1. Purpose
This Acceptable Use Policy (“AUP”) sets out the rules governing the use of all services provided by lbreeze Limited, including web hosting, domain registration, SSL certificates, business email, and any related infrastructure or platform services.
By using our services, you agree to comply with this AUP at all times. This policy exists to protect the integrity, performance, and security of our infrastructure for all customers, and to ensure our services are not used for harmful, illegal, or abusive purposes.
This AUP is incorporated into and forms part of our Terms of Service. Violation of this policy may result in immediate suspension or termination of your account.
2. Prohibited Activities
You must not use our services — directly or indirectly — for any of the following activities:
Illegal Content or Activity
- Hosting, distributing, or transmitting any content that violates applicable laws in the UK or the jurisdiction of your end users
- Facilitating fraud, identity theft, money laundering, or any other criminal activity
- Accessing or attempting to access systems, accounts, or data without authorisation
Spam & Unsolicited Communications
- Sending unsolicited bulk email (spam) or any form of unsolicited commercial communications
- Operating open mail relays or proxies that facilitate spam distribution
- Harvesting or collecting email addresses or personal data without consent
- Sending communications that impersonate another person or organisation
Malware & Security Threats
- Uploading, hosting, or distributing viruses, ransomware, spyware, trojans, worms, or any malicious code
- Creating or operating phishing pages, credential-harvesting sites, or fraudulent lookalike websites
- Hosting command-and-control infrastructure for botnets or other malicious networks
- Engaging in port scanning, vulnerability scanning, or exploitation of third-party systems without authorisation
Copyright & Intellectual Property Infringement
- Hosting, distributing, or linking to pirated software, music, films, or other copyrighted material without a valid licence
- Operating torrent sites, file-sharing platforms, or proxy sites that facilitate copyright infringement
- Using our services in a manner that infringes any third-party trademark, patent, or trade secret
Cryptocurrency Mining
- Running cryptocurrency mining software (e.g. Bitcoin, Monero, Ethereum miners) on any of our shared or managed hosting infrastructure
- Using our servers to perform proof-of-work computations for any blockchain or distributed computing scheme without explicit written authorisation
Network Attacks & Disruption
- Launching or participating in Distributed Denial of Service (DDoS) attacks against any target
- Engaging in IP spoofing, packet flooding, or any activity that disrupts network services
- Attempting to circumvent or disable any security measures protecting our infrastructure or that of third parties
- Using our services as a source, transit, or destination for attack traffic
Excessive Resource Usage
- Consuming server resources (CPU, RAM, disk I/O, bandwidth) at levels that materially degrade the performance or availability of services for other customers on shared infrastructure
- Running persistent background processes, daemons, or scripts not related to normal web serving without prior arrangement
Zero Tolerance: Child Sexual Abuse Material (CSAM)
The hosting, distribution, or transmission of any content that sexually exploits minors is strictly prohibited and subject to immediate account termination without notice. All such incidents will be reported without delay to the National Crime Agency (NCA), the Internet Watch Foundation (IWF), and any other relevant law enforcement authorities.
3. Resource Usage & Fair Use
Our shared hosting plans are designed to support normal website workloads. While we do not impose hard bandwidth or storage caps on most plans, use of resources must remain within the spirit of fair use so that all customers on shared infrastructure receive a consistent quality of service.
If your account is found to be consuming resources at a level that adversely impacts other customers or the stability of our infrastructure, we may:
- Contact you to discuss optimisation options
- Temporarily throttle or suspend resource-intensive processes
- Request that you upgrade to a higher-tier plan or a VPS/dedicated solution
We will always attempt to contact you before taking action, except in cases of severe or immediately harmful resource abuse.
4. Enforcement
We reserve the right to investigate any suspected violation of this AUP. Depending on the nature and severity of the violation, enforcement actions may include:
- Warning: notification by email requesting that the violation be remedied within a specified timeframe
- Suspension: temporary suspension of services pending investigation or resolution of the issue
- Termination: permanent termination of the account without refund
- Reporting to authorities: where required by law or where serious criminal activity is involved, we will report matters to the relevant law enforcement authorities
For serious violations — including but not limited to malware distribution, DDoS attacks, CSAM, or active fraud — we reserve the right to terminate accounts immediately and without prior notice.
5. Reporting Abuse
If you believe that our services are being used in violation of this policy, please report it to our abuse team as soon as possible. We take all abuse reports seriously and aim to investigate and respond promptly.
6. Changes to This Policy
We may update this Acceptable Use Policy from time to time to reflect changes in our services, legal requirements, or the threat landscape. We will notify customers of significant changes via email or the client portal. Continued use of our services after any update constitutes acceptance of the revised AUP.