Acceptable Use Policy
This policy outlines the acceptable use of GivBest Consulting's services and systems to ensure security, reliability, and legal compliance.
Purpose
This Acceptable Use Policy ("AUP") governs the use of services provided by GivBest Consulting. This policy is designed to protect GivBest, our customers, and the general Internet community from irresponsible or illegal activities.
Prohibited Activities
You may NOT use our services to:
1. Illegal Activities
- Violate any local, state, national, or international law
- Transmit, distribute, or store material in violation of copyright, trademark, trade secret, or other intellectual property laws
- Engage in fraudulent activity of any kind
- Distribute child sexual abuse material or content that exploits minors
- Promote or facilitate illegal gambling, terrorism, or human trafficking
2. Network Abuse
- Launch denial-of-service (DoS) or distributed denial-of-service (DDoS) attacks
- Attempt to gain unauthorized access to systems, networks, or data (hacking)
- Port scanning, network probing, or vulnerability scanning without explicit authorization
- Packet sniffing, ARP poisoning, or man-in-the-middle attacks
- Circumvent user authentication or security mechanisms
- Interfere with service to any user, host, or network
3. Spam and Unsolicited Communications
- Send unsolicited bulk email (spam) or commercial messages
- Operate email lists without proper unsubscribe mechanisms
- Forge email headers or sender information
- Use purchased or harvested email lists
- Engage in phishing or social engineering attacks
4. Malicious Software
- Distribute viruses, worms, Trojans, ransomware, or any malicious code
- Host or distribute malware, spyware, or adware
- Operate command-and-control infrastructure for botnets
- Mine cryptocurrency without authorization (cryptojacking)
5. Content Violations
- Host or distribute defamatory, obscene, or offensive content
- Publish hate speech, violent threats, or content that incites violence
- Share private information without consent (doxxing)
- Engage in harassment, bullying, or stalking
6. Resource Abuse
- Consume excessive bandwidth, CPU, memory, or storage resources
- Run processes that negatively impact shared infrastructure
- Use automated systems (bots, scrapers) to access services excessively
- Resell services without authorization
Acceptable Use Examples
You MAY use our services for:
- Hosting legitimate business websites and applications
- Sending transactional emails (receipts, order confirmations, password resets)
- Storing and processing customer data in compliance with privacy laws
- Conducting authorized security testing with proper scoping
- Running analytics and performance monitoring
- Opt-in marketing communications with proper unsubscribe options
Enforcement
Violation Consequences:
Violations of this AUP may result in:
- Warning notice and request for immediate remediation
- Temporary suspension of services
- Permanent termination of account without refund
- Legal action and cooperation with law enforcement
- Financial liability for damages caused
Reporting Violations
If you become aware of any violation of this AUP, please report it immediately to:
Email: support@givbest.com
Subject Line: "AUP Violation Report"
Include: Description of violation, URLs/IPs involved, evidence (screenshots, logs)
Contact Us
Questions about this policy? Contact us at support@givbest.com
2026 GivBest Consulting. All rights reserved.
Back to Home