Purpose
This Acceptable Use Policy ("AUP") establishes standards for the use of 37SOLUTIONS services and hosted infrastructure. It applies to all clients, users, and any parties accessing services provided or managed by 37SOLUTIONS, whether directly or through a client's hosted environment.
Compliance with this AUP is a condition of using our services. Violations may result in immediate suspension or termination of services.
Prohibited Activities
Illegal Content and Activities
You may not use our services to host, distribute, transmit, or facilitate:
- Content that violates any applicable local, state, national, or international law or regulation
- Child sexual abuse material (CSAM) or any content that sexualizes minors — this is grounds for immediate termination and will be reported to appropriate authorities
- Content that infringes on the intellectual property rights of others, including copyrights, trademarks, patents, or trade secrets
- Fraudulent schemes, phishing operations, or identity theft
- Controlled substances, weapons, or other regulated goods where distribution or sale is illegal
Network and Infrastructure Abuse
You may not use our services to:
- Launch or facilitate distributed denial of service (DDoS) or other network attacks
- Conduct port scanning, vulnerability scanning, or penetration testing of systems without explicit written authorization from the system owner
- Intercept or monitor network traffic without authorization
- Introduce malware, viruses, ransomware, spyware, or other malicious code
- Gain or attempt to gain unauthorized access to any system, network, or account
- Use shared infrastructure resources in a manner that unreasonably degrades service for other users (resource abuse)
- Operate open proxies or anonymization services that facilitate abuse
- Mine cryptocurrency or perform similar compute-intensive operations without explicit written authorization
Email and Messaging Abuse
You may not use our services to:
- Send unsolicited bulk email (spam) or unsolicited commercial email in violation of applicable anti-spam laws (CAN-SPAM, CASL, GDPR, etc.)
- Harvest email addresses or other contact information for the purpose of sending unsolicited communications
- Forge email headers or otherwise misrepresent the sender of email messages
- Operate an open email relay
- Send messages containing threats, harassment, or hate speech
Content Standards
Content hosted on 37SOLUTIONS-managed infrastructure must not:
- Constitute harassment, bullying, or threats against any individual or group
- Promote violence or hate based on race, ethnicity, religion, national origin, gender, sexual orientation, disability, or other protected characteristics
- Contain non-consensual intimate imagery ("revenge porn")
- Defame, libel, or slander any person or organization
Security Responsibilities
Clients are responsible for maintaining the security of their own applications, credentials, and data. This includes:
- Keeping application software (WordPress core, plugins, themes, frameworks) updated
- Using strong, unique credentials for all accounts
- Not sharing credentials with unauthorized parties
- Promptly patching known vulnerabilities
- Reporting any suspected security incidents to 37SOLUTIONS immediately
When a client's site or application is compromised and is actively used to attack other systems, send spam, or harm third parties, 37SOLUTIONS reserves the right to suspend or isolate the affected service without prior notice.
Resource Usage
Clients must use hosting resources — CPU, memory, storage, and bandwidth — within the bounds of their service plan and in a manner consistent with normal operation of their stated use case. Uses that consume disproportionate resources or interfere with the performance of other hosted services are prohibited.
Examples of prohibited resource abuse include: cryptocurrency mining, running bots or scrapers that generate sustained high CPU load, storing large volumes of non-website files (backups, media archives) without a specific storage plan, and hosting torrent trackers or peer-to-peer distribution servers.
Reporting Violations
To report a suspected violation of this AUP — including abuse originating from 37SOLUTIONS-managed infrastructure — please contact us immediately at sales@37solutions.comwith the subject line "AUP Violation Report". Please include as much detail as possible, including IP addresses, timestamps, and a description of the activity.
We take abuse reports seriously and investigate all credible reports promptly.
Enforcement
Violations of this AUP may result in, at our sole discretion:
- A warning and request to remedy the violation
- Temporary suspension of the offending service
- Permanent termination of services without refund
- Reporting to law enforcement or relevant authorities where required by law or where the activity constitutes a criminal offense
We will generally attempt to notify clients and provide an opportunity to remedy non-emergency violations before taking action. However, where the violation poses an immediate risk to our infrastructure, other clients, or third parties, we reserve the right to act without prior notice.
Changes to This Policy
We may update this Acceptable Use Policy at any time. Material changes will be communicated to active clients via email. Continued use of services after the effective date of changes constitutes acceptance of the updated AUP.
Contact
- Email: sales@37solutions.com
- Web: 37solutions.com/contact