Acceptable Use Policy (AUP)
This policy sets out what you can and cannot do when using eWeball Web Hosting services. It is designed to protect our network, our customers, and the wider internet community.
1. Purpose and Scope
1.1 This Acceptable Use Policy (“AUP”) applies to all use of the Website and Services provided by eWeball Web Hosting (trading name of TROL LTD, “we”, “us”, “our”).
1.2 The AUP forms part of the Terms and Conditions and is designed to protect our network, customers, and the wider internet community. Capitalised terms have the meaning in the Terms.
2. Your Responsibilities
2.1 You must use the Services lawfully and responsibly. You are responsible for the content you host, store, transmit, or make available, including end-user activity on your accounts, domains, and servers.
2.2 You must implement reasonable security measures (e.g., strong passwords, timely patching, principle of least privilege).
3. Resource Usage (Shared Hosting)
This section applies to Shared Hosting plans. If you have a VPS or dedicated environment, separate limits and rules may apply.
3.1 Purpose of Shared Hosting
Shared Hosting provides web space and related resources to enable you to upload pages, files, databases, and applications for the purpose of publishing and operating websites.
3.2 Fair usage and “unlimited” storage
Where a plan is described as “unlimited”, it is intended for normal, routine website use and is not designed for large-scale file distribution, archiving, or general storage.
3.3 Bandwidth limits for file distribution
If your website allows downloading or distribution of video, audio, software, archives, or other large files, we reserve the right to apply a bandwidth cap of 250GB per calendar month for file-distribution activity. Normal non-file-distribution web usage will not be affected by any such cap.
3.4 Prohibited high-resource or platform-abusive activities
On Shared Hosting, you must not:
- Use an unreasonable or excessive amount of CPU, memory, disk I/O, or other system resources, including sustained usage that materially degrades the platform (as a guide, you must not consistently exceed 10% of shared platform processing capacity).
- Run standalone, unattended, continuous server-side processes or daemons (including IRCd).
- Run any type of web spider, indexer, or mass-crawling tool that places excessive load on the platform.
- Run software that interfaces with an Internet Relay Chat (IRC) network.
- Run BitTorrent applications, trackers, or clients (you may link to legal torrents off-site, but you may not host or store them on our servers).
- Participate in file-sharing/peer-to-peer activity from our platform.
- Run gaming servers.
- Run scheduled tasks except those configured through our control panel or authorised by us.
- Give away web space under a domain, including offering “free websites”, except where expressly permitted under an authorised reseller plan.
- Operate a proxy website or proxy service.
- Use the Services as a remote file host for other websites.
- Operate self-hosted file sync or “cloud storage” services (e.g., OwnCloud, Pydio, Sparkleshare or similar).
3.5 No offsite backups / non-web-visible storage
You must not use the Services as an offsite backup facility. Files stored on our servers must be web-visible and accessible unless required to operate your website (for example, application files, protected assets, configuration, and similar). We reserve the right to delete files or directories that are not web-visible or appear primarily for backup/storage purposes, without notice.
3.6 Search engines and SEO practices
Web pages hosted on our platform may be accessible to search engines unless you take steps to prevent indexing. If you optimise pages for search engines, you agree to use methods that comply with major search engine guidelines.
3.7 Database limits
Unless your plan states otherwise, MySQL databases may be limited to 1024MB each. If a database approaches or reaches this limit, we may notify you and require optimisation, reduction, or an upgrade.
3.8 Reseller housekeeping and deletion after deactivation
If you are a reseller and you deactivate a resold hosting account, we may delete that account and its data after 50 days. You are responsible for maintaining appropriate backups and housekeeping.
4. Prohibited Content
You must not host, publish, transmit, or link to content that:
- is unlawful, infringing, defamatory, deceptive, or invasive of privacy;
- is obscene, exploitative, or otherwise harmful, including content that sexualises minors or incites violence or hatred;
- infringes intellectual property or other proprietary rights (copyright, trademarks, trade secrets, database rights);
- contains or distributes malware, spyware, keyloggers, ransomware, or other malicious code;
- facilitates or instructs others to commit unlawful acts (including fraud, hacking, or distribution of controlled substances);
- violates sanctions/embargoes or export control laws.
5. Prohibited Conduct (Network & Abuse)
You must not:
- send unsolicited bulk messages (spam), whether email, SMS, social, or other channels;
- operate open relays/open proxies or misconfigure services enabling abuse;
- impersonate others, forge headers, or spoof identities (including DNS/ARP/SMTP);
- perform or permit denial-of-service (DoS/DDoS), port scanning without consent, stress testing, credential stuffing, scraping at scale, or brute-forcing;
- harvest personal data without a lawful basis or consent where required;
- interfere with, degrade, or circumvent security of any network, system, or Service;
- share, resell, or sub-allocate Services except as permitted by your contract.
6. Email and Messaging
6.1 Comply with applicable anti-spam laws (e.g., PECR). Obtain valid consent where required and include identification and an easy opt-out.
6.2 Bulk/marketing email must: (i) be opt-in; (ii) honour unsubscribes promptly; (iii) use valid sender domains with proper DNS (SPF, DKIM, DMARC recommended).
6.3 Use of our platform solely as a mail-forwarder for third-party mail systems is not permitted unless authorised in writing.
7. Security, Vulnerabilities & Resource Use
7.1 You must promptly remediate known vulnerabilities affecting your sites/applications.
7.2 Do not attempt to access other accounts or systems.
7.3 Abide by plan limits (bandwidth, CPU, storage, mailboxes). Excessive consumption that degrades the platform may lead to rate-limiting, suspension, or plan changes (see Terms – Hosting Service Usage Limits).
7.4 Report security issues or abuse to abuse@eweball.com (or complaints@eweball.com) with relevant logs/headers.
8. Illegal Content and Law Enforcement
8.1 We may block access, remove content, or suspend Services where we reasonably believe the AUP or law is breached.
8.2 We may preserve and disclose information to competent authorities where required by law or to protect individuals or our legitimate interests.
9. Monitoring
9.1 We do not routinely monitor customer content, but we may investigate abuse reports, security alerts, deliverability issues, or technical incidents.
9.2 We may use automated and manual measures (e.g., spam/virus filters, rate limits) to protect the platform.
10. Consequences of Breach
10.1 We may take proportionate actions including warnings, removal of content, rate-limits, service restrictions, suspension, or termination (with or without notice) as permitted by the Terms.
10.2 Serious or repeated breaches may result in immediate termination and recovery of costs (including administrative fees).
11. Changes
11.1 We may update this AUP from time to time by posting a new version on the Website. Continued use constitutes acceptance of the updated AUP.
If changes are material, we may also provide additional notice (for example by email or via your control panel), where appropriate.
Need help? Contact complaints@eweball.com or report abuse to abuse@eweball.com.