1. Introduction
This Acceptable Use Policy (“AUP”) defines the permitted and prohibited uses of all services provided by RDPCORE DC LTD (“RDPCore”, “we”, “us”). This policy applies to all customers, resellers, and any third party using RDPCore infrastructure, whether directly or indirectly.
This AUP is incorporated into and forms part of our General Terms and Conditions. By using our services, you agree to comply with this policy. Violation of this AUP may result in suspension or termination of services without refund, as outlined in our Terms.
We reserve the right to update this AUP at any time. Material changes will be communicated at least thirty (30) days in advance. Your continued use of our services after such changes constitutes acceptance.
2. Prohibited Activities
The following activities are strictly prohibited on all RDPCore services. This list is not exhaustive; any activity that is illegal under applicable law or that threatens the integrity of our network and infrastructure is prohibited regardless of whether it is explicitly listed here.
2.1 Illegal Content and Activities
- Hosting, storing, distributing, or linking to child sexual abuse material (CSAM) in any form. This results in immediate termination and reporting to law enforcement without exception.
- Hosting content that promotes terrorism, incites violence, or constitutes hate speech as defined under UK law (Terrorism Act 2006, Public Order Act 1986).
- Operating or facilitating fraud, identity theft, phishing, or financial scams.
- Hosting or distributing pirated software, media, or other copyrighted material without authorisation.
- Operating illegal gambling services without appropriate licences.
- Facilitating the sale or distribution of controlled substances, weapons, or other prohibited goods.
- Any activity that violates applicable law in the United Kingdom, the European Union, or the jurisdiction in which you or your end users reside.
2.2 Network Abuse
- Conducting or participating in Distributed Denial of Service (DDoS) attacks, whether originating from or targeting our infrastructure.
- Port scanning, network probing, or vulnerability scanning of systems you do not own or have explicit written authorisation to test.
- Brute-force attacks against any system, including but not limited to SSH, FTP, SMTP, and web application login pages.
- IP address spoofing or forging packet headers.
- Operating open resolvers, open proxies, or open relays that can be exploited for amplification attacks or abuse.
- Intercepting, monitoring, or capturing network traffic not intended for your services (packet sniffing).
- Intentionally disrupting or degrading the performance of our network or other customers’ services.
Legitimate security research or penetration testing of your own services is permitted only with prior written authorisation from RDPCore. Requests should be submitted to support@rdpcore.com at least five (5) business days in advance, specifying the scope, timeframe, and methods to be used.
2.3 Email and Messaging Abuse
- Sending unsolicited bulk email (spam) or unsolicited commercial email (UCE) in any volume, including but not limited to emails sent to purchased lists, scraped data, or third-party marketing databases.
- Operating mailing lists without proper confirmed opt-in (double opt-in) consent from all recipients.
- Forging email headers, sender addresses, or using deceptive subject lines.
- Sending emails that violate the UK Privacy and Electronic Communications Regulations 2003 (PECR), the EU ePrivacy Directive, or the US CAN-SPAM Act.
- Harvesting email addresses from websites, directories, or other sources without consent.
- Operating services primarily designed to facilitate the sending of spam by third parties.
2.4 Malicious Software and Security Threats
- Hosting, developing, distributing, or controlling malware, viruses, trojans, ransomware, spyware, adware, rootkits, keyloggers, or any other malicious software.
- Operating command-and-control (C2) infrastructure for botnets or malware campaigns.
- Hosting phishing pages, credential harvesting sites, or social engineering attack infrastructure.
- Distributing exploit kits or tools designed primarily for unauthorised access to systems.
- Intentionally introducing vulnerabilities into systems or software hosted on our infrastructure.
2.5 Resource Abuse
- Mining, farming, or plotting cryptocurrency on shared hosting plans or VPS plans not explicitly designated for high-compute workloads. Cryptocurrency-related workloads are only permitted on dedicated plans where explicitly stated in the service description.
- Running processes that consume excessive CPU, memory, disk I/O, or network bandwidth in a manner that degrades service quality for other customers on shared infrastructure.
- Using services for purposes materially different from their intended use (e.g., using web hosting as a file storage or backup service beyond reasonable limits).
- Circumventing resource limits, quotas, or fair-use policies through technical means.
2.6 Intellectual Property Infringement
- Hosting, distributing, or facilitating access to content that infringes copyrights, trademarks, patents, trade secrets, or other intellectual property rights of third parties.
- Operating torrent trackers, indexing sites, or link farms that primarily facilitate access to infringing content.
- Ignoring or failing to respond to valid DMCA takedown notices or equivalent UK/EU copyright infringement notifications.
2.7 Deceptive Practices
- Impersonating any person, business, or entity, including RDPCore staff.
- Registering accounts with false, misleading, or stolen identity information.
- Using our services to conduct or facilitate click fraud, ad fraud, or manipulation of online metrics.
- Operating services designed to circumvent geographic restrictions, sanctions, or access controls in violation of applicable law.
3. Responsible Use Requirements
In addition to avoiding prohibited activities, you are expected to use our services responsibly:
3.1 Security
- You are responsible for securing your services, including keeping software up to date, using strong passwords, and implementing appropriate access controls.
- You must take reasonable steps to prevent your services from being compromised and used for malicious purposes.
- If your service is compromised, you must take immediate action to remediate the issue upon notification. Failure to do so may result in suspension.
3.2 Content Responsibility
- You are solely responsible for all content hosted on or transmitted through your services, including content posted by your own users or customers.
- If you provide hosting services to third parties (reselling), you are responsible for ensuring your customers also comply with this AUP.
- You must maintain a valid abuse contact (email) and respond to abuse reports forwarded by RDPCore within twenty-four (24) hours unless a different timeframe is specified in the report.
3.3 Network Etiquette
- Configure appropriate reverse DNS (rDNS) records for IP addresses used for email sending.
- Implement SPF, DKIM, and DMARC records for domains used to send email.
- Do not operate services that generate excessive DNS queries, SNMP traffic, or other protocol-level noise that affects shared infrastructure.
3.4 Colocation-Specific Requirements
- Equipment placed in our facility must comply with applicable electrical safety standards and must not pose a risk to other equipment, the facility, or personnel.
- You must not exceed your allocated power draw without prior arrangement.
- Equipment must not generate excessive noise (above 65dB at 1 metre) or heat beyond what the allocated cooling capacity can handle.
- You must label all equipment and cabling clearly for identification purposes.
4. Enforcement
4.1 Investigation
We reserve the right to investigate any suspected violation of this AUP. Investigation may include reviewing server logs, traffic patterns, and content hosted on your services to the extent necessary to determine whether a violation has occurred. We will conduct investigations in accordance with applicable law and our Privacy Policy.
We may retain relevant logs and evidence for the purpose of investigating violations, supporting enforcement actions, and complying with legal obligations.
4.2 Actions We May Take
If we determine that a violation of this AUP has occurred, we may take one or more of the following actions at our sole discretion. We will take enforcement actions on a reasonable and proportionate basis, taking into account the severity, context, and recurrence of the violation:
- Warning: Issue a written warning requiring you to cease the prohibited activity and take corrective action within a specified timeframe (typically 24–48 hours).
- Content removal: Remove or disable access to specific content that violates this AUP.
- Service suspension: Temporarily suspend the affected service(s) until the violation is resolved.
- IP null-routing: Null-route specific IP addresses associated with the violation to protect network integrity.
- Account suspension: Suspend your entire account if violations are severe or repeated.
- Termination: Permanently terminate your account and all associated services without refund.
- Reporting: Report the activity to relevant law enforcement authorities, regulatory bodies, or industry abuse databases (such as Spamhaus, RIPE NCC abuse contacts, or NCMEC for CSAM).
4.3 Immediate Action
For the following categories of violation, we reserve the right to take immediate action (including suspension or termination) without prior notice:
- Child sexual abuse material (CSAM) — immediate termination and law enforcement referral;
- Active DDoS attacks originating from your services;
- Distribution of malware or operation of botnet C2 infrastructure;
- Activities that pose an immediate threat to network stability or other customers;
- Activities required to be stopped by law enforcement or court order;
- Fraud or use of stolen payment credentials.
4.4 Repeat Violations
Repeated violations of this AUP, even if individually minor, may result in escalated enforcement action up to and including permanent account termination. We maintain internal records of AUP violations associated with each account.
5. Reporting Abuse
If you become aware of any activity on our network that violates this AUP, please report it to us:
- Email: abuse@rdpcore.com
- Subject line: Please include the IP address(es) involved and a brief description of the issue.
We take all abuse reports seriously and aim to acknowledge receipt within twenty-four (24) hours. Please include as much detail as possible, including timestamps (with timezone), IP addresses, log excerpts, and any other evidence that will help us investigate the report efficiently.
For copyright infringement reports, please refer to our Copyright / DMCA Policy for the specific information required.
6. EU Digital Services Act Compliance
In accordance with the EU Digital Services Act (Regulation (EU) 2022/2065), we maintain a notice-and-action mechanism for reports of illegal content hosted on our infrastructure. If you believe content hosted on our services is illegal under EU law, you may submit a notice to abuse@rdpcore.com containing:
- A sufficiently substantiated explanation of why you consider the content to be illegal;
- A clear indication of the exact electronic location of the content (URL or IP address);
- Your name and email address (unless reporting content relating to criminal offences);
- A statement confirming your good-faith belief that the information provided is accurate and complete.
We will process such notices in a timely, diligent, and non-arbitrary manner, and will inform the reporter and the content provider of our decision and the reasons for it.
7. No General Monitoring Obligation
In accordance with Article 8 of the EU Digital Services Act and applicable UK law, we do not have a general obligation to monitor the content stored on or transmitted through our services, nor a general obligation to actively seek facts or circumstances indicating illegal activity. However, we will act promptly upon obtaining actual knowledge of illegal content through reports or our own detection mechanisms.
8. Reseller and Third-Party Responsibility
If you resell or provide access to our services to third parties (including your own customers), you are fully responsible for ensuring that those third parties comply with this AUP. You must:
- Communicate the requirements of this AUP to your customers;
- Maintain your own acceptable use policy that is at least as restrictive as this AUP;
- Respond promptly to abuse reports forwarded to you by RDPCore;
- Take appropriate action against your customers who violate this AUP.
Failure to manage your customers’ compliance may result in enforcement action against your account.
9. Policy Modifications
We reserve the right to modify this AUP at any time. Material changes will be communicated via email or through a notice on our website at least thirty (30) days before they take effect. Non-material clarifications or additions may be made without prior notice.
If you disagree with any changes to this AUP, your sole remedy is to discontinue use of our services before the changes take effect.
10. Contact
For questions about this Acceptable Use Policy or to report a violation:
- Abuse Reports: abuse@rdpcore.com
- General Enquiries: support@rdpcore.com
- Legal: legal@rdpcore.com