Acceptable Use Policy

This Acceptable Use Policy covers the products, services, and technologies (collectively, the “Products”) provided by AX TECH under any existing agreement. It is intended to protect us, our customers, and the Internet community at large from unethical, irresponsible, and illegal activities.

AX TECH customers caught engaging in activities prohibited by this Acceptable Use Policy may be subject to service suspension and account termination. In extreme cases, we may be legally required to report such customers to the appropriate authorities.

This policy was last reviewed on October 16, 2025.

Fair Use

We provide our facilities assuming your usage will be "normal," in accordance with our offering schedule. If your usage is deemed excessive, you may be charged additional fees or capacity may be restricted.

We oppose all forms of abuse, discrimination, infringement of rights, and/or any action that harms or disadvantages any group, individual, or resource. We expect our customers and, where applicable, their users (“End Users”) to also use our Products with a similar intent.

Customer Responsibility

We consider our customers responsible for their own actions as well as the actions of anyone using our Products with the customer's permission. This responsibility also applies to anyone using our Products in an unauthorized manner due to the customer's failure to take reasonable security measures.

By accepting our Products, our customers agree to ensure compliance with this policy by anyone using the Products as end users. Complaints regarding the actions of customers or their end users will be forwarded to the designated contact for the account in question.

If a customer—or their end user, or anyone using our Products because of the customer—violates our Acceptable Use Policy, we reserve the right to terminate any Product associated with the offending account or the account itself, or to take any corrective or preventative action we deem appropriate, without prior notice. To the extent permitted by law, no credit will be given for service interruptions resulting from any violation of our Acceptable Use Policy.

Prohibited activities

Copyright infringement and access to unauthorized content

Our Products must not be used to transmit, distribute, or store any material in violation of any applicable law. This includes, but is not limited to:

any material protected by copyright, trademark, trade secret or other intellectual property right used without proper authorization, and

any material that is obscene, defamatory, constitutes an illegal threat or violates export control laws.

Customer is solely responsible for any material it inputs, uploads, distributes, transmits, creates or publishes through our Products, as well as for obtaining legal permission to use the works included in such material.

SPAM and unauthorized email activities

Our Products may not be used to send unsolicited bulk or commercial messages in violation of the laws and regulations applicable to your jurisdiction (“spam”). This includes, but is not limited to, sending spam, soliciting customers from spam sent by other service providers, and collecting responses to spam sent by other service providers.

Our Products must not be used for the purpose of managing unconfirmed mailing lists or telephone numbers (“mailing lists”). This includes, but is not limited to, subscribing email addresses or telephone numbers to an email list without the permission of the owner of the email address or telephone number, and storing any email addresses or telephone numbers subscribed in this manner. All email lists managed on or hosted by our Products must be based on “opt-in confirmation.” Proof of express permission from the owner of the email address or telephone number must be available for the duration of the email list.

We prohibit the use of email lists, phone number lists, or databases purchased from third parties for spamming or unconfirmed email lists on our Products.

This Spam and Unauthorized Messaging Activity Policy applies to messages sent using our Products, or to messages sent from a network by the customer or anyone acting on the customer's behalf, which directly or indirectly direct the recipient to a site hosted through our Products.

Unethical, abusive and malicious activity

Our Products may not be used to advertise, transmit, or otherwise make available any software, program, product, or service designed to violate this Acceptable Use Policy, or the Acceptable Use Policy of other service providers. This includes, but is not limited to, facilitating the means to send spam and the initiation of network sniffing, pinging, packet forgery, flooding, mail-bombing, and denial-of-service attacks.

Our Products should not be used to access any account or electronic resource that the group or individual attempting to access does not own or is not authorized to access (e.g., “hacking,” “cracking,” “phreaking,” etc.).

Our Products must not be used to intentionally or recklessly introduce viruses or malicious code into our Products and systems.

Our Products must not be used to intentionally engage in activities intended to harass another group or individual. Our definition of harassment includes, but is not limited to, denial-of-service attacks, hate speech, incitement of racial or ethnic intolerance, and any activity intended to threaten, abuse, violate the rights of, or discriminate against any group or individual.

Other activities considered unethical, abusive, and malicious include:

Obtaining (or attempting to obtain) services from us for the purpose of avoiding payment;

Using our facilities to obtain (or attempt to obtain) services from another provider in order to avoid payment;

Unauthorized access, alteration or destruction (or any attempt thereto) of any information concerning our customers or end users, by any means or device;

Using our facilities to interfere with the use of our facilities and network by other customers or authorized persons;

Posting or transmitting any content or link that incites violence, depicts a violent act, depicts child pornography, or threatens the health and safety of any person;

Any act or omission in violation of consumer protection laws and regulations;

Any violation of a person's privacy.

Our Products may not be used by any person or entity that is involved or suspected of being involved in activities or causes related to illegal gambling, terrorism, narcotics trafficking, arms trafficking, proliferation, development, design, manufacture, production, stockpiling, or use of nuclear, chemical, or biological weapons, weapons of mass destruction, or missiles; including any affiliation with others who support such activities or causes.

Unauthorized use of AX TECH property

We prohibit impersonating AX TECH, representing a significant business relationship with AX TECH, or owning any AX TECH property (including our Products and brand) for the purpose of fraudulently obtaining services, goodwill, loyalty, or user trust.

About this policy

This policy describes a non-exhaustive list of activities and intentions that we consider unacceptable and incompatible with our brand.

We reserve the right to modify this policy at any time by posting the revised version on our website. The revised version will be effective from the earlier of:

the date the customer uses our Products after the revised version is published on our website; or

30 days after the revised version is published on our website.


CTA Image

Contact us if you have additional question.

CTA Image

Contact us if you have additional question.

CTA Image

Contact us if you have additional question.

CTA Image

Contact us if you have additional question.