Last Modified July 18, 2025

Acceptable Use Policy (AUP)

1. Purpose

This Acceptable Use Policy (“AUP”) governs all use of GTSite’s high‑frequency infrastructure, managed services, websites, APIs, and related offerings (collectively, the “Services”). It is designed to protect the security, reliability, and legal integrity of our platform and our business‑only customer community. The AUP is incorporated by reference into the Terms of Service.

2. Prohibited Content

  • Illicit material – child sexual abuse material (CSAM), content that exploits or endangers minors, or bestiality.
  • Malware & Fraud – viruses, ransomware, phishing sites, or deceptive schemes.
  • Violent or Extremist Propaganda – material that supports or depicts illegal violence or US‑ or EU‑designated terrorist organizations.
  • Intellectual‑Property Infringement – hosting or distribution of copyrighted files without permission, counterfeit goods, or pirated software.
  • Illegal gambling, drugs, or weapons content unless permitted by applicable law and pre‑approved in writing.

3. Prohibited Conduct

  • Network Abuse – port scanning, denial‑of‑service (DoS), brute‑force attacks, or operating exit nodes for Tor or open proxies without approval.
  • Resource Draining – cryptocurrency mining, video transcoding farms, or similar ultra‑high CPU/GPU workloads without a dedicated “HF‑GPU” or “HF‑Compute” plan and written consent.
  • Unauthorized Access – attempts to breach or test the security of any system without permission.
  • Email Abuse – sending unsolicited bulk e‑mail, SMS, or messages in violation of the Anti‑Spam Policy.
  • Privacy Violations – collection or processing of personal data without a lawful basis and notice, or violation of applicable privacy laws (GDPR, CCPA, HIPAA, etc.).

4. Customer Security Obligations

  1. Keep operating systems, WordPress/n8n/Laravel stacks, and all third‑party libraries patched within 30 days of release (24 hours for critical CVEs rated 9.0+).
  2. Enable SSH key or strong, rotated passwords and disable default accounts.
  3. Configure firewalls and minimum‑necessary port exposure.
  4. Maintain encrypted off‑site backups of critical data.

5. Resource Limits

GTSite allocates bandwidth, CPU, and I/O according to plan tiers. Sustained usage exceeding 125 % of plan limits for more than 15 minutes, or triggering host‑level CPU steal > 20 %, may result in automatic throttling or suspension until upgraded.

6. Enforcement & Remediation

  • Notice. We strive to provide at least 24 hours’ notice and remediation guidance for first‑time AUP issues that do not present immediate risk.
  • Immediate action. We may suspend or disable Services without prior notice if your instance endangers network stability, other customers, or violates applicable law (e.g., CSAM, active DDoS, ransomware control servers).
  • Law enforcement. We cooperate with lawful requests, including preservation of evidence and CSAM reporting to NCMEC/CyberTipline.

7. Reporting Violations

If you become aware of abuse originating from the GTSite network, please e‑mail [email protected] with:
(i) source IP(s), (ii) timestamps (UTC), (iii) logs or evidence, and
(iv) nature of the violation. We reply within one business day.

8. Changes to AUP

We may modify this AUP at any time with 30 days’ notice. Continued use of the Services constitutes acceptance.

9. Contact

GTSite Compliance Team
E‑mail: [email protected]