Effective Date: 06/01/2015
Last Updated: 03/05/2026
Users must use Zisker services in a lawful, responsible, and ethical manner.
You agree not to use our services in ways that:
Violate any applicable laws or regulations
Disrupt the stability of our infrastructure
Interfere with other customers’ use of services
Harm the security or reputation of our network
Zisker reserves the right to investigate any suspected violation of this policy.
Customers may not use Zisker services to engage in illegal activities including but not limited to:
Fraud or financial scams
Identity theft
Distribution of illegal drugs
Hosting illegal marketplaces
Sale of counterfeit goods
Distribution of illegal content
Any service used for illegal activity may be immediately suspended or terminated without notice.
Customers may not use Zisker infrastructure to:
Distribute malware, trojans, ransomware, spyware, or viruses
Host exploit kits or malicious software
Attempt unauthorized access to networks or systems
Conduct password attacks or brute-force attacks
Run vulnerability scanners against networks without authorization
Security research activities must have explicit permission from the affected parties.
The following activities are strictly prohibited:
Distributed Denial-of-Service (DDoS) attacks
DoS amplification attacks
Port scanning of external networks
Network flooding
Packet spoofing
IP reputation abuse
Any activity that degrades network performance or reliability may result in immediate suspension.
Customers must not use services in a manner that consumes excessive system resources.
Prohibited resource abuse includes:
Excessive CPU or memory usage impacting other users
Disk I/O abuse
Running automated scripts that overload servers
Hosting large file archives unrelated to websites
Using shared hosting as file storage
Zisker reserves the right to limit or suspend accounts causing server instability.
Cryptocurrency mining or blockchain validation operations are not permitted on shared hosting or reseller hosting services.
Such activities require dedicated infrastructure and may only be permitted with explicit written approval.
Customers may not use Zisker services to send or facilitate:
Unsolicited bulk email (spam)
Purchased mailing lists
Email harvesting
Open relay email services
All email campaigns must comply with applicable anti-spam laws such as the CAN-SPAM Act.
Accounts responsible for spam activity may be suspended immediately.
Customers may not host or operate websites designed to:
Impersonate legitimate organizations
Collect user credentials fraudulently
Distribute fake login portals
Conduct financial scams
Phishing sites will be taken offline immediately.
Customers may not host or distribute content that:
Promotes violence or terrorism
Encourages harassment or discrimination
Violates intellectual property rights
Contains illegal adult content
Exploits minors
Content violating applicable law will be removed.
Zisker respects intellectual property rights and complies with the Digital Millennium Copyright Act (DMCA) enacted by the United States Congress.
Customers may not host or distribute copyrighted material without proper authorization.
Upon receiving a valid DMCA complaint, Zisker may:
Disable access to the infringing content
Notify the customer responsible
Suspend or terminate the account for repeated violations
Customers may not operate services intended to:
Hide malicious activity
Facilitate illegal activity
Provide open anonymous proxy networks
Public VPN services must not be used for abusive or illegal purposes.
Customers may not operate systems that control or participate in botnets.
This includes:
Command-and-control servers
Malware distribution networks
Automated abuse tools
Customers using reseller hosting are responsible for the actions of their end users.
Resellers must ensure their customers comply with this Acceptable Use Policy.
Abuse generated by reseller clients may result in suspension of the reseller account.
Customers are responsible for securing their accounts and servers.
Users must:
Maintain secure passwords
Update software regularly
Prevent unauthorized access
Accounts compromised due to poor security may be temporarily suspended to prevent further abuse.
Zisker may take action against accounts violating this policy including:
Warning notices
Temporary suspension
Permanent termination
Removal of violating content
Severe violations may result in immediate suspension without notice.
If you believe a customer is violating this policy, please report it to:
Reports should include relevant details such as:
Domain name or IP address
Description of the issue
Supporting evidence if available
Zisker reserves the right to modify this Acceptable Use Policy at any time.
Updates will become effective immediately upon publication on our website.
Continued use of Zisker services indicates acceptance of the updated policy.