Business: DISKMANDOTNET
ABN: 18 209 695 017
Postal Address: PO Box 85, Doncaster, 3108, Victoria, Australia
Email: clientservices@diskman.netPhone: 03 9841 8294

Last Updated: 2 April 2026

This Acceptable Use Policy sets out the rules for using any hosting, email, server, domain, DNS, SSL, backup,
support, management portal, or related service supplied by DISKMANDOTNET. It is designed to protect our network,
our systems, our staff, our suppliers, and all clients who share or rely on our infrastructure.

By ordering, activating, or continuing to use any Service, you agree to comply with this policy together with our
Terms and Conditions, Privacy Policy, and any service-specific agreement that applies to your account.

1. Definitions

In this policy:

Account means the client account held with DISKMANDOTNET for billing, contact, provisioning and service management purposes.

Client, Customer, you and your mean the person or entity acquiring or using the Service.

Console means the DISKMANDOTNET client portal and management platform.

Content means any data, text, software, files, images, video, audio, email, database material, scripts, code or other material stored, transmitted, published or processed using the Service.

Service or Services means any hosting, domain, DNS, email, SSL, VPS, server, website, support, management, backup or related product or service supplied by DISKMANDOTNET.

Shared Hosting means any hosting environment where resources are shared between multiple customers.

We, us and our mean DISKMANDOTNET.

2. Acceptance and Responsibility

You are responsible for all use of your Account and Services, whether authorised by you or not. This includes all
websites, scripts, applications, databases, email accounts, DNS records, third-party integrations, customer data,
and any other material hosted, transmitted or managed through your Services.

You must ensure that your use of the Services complies with all applicable laws, regulations, industry codes,
and third-party rights in every jurisdiction that applies to your business, your audience, and your content.

If you manage Services on behalf of another party, you remain responsible for ensuring compliance unless we agree
otherwise in writing.

3. Prohibited Content

You must not use the Services to store, publish, transmit, distribute, link to, promote, or make available any Content that is unlawful, harmful, abusive, fraudulent, or otherwise unacceptable in our reasonable opinion.

Prohibited Content includes, without limitation, Content that:

  • is illegal under any applicable law or regulation;
  • contains or promotes child exploitation material, child abuse material, or any sexual content involving minors;
  • depicts, promotes, incites, instructs in, or glorifies abhorrent violent conduct, terrorism, murder, torture, kidnapping, rape, or serious assault;
  • contains hate speech, threats, harassment, stalking, intimidation, or targeted abuse;
  • is defamatory, misleading, deceptive, false, or likely to cause consumer harm;
  • infringes copyright, trade mark, patent, trade secrets, confidentiality obligations, moral rights, or other intellectual property rights;
  • invades privacy, exposes personal information without authority, or includes non-consensual intimate images;
  • facilitates phishing, scams, fraud, impersonation, identity theft, or payment redirection fraud;
  • promotes or facilitates illegal drugs, weapons trafficking, financial crime, illegal gambling, or other unlawful trade;
  • contains malware, ransomware, spyware, malicious scripts, credential harvesters, or code intended to compromise systems or users;
  • is designed to evade security controls, licensing controls, copyright controls, or lawful restrictions;
  • creates a material risk to our systems, suppliers, network reputation, or other clients.

We may remove, disable access to, suspend, or report any Content where we reasonably believe it breaches this
policy, exposes us or others to legal or reputational risk, or threatens network stability or user safety.

4. Prohibited Activities

You must not use any Service for activities that are incompatible with a professional hosting environment or that create risk, instability, abuse complaints, or legal exposure.

Unless we expressly approve it in writing, prohibited activities include:

  • using shared hosting primarily for off-site file storage, archive storage, or backup storage unrelated to the hosted website or business function;
  • running public file-sharing, image-sharing, video-sharing, or download mirror services intended mainly for storage or bandwidth consumption;
  • operating open proxies, anonymous browsing tools, VPN endpoints, public relay services, or traffic redirection services;
  • running IRC services, botnets, command-and-control services, game servers, or similar persistent daemons on Services not designed for that purpose;
  • hosting pirated software, serials, cracks, warez, exploit kits, leaked databases, or other unlawful material;
  • running port scanners, vulnerability scanners, packet capture tools, brute-force tools, password cracking tools, or similar utilities against any third party without clear lawful authority;
  • conducting denial-of-service activity, stress testing, load testing, or traffic generation against any target without prior written approval from the affected parties and from us where our network is involved;
  • running scripts or jobs that continuously consume abnormal CPU, memory, disk I/O, database, or mail resources;
  • using the Services to resell or distribute abusive traffic, malware, spam, or other prohibited conduct;
  • using the Services in any way likely to cause blacklisting of IP addresses, domains, or mail systems;
  • attempting to bypass resource limits, account restrictions, access controls, or platform safeguards.

We may decide, acting reasonably, that a particular use is unsuitable for a shared or managed hosting environment
even if it is not specifically listed above.

5. Security and Account Protection

You are responsible for securing your websites, applications, email accounts, devices, and credentials.

You must:

  • use strong, unique passwords and change them if compromise is suspected;
  • enable multi-factor authentication wherever available;
  • keep CMS platforms, plugins, themes, scripts, libraries, and server-side applications up to date;
  • remove unsupported, abandoned, nulled, or pirated software;
  • set sensible file and folder permissions;
  • secure web forms, contact forms, and authentication pages against abuse;
  • monitor websites and mailboxes for compromise, spam abuse, and unusual activity;
  • take prompt action if malware, unauthorised access, or abuse is detected.

You must not:

  • share access credentials carelessly or store them insecurely;
  • leave compromised sites online after notice from us;
  • ignore security notices, abuse reports, or remediation requests;
  • use software that creates a known or ongoing security risk.

If your Service is compromised, we may isolate, suspend, restrict, or disable it immediately to protect our
infrastructure, our suppliers, and other clients.

6. Resource Usage and Platform Stability

Shared and managed environments rely on fair usage. You must use system resources in a way that does not
materially degrade performance for other clients or create instability on the platform.

Unless a plan specifically allows it, you must not:

  • cause sustained or repeated excessive CPU, memory, entry process, disk I/O, database, inode, or network usage;
  • run long-lived background processes, persistent daemons, or continuously looping tasks on shared hosting;
  • run cron jobs at unreasonable intervals or in a way that causes avoidable load;
  • run poorly coded or unoptimised scripts that cause repeated timeouts, lockups, or database contention;
  • store excessive mail data, cache files, backups, logs, or temporary files that materially affect platform operation;
  • use the Services for workloads better suited to a VPS, dedicated environment, object storage, or specialist platform.

We may implement or adjust technical limits including mailbox limits, inode limits, process limits, email limits,
CPU limits, disk limits, connection limits, and rate limits to protect service quality.

If your usage exceeds what is reasonable for the Service, we may throttle, suspend, require cleanup, require an
upgrade, move the Service, or charge additional fees where permitted by your agreement.

7. Email, Spam and Messaging Rules

Our Services must not be used to send spam, unsolicited commercial electronic messages, or abusive email of any kind.

You must not:

  • send marketing emails or SMS without the recipient’s valid consent where consent is required by law;
  • use purchased, scraped, rented, harvested, or third-party lists that do not meet legal consent standards;
  • hide or falsify sender identity, headers, reply paths, or origin details;
  • continue sending marketing messages after an unsubscribe or opt-out request;
  • use our Services for phishing, spoofing, mail relaying abuse, or bulk mail campaigns that risk blacklisting;
  • attempt to bypass outbound email limits or reputation controls.

You must ensure that any commercial electronic message sent using our Services:

  • identifies the sender accurately;
  • contains clear contact details where legally required;
  • includes a functional unsubscribe method where legally required;
  • complies with the Spam Act 2003 (Cth) and any other applicable anti-spam or marketing laws.

We may apply outbound mail limits, queue controls, rate limits, reputation protections, scanning, filtering, and
temporary or permanent restrictions to protect service quality and IP reputation.

If your email use exceeds the suitability of normal hosting, we may direct you to use a specialist mail delivery
platform instead.

8. Backups and Data Protection

Unless expressly stated otherwise in writing, you are responsible for maintaining current, tested, restorable backups
of your websites, databases, email, DNS, settings, and all other data.

Any backup service, snapshot, courtesy backup, or restore point we provide is supplied on a best-efforts basis only
and must not be treated as your sole disaster recovery strategy.

We may exclude oversized, high-churn, high-risk, corrupted, or non-compliant accounts from routine backup processes,
or require an upgrade or separate backup service where needed.

You should keep an independent off-site backup under your own control at all times.

9. Compliance, Suspension and Remedies

If we reasonably believe that your Service breaches this policy, creates legal risk, causes abuse complaints,
threatens security, or affects platform stability, we may act immediately and without prior notice where necessary.

Our actions may include:

  • requesting information, logs, copies, or explanations;
  • requiring content removal, patching, password resets, cleanup, or configuration changes;
  • restricting functions such as email, scripts, cron, DNS, or network access;
  • suspending or isolating the affected Service or Account;
  • removing or disabling access to offending material;
  • reporting matters to upstream providers, regulators, law enforcement, or other affected parties where appropriate;
  • terminating Services for serious, repeated, or unremedied breaches.

Where the issue is minor and does not require urgent intervention, we will generally try to give you a reasonable
opportunity to fix it. Where the issue is serious, repeated, unlawful, urgent, or poses risk to others, immediate
suspension or termination may occur.

You remain liable for charges incurred during any period of investigation, restriction, suspension, remediation,
reactivation, migration, cleanup, or third-party remediation caused by your breach, to the extent permitted by law
and your service agreement.

10. Reporting Abuse

If you become aware of any spam, phishing, malware, unauthorised access, illegal content, or other abuse involving
our Services, you must notify us as soon as possible.

We may require cooperation from you during any abuse investigation, including prompt replies, confirmation of facts,
credential changes, software updates, forensic preservation steps, or other remediation work.

11. Changes to this Policy

We may update this Acceptable Use Policy from time to time. The current version published on our website will apply
from the date it is posted, unless a later commencement date is stated.

Your continued use of any Service after an updated version is published constitutes acceptance of the revised policy,
subject to any rights you may have under applicable law.

12. Contact Details

If you have any questions about this Acceptable Use Policy, please contact:

DISKMANDOTNET

PO Box 85, Doncaster, 3108, Victoria, Australia

Email: clientservices@diskman.net

Phone: 03 9841 8294