased mailing lists

  • Email harvesting

  • Open relay email services

All email campaigns must comply with applicable anti-spam laws such as the CAN-SPAM Act.

Accounts responsible for spam activity may be suspended immediately.


8. Phishing and Fraudulent Websites

Customers may not host or operate websites designed to:

  • Impersonate legitimate organizations

  • Collect user credentials fraudulently

  • Distribute fake login portals

  • Conduct financial scams

Phishing sites will be taken offline immediately.


9. Content Restrictions

Customers may not host or distribute content that:

  • Promotes violence or terrorism

  • Encourages harassment or discrimination

  • Violates intellectual property rights

  • Contains illegal adult content

  • Exploits minors

Content violating applicable law will be removed.


10. Copyright Infringement

Zisker respects intellectual property rights and complies with the Digital Millennium Copyright Act (DMCA) enacted by the United States Congress.

Customers may not host or distribute copyrighted material without proper authorization.

Upon receiving a valid DMCA complaint, Zisker may:

  • Disable access to the infringing content

  • Notify the customer responsible

  • Suspend or terminate the account for repeated violations


11. Proxy and VPN Abuse

Customers may not operate services intended to:

  • Hide malicious activity

  • Facilitate illegal activity

  • Provide open anonymous proxy networks

Public VPN services must not be used for abusive or illegal purposes.


12. Botnets and Automated Abuse

Customers may not operate systems that control or participate in botnets.

This includes:

  • Command-and-control servers

  • Malware distribution networks

  • Automated abuse tools


13. Reseller Responsibility

Customers using reseller hosting are responsible for the actions of their end users.

Resellers must ensure their customers comply with this Acceptable Use Policy.

Abuse generated by reseller clients may result in suspension of the reseller account.


14. Account Security

Customers are responsible for securing their accounts and servers.

Users must:

  • Maintain secure passwords

  • Update software regularly

  • Prevent unauthorized access

Accounts compromised due to poor security may be temporarily suspended to prevent further abuse.


15. Enforcement

Zisker may take action against accounts violating this policy including:

  • Warning notices

  • Temporary suspension

  • Permanent termination

  • Removal of violating content

Severe violations may result in immediate suspension without notice.


16. Reporting Abuse

If you believe a customer is violating this policy, please report it to:

📧 support@zisker.com

Reports should include relevant details such as:

  • Domain name or IP address

  • Description of the issue

  • Supporting evidence if available


17. Policy Updates

Zisker reserves the right to modify this Acceptable Use Policy at any time.

Updates will become effective immediately upon publication on our website.

Continued use of Zisker services indicates acceptance of the updated policy.