This AUP defines prohibited uses of GVO Servers infrastructure and the consequences of violations.
Section 1
Overview
This Acceptable Use Policy ("AUP") governs all use of GVO Servers infrastructure and services. It is designed to protect our customers, the integrity of our network, and the broader internet community. This AUP is incorporated by reference into our Terms of Service.
By using any GVO Servers service, you agree to comply with this AUP. Violations may result in immediate service suspension, termination without refund, and/or referral to law enforcement authorities.
Violations of this AUP may result in immediate termination without notice or refund, and may be reported to appropriate authorities.
Section 2
Prohibited Activities
The following activities are strictly prohibited on GVO Servers infrastructure:
2.1 Network Attacks
- Launching or facilitating DDoS (Distributed Denial of Service) attacks against any target
- Port scanning, network probing, or vulnerability scanning of systems you do not own
- IP spoofing, ARP poisoning, or other network-layer attacks
- Man-in-the-middle attacks or traffic interception
2.2 Malicious Software
- Hosting, distributing, or operating malware, ransomware, spyware, or botnets
- Operating command-and-control (C2) infrastructure for malicious purposes
- Phishing websites, credential harvesting pages, or fraudulent storefronts
2.3 Spam & Unsolicited Communications
- Sending unsolicited bulk email (spam) or operating open mail relays
- Harvesting email addresses without consent
- Sending SMS spam or operating robocall infrastructure
2.4 Illegal Content
- Hosting child sexual abuse material (CSAM) — reported immediately to NCMEC and law enforcement
- Content that infringes intellectual property rights (see DMCA policy)
- Facilitating illegal gambling, drug trafficking, or weapons sales
- Any activity that violates applicable law in your jurisdiction or ours
2.5 Resource Abuse
- Cryptocurrency mining that significantly degrades shared infrastructure (applies to hosting plans only)
- Intentional bandwidth overuse in violation of your plan limits
Section 3
Network Policies
All traffic originating from GVO Servers IP space must comply with BCP38 (network ingress filtering). IP spoofing is technically blocked at the network level and constitutes a material breach of this AUP.
Customers requiring BGP sessions or custom routing must obtain prior written approval from our network team. Unauthorized BGP announcements may result in immediate null-routing of the customer's IP allocation.
Port 25 (SMTP) is blocked by default on all accounts. Legitimate bulk mail senders must apply for an SMTP unblock, subject to approval and compliance with our mail policy.
Section 4
Content Standards
While GVO Servers does not actively monitor customer content, we require that all hosted content comply with applicable laws. We operate a notice-and-takedown process for reported violations:
- DMCA copyright notices: abuse@gvoservers.com
- Malware/phishing reports: abuse@gvoservers.com
- CSAM reports: immediately forwarded to NCMEC
We aim to act on valid abuse reports within 24 hours for critical violations and within 72 hours for less urgent matters.
Section 5
Enforcement
GVO Servers reserves the right to take any of the following actions in response to AUP violations, at our sole discretion:
- Issue a warning and require remediation within a specified timeframe
- Temporarily suspend specific services or ports while investigation is ongoing
- Null-route specific IP addresses generating abusive traffic
- Suspend the entire account pending investigation
- Permanently terminate the account without refund
- Report the activity to law enforcement or affected third parties
For minor or first-time violations, we will generally attempt to notify the customer and allow time to remediate before taking service action, except where the violation poses immediate harm to others.
Section 6
Reporting Violations
To report abuse originating from GVO Servers IP addresses, please email abuse@gvoservers.com with:
- Your name and contact information
- The source IP address(es) involved
- Date and time of the incident (with timezone)
- Relevant log excerpts or evidence
- Description of the impact
We take all abuse reports seriously and will respond within 24 hours for critical reports.