P25
Packet25
AI ApertusPricingAboutContact

Acceptable Use Policy

Guidelines for acceptable use of Packet25 services.

The Acceptable Use Policy ("AUP") outlines the permitted and prohibited uses of Packet25's servers, hosting services, and related infrastructure. By using any service provided by Packet25, you acknowledge and agree to comply with all rules and restrictions described in this AUP.

The purpose of this AUP is to establish clear guidelines and to prevent behaviors that may harm Packet25, other customers, or the broader Internet community.

All Services must be used solely for lawful purposes. Under no circumstances is the Customer permitted to engage in any activity that is illegal under local, national, or international law while using Packet25's Services.

Sending Email

The Customer must not use the Services to send, transmit, or facilitate the sending of any unsolicited bulk or commercial email ("spam"). This prohibition includes, but is not limited to:

  • hosting or operating websites that are advertised via spam originating from any network,
  • using the Services to receive replies from unsolicited email campaigns,
  • configuring an email server in a manner that allows unauthorized third parties to relay email through it,
  • operating mailing lists without proper opt-in verification.

The Customer must not transmit, distribute, or store any data containing malicious code, including but not limited to viruses, Trojan horses, worms, time bombs, keyloggers, spyware, adware, or any other harmful software designed to damage or compromise computer systems, networks, or data.

Offensive Content

The Customer must not distribute, publish, store, or transmit any material that:

  • is harmful to minors in any form, including content that constitutes child sexual abuse material;
  • is offensive, hateful, inflammatory, or otherwise inappropriate;
  • promotes or encourages violence, illegal activities, or discrimination based on gender, religion, ethnicity, nationality, or any other protected characteristic;
  • promotes fraudulent behavior or is deceptive under the consumer protection laws of any applicable jurisdiction;
  • is threatening, abusive, defamatory, or invades the privacy of others;
  • creates a risk to a person's safety or health, poses a threat to public safety, endangers national security, or interferes with law-enforcement investigations;
  • promotes illegal drugs, or substances that may be legal but are commonly abused.

Software and Copyrighted Material

The Customer must not host, distribute, or make available any of the following:

  • copyrighted material of any kind without the explicit authorization of the copyright owner;
  • pirated, cracked, or otherwise unauthorized versions of commercial software;
  • copyrighted music, videos, or other media files shared without proper licensing;
  • IRC-related content or services, including IRC servers, clients, bots, or scripts;
  • any material used for phishing, identity theft, impersonation, or other fraudulent activities.

Online Abusive Behavior

The Customer must not engage in any form of abusive, hostile, or unauthorized behavior online, including but not limited to:

  • attempting to access or gaining access to systems, networks, or accounts without the explicit authorization of the respective administrator ("hacking");
  • interfering with, disrupting, or degrading the performance of any system, network, server, or host, including deliberate overloads, denial-of-service attacks, or any other form of online attack;
  • monitoring, intercepting, or capturing data or traffic on any network or system without prior authorization from the network's administrator;
  • using any computer, device, account, or system without the owner's permission, including activities such as password theft, vulnerability scanning, port scanning, or any other unauthorized probing of security defenses.

Mining

Cryptocurrency mining of any kind is strictly prohibited on all VPS, dedicated servers, and cloud-based services provided by Packet25.

Know Your Customer (KYC) Verification Policy

Most orders placed with Packet25 can be processed without requiring Know Your Customer (KYC) verification. However, for orders classified as high-risk, or when an order triggers internal fraud, spam, or abuse detection systems, Packet25 reserves the right to initiate KYC procedures.

The KYC process may include, but is not limited to:

  • phone number verification,
  • requesting additional information regarding the intended use of the Services,
  • verification of government-issued identification documents.

These measures are implemented to protect the integrity and security of our Services, our customers, and the broader online community. By using our Services, the Customer agrees to comply with any KYC requests when required. Failure to cooperate may result in delays, refusal of service, or cancellation of the order.

Enforcement

Packet25 reserves the right to suspend or terminate, without prior notice, any account or Service found to be in violation of this AUP. The Customer may be held financially liable for any loss or damage resulting from such violations.

Reporting Violations

If you believe that a violation of this AUP is occurring, please contact us immediately. We will review your report as soon as possible, investigate the matter, and take any appropriate action.

Changes to the Acceptable Use Policy

Packet25 reserves the right to modify or update this AUP at any time and without prior notice. Customers are encouraged to review this page periodically to stay informed of any changes.

Last updated: 20.11.2025

P25
Packet25

Professional server infrastructure in Switzerland for your critical projects.

Services

  • Bare Metal Servers
  • Custom Configuration
  • Hardware Upgrades
  • Network Infrastructure

Company

  • About
  • Pricing
  • FAQ
  • Blog
  • Contact

Legal

  • Terms of Service
  • Acceptable Use Policy
  • Privacy Policy
  • DSA & DMCA Policy
  • SLA

© 2025 Packet25 - All rights reserved.

All systems operational