Acceptable Use Policy
Effective Date: October 1, 2025
Last Updated: September 22, 2025
1. Overview and Purpose
This Acceptable Use Policy (“AUP”) governs use of Lagless.gg services, including multiplayer server hosting, VPS, web/app hosting, and related infrastructure. This AUP forms part of our Terms of Service and applies to all customers and their end users. Capitalized terms not defined here have the meanings given in our Terms of Service.
2. Community Standards and Responsible Use
- Use services lawfully and responsibly, respecting the rights and safety of others.
- Maintain the security and integrity of our shared infrastructure.
- Comply with applicable laws, regulations, and third‑party platform terms.
- Avoid content or conduct that promotes hatred, harassment, or discrimination.
- Promptly report abuse, security issues, or policy violations to support.
3. Prohibited Activities and Content
3.1 Illegal Content and Criminal Activity
- CSAM or exploitation of minors; trafficking; violent extremism or terrorism.
- Illegal drugs, weapons trafficking, fraud, identity theft, money laundering.
- Unauthorized access, hacking, credential harvesting, social engineering.
- Malware, ransomware, botnets, exploit kits, distribution of stolen data.
- Copyright/trademark infringement, DRM circumvention, or counterfeit goods.
3.2 Network and Infrastructure Abuse
- DDoS, amplification/reflection, stress testing third parties without consent.
- Unauthorized scanning, probing, or exploitation; zero‑day distribution.
- IP spoofing, traffic interception, BGP manipulation, route hijacking.
- Excessive bandwidth usage that materially impacts other customers.
- Unauthorized monitoring or packet capture of third‑party traffic.
3.3 Communication and Spam Abuse
- Unsolicited bulk messages (email/SMS/social), phishing, spoofing, impersonation.
- Harvesting addresses, mail relay abuse, deceptive or manipulative campaigns.
- Automated posting or engagement manipulation across platforms.
3.4 Resource Abuse and Service Exploitation
- Cryptocurrency mining on shared infrastructure; GPU/ASIC mining on prohibited tiers.
- Resource‑intensive processes intended to exhaust CPU, memory, I/O, or bandwidth.
- Multiple accounts to evade limits; unauthorized resale or sub‑leasing of services.
- Circumventing usage quotas, rate limits, or security/access controls.
3.5 VPS‑Specific Restrictions
- Open/anonymous proxies, TOR exit nodes, or unlawful VPN services.
- Illegal file sharing (BitTorrent/P2P) or operation of darknet marketplaces.
- Unlicensed gambling, sexually explicit content that violates law or platform rules.
- Root access responsibility: security patching, monitoring, and compliance remain the Customer's responsibility.
3.6 Game/Server Hosting Content Guidelines
- Hate symbols/speech; harassment; doxxing; stalking; targeted abuse.
- Content glorifying real‑world violence or promoting harmful activities.
- Terms‑violating cheats, exploits, or unauthorized modifications.
- Proxies: You may not use our infrastructure to proxy or route traffic to external providers. Velocity proxies are permitted only within the Lagless/Elcro ecosystem.
3.7 Artificial Intelligence and Automated Content
- Violations of applicable AI regulations or platform terms (e.g., EU AI Act obligations).
- Training on copyrighted material without rights; deceptive deepfakes/synthetic media.
- Automated decisions impacting individuals without required transparency or consent.
4. Content Oversight and Monitoring
- No continuous proactive monitoring; we investigate based on reports or legal requests.
- Limited automated detection may flag potential violations for human review.
- We follow DMCA procedures for copyright claims and applicable legal processes.
5. Enforcement Framework and Penalties
- Minor: Warning and reasonable time to remediate.
- Moderate: Feature/account limitations, temporary suspension, added verification.
- Severe: Immediate suspension/termination, data deletion, and potential legal referral.
No refunds for terminations due to AUP violations.
6. Resource Usage and Fair Use
- Usage should be proportional to the plan tier and not degrade others' performance.
- High‑bandwidth/CPU tasks should be optimized or scheduled during low‑usage periods.
- Excessive or abusive consumption may result in limits, throttling, or suspension.
7. Database Usage Policy
Primary Use Requirement
Database resources must primarily support applications, games, or services hosted with Lagless. They are not intended as a general purpose external database service.
Prohibited External Database Usage
- Hosting databases for services primarily hosted elsewhere.
- Providing database services to third parties as a resale or standalone offering.
- Using databases as primary storage for apps on competing platforms.
- Primarily backing up external services into our database resources.
Monitoring & Enforcement
- We may monitor usage patterns and connections to detect policy violations.
- Violations may lead to suspension, data removal, and account review without refund.
8. Third‑Party Integration and API Usage
- Comply with third‑party terms, licensing, and rate limits.
- Automation must include throttling, retries, and robust error handling.
- Integrations must not compromise security, privacy, or platform stability.
9. Reporting and Investigation
- Report abuse/security: [email protected] (subject: “AUP Violation Report”).
- DMCA: [email protected]. Legal: [email protected].
- Include description, evidence, affected services/IPs/domains, and timelines.
- We acknowledge within 24 hours and may contact impacted customers for response.
10. Legal and Regulatory Compliance
- Comply with applicable laws where you operate and where services are provided.
- Export/sanctions: comply with EAR, OFAC, and other trade restrictions.
- Respect industry regulations where applicable (e.g., PCI DSS, HIPAA, FERPA).
- International privacy obligations (e.g., GDPR/CCPA) may apply to your usage.
11. Updates to this AUP
We may update this AUP to address new threats, legal changes, or operational needs. Material changes that affect your obligations will be communicated with advance notice when practicable. Continued use constitutes acceptance of updates.
12. Customer Responsibilities
- Maintain secure configurations, access controls, and timely patching for your services.
- Ensure your users comply with this AUP; you are responsible for their actions.
- Promptly remediate vulnerabilities, misconfigurations, or abuse originating from your services.
- Operate only licensed software and respect third‑party IP rights and platform rules.
- Back up critical data and verify restore processes appropriate to your business needs.
13. Abuse of Services and Support
- Abusive, harassing, or threatening behavior toward staff or users is prohibited.
- Excessive, frivolous, or bad‑faith support requests may be rate‑limited or refused.
- Automated account creation, referral fraud, or affiliate abuse is prohibited.
- False or bad‑faith abuse reports may result in account actions.
14. Email, Messaging, and Network Policy
- Bulk email requires opt‑in, functional unsubscribe, and compliance with anti‑spam laws (e.g., CAN‑SPAM).
- Open relays, open resolvers, or misconfigured services that enable abuse are prohibited.
- DNS, domain, or certificate impersonation or manipulation is prohibited.
- Port scanning is allowed only within your own assets with explicit authorization.
- Running public mail infrastructure may require prior approval and additional controls.
15. Security Research and Disclosure
- Good‑faith security research on your own assets is permitted if it does not impact others.
- Do not access data you do not own, degrade services, or violate laws during research.
- Report vulnerabilities to [email protected] with sufficient details to reproduce.
- We may offer coordinated disclosure timelines; exploitation is strictly prohibited.
16. Sanctions, Export, and Restricted Uses
- Do not use services in, by, or for sanctioned countries, persons, or entities (e.g., OFAC lists).
- Comply with export controls (e.g., EAR) for software, encryption, and technical data.
- No use for development, design, or production of prohibited weapons or surveillance of protected classes.
17. Data Preservation and Law Enforcement
- We may preserve data and cooperate with law enforcement upon receipt of valid legal process.
- In emergencies involving imminent harm, we may act swiftly to restrict content or access.
- We may suspend or remove content to mitigate ongoing harm or legal risk.
18. Financial Data and High‑Risk Activities
- Processing payment cards requires PCI DSS compliance; storing raw PANs is prohibited.
- High‑risk financial services (e.g., unlicensed money services, HYIP schemes) are prohibited.
- Do not represent our services as emergency services or mission‑critical life support systems.
19. Indemnification and Liability Reminder
Your obligations under this AUP are in addition to the Terms of Service, including any indemnification and limitation of liability provisions therein. Violations may result in charges, suspension, termination, or legal action.
20. Precedence; Severability; Survival
- If this AUP conflicts with the Terms of Service, the Terms of Service control.
- If any provision is unenforceable, the remainder remains in effect to the maximum extent permitted.
- Sections concerning enforcement, cooperation, liability, and compliance survive termination.
21. Contact
- Abuse/Security: [email protected] (subject: “AUP Violation Report”)
- DMCA: [email protected]
- Legal/Compliance: [email protected]
- Security Reports: [email protected]
Note: Lagless is a subsidiary of Elcro Digital Services, LLC. This acceptable use policy will apply to all services provided by Elcro Digital Services, LLC and its subsidiaries.