Acceptable Use Policy

Rules and guidelines for using our hosting, cloud, and managed IT infrastructure services.

Last Updated: January 2026

1. Introduction

This Acceptable Use Policy ("AUP") governs the use of hosting services, cloud infrastructure, managed IT services, and related services ("Services") provided by Max-Tech I.T Solutions ("Service Provider," "we," "our," or "us") to clients ("Client," "you," or "your").

By using our Services, you agree to comply with this AUP. Violation of this policy may result in immediate suspension or termination of Services without notice or refund.

This AUP is incorporated by reference into your Service Agreement and Terms of Service. We reserve the right to modify this AUP at any time, with changes effective upon posting to our website.

2. Prohibited Activities

The following activities are strictly prohibited:

2.1 Illegal Activities

  • Any activity that violates local, state, national, or international laws
  • Distribution of illegal content, including pirated software, media, or materials
  • Facilitation of illegal activities or transactions
  • Violation of export control laws or regulations
  • Money laundering or financial fraud

2.2 Harmful or Malicious Content

  • Distribution of malware, viruses, trojans, or other malicious code
  • Phishing, spoofing, or social engineering attacks
  • Spam, unsolicited bulk email, or unsolicited commercial communications
  • Content that promotes violence, hate speech, or discrimination
  • Harassment, stalking, or threats against individuals or groups

2.3 Intellectual Property Violations

  • Infringement of copyrights, trademarks, patents, or trade secrets
  • Unauthorized distribution of copyrighted material
  • Reverse engineering or decompiling proprietary software
  • Use of content without proper authorization or licensing

2.4 System Abuse & Resource Misuse

  • Attempts to gain unauthorized access to systems, networks, or accounts
  • Denial of Service (DoS) attacks or Distributed Denial of Service (DDoS) attacks
  • Excessive resource consumption that impacts other clients
  • Running resource-intensive applications without authorization
  • Circumventing security measures or access controls
  • Scanning or probing networks without authorization

2.5 Prohibited Content

  • Adult content, pornography, or sexually explicit material (unless explicitly permitted)
  • Content promoting illegal drugs, weapons, or regulated substances
  • Gambling or online gaming (unless legally authorized)
  • Pyramid schemes or multi-level marketing scams
  • Content that violates privacy rights or contains personal information without consent

3. Email & Communication Policies

3.1 Spam & Bulk Email

Prohibited email practices include:

  • Sending unsolicited bulk email (spam)
  • Using harvested or purchased email lists
  • Falsifying email headers or sender information
  • Operating open mail relays or proxies
  • Sending emails to recipients who have opted out

3.2 Legitimate Email Marketing

Legitimate email marketing must comply with:

  • CAN-SPAM Act (if applicable) and local anti-spam laws
  • Opt-in consent from recipients
  • Clear unsubscribe mechanisms
  • Accurate sender identification
  • Reasonable sending limits (as defined by your service plan)

4. Resource Usage & Fair Use

4.1 Resource Limits

Resource usage must comply with your service plan limits:

  • CPU usage, memory, and processing power
  • Storage space and bandwidth
  • Database connections and queries
  • Concurrent processes and connections

4.2 Fair Use

Services are provided for normal business operations. Prohibited practices include:

  • Excessive resource consumption that impacts other clients
  • Running cryptocurrency mining or similar resource-intensive operations
  • Hosting file-sharing or peer-to-peer services
  • Operating public proxies or VPN services
  • Running automated scripts that consume excessive resources

4.3 Resource Monitoring

We monitor resource usage and may:

  • Notify you of excessive usage
  • Request optimization or upgrade to a higher plan
  • Temporarily throttle or suspend services if usage threatens system stability
  • Charge for overage usage as specified in your service plan

5. Security Requirements

5.1 Account Security

Clients are responsible for:

  • Maintaining strong, unique passwords
  • Enabling two-factor authentication when available
  • Protecting account credentials and access keys
  • Promptly reporting suspected security breaches
  • Keeping software and applications updated and patched

5.2 Application Security

Applications hosted on our infrastructure must:

  • Follow security best practices and coding standards
  • Be protected against common vulnerabilities (SQL injection, XSS, etc.)
  • Use secure communication protocols (HTTPS, TLS)
  • Implement proper access controls and authentication
  • Not expose sensitive system information or credentials

5.3 Data Protection

Clients must:

  • Comply with applicable data protection laws (GDPR, etc.)
  • Implement appropriate data encryption
  • Maintain regular backups of critical data
  • Protect personal information and sensitive data
  • Notify us immediately of data breaches

6. Backup & Data Responsibility

While we may provide backup services, clients are responsible for:

  • Maintaining their own backups of critical data
  • Verifying backup integrity and restoration procedures
  • Understanding backup retention policies and schedules
  • Testing backup restoration processes regularly
  • Ensuring compliance with data retention requirements

We are not responsible for data loss resulting from client actions, application errors, or circumstances beyond our control.

7. Compliance & Legal Requirements

7.1 Applicable Laws

Clients must comply with all applicable laws and regulations, including:

  • Data protection and privacy laws (GDPR, CCPA, etc.)
  • Intellectual property laws
  • Export control and trade regulations
  • Industry-specific regulations (HIPAA, PCI-DSS, etc.)
  • Anti-spam and communication laws

7.2 Content Responsibility

Clients are solely responsible for:

  • All content hosted on our infrastructure
  • Ensuring content complies with applicable laws
  • Obtaining necessary licenses and permissions
  • Responding to legal requests and takedown notices

8. Monitoring & Enforcement

8.1 Monitoring Rights

We reserve the right to:

  • Monitor network traffic and system usage for security and performance
  • Investigate suspected violations of this AUP
  • Review content and activities to ensure compliance
  • Cooperate with law enforcement and legal authorities

8.2 Enforcement Actions

Violations of this AUP may result in:

  • Immediate suspension of Services
  • Termination of Services without refund
  • Removal of offending content
  • Legal action and reporting to authorities
  • Charges for damages and recovery costs

8.3 Notification

We will attempt to notify clients before taking enforcement action, except:

  • In cases of immediate security threats
  • When required by law enforcement
  • For severe or repeated violations
  • When notification would compromise security

9. Third-Party Services & Content

Clients using third-party services or content must:

  • Ensure third-party services comply with this AUP
  • Obtain proper licenses and authorizations
  • Be responsible for third-party content hosted on their account
  • Comply with third-party terms of service

We are not responsible for third-party services, content, or their compliance with this AUP.

10. Reporting Violations

To report violations of this AUP, please contact us:

  • Email: abuse@mtechitng.net
  • Include detailed information about the violation
  • Provide evidence or documentation when available
  • We will investigate and respond within 48 hours

11. Contact Information

For questions about this Acceptable Use Policy, please contact:

+234 903 050 5693

18, Oba Yekini Elegushi Rd, Ikate - Elegushi, Lagos, Nigeria