Acceptable Use Policy
1. Overview
This Acceptable Use Policy ("AUP") applies to all RemarkableCloud services, including Cloud Cube managed VPS hosting, RemarkablePanel, and any related services. This AUP is not exhaustive — RemarkableCloud reserves the right to take action against any use of our services that we determine, in our sole discretion, to be harmful, abusive, or inconsistent with the spirit of this policy, even if not explicitly listed below.
You are responsible for compliance with this AUP by anyone using your Cloud Cube — whether authorized by you or not. Assisting another person in activity that would violate this AUP if performed by you is itself a violation. We may modify this AUP at any time by posting a revised version on our website.
RemarkableCloud is a fully managed VPS provider. Unlike shared hosting, your Cloud Cube is an isolated virtual machine. You have root-level access and full control — with that comes full responsibility for what runs on it.
2. Illegal & Abusive Activity
You may not use the Services for any unlawful or abusive purpose. Prohibited activities include:
Illegal Activities
Any use of the Services to engage in, facilitate, promote, or encourage illegal conduct or activities, including disseminating content determined by a court of competent jurisdiction to be unlawful.
Fraudulent or Harmful Conduct
Engaging in activities deceptive or harmful to others, including operating fraudulent schemes (Ponzi schemes, phishing, pharming, make-money-fast scams), impersonating another person or entity, or engaging in any other misleading or deceptive practices.
Intellectual Property Violations
Using the Services in a manner that infringes copyright, trademark, trade secret, patent, or other intellectual property rights. This includes hosting content that helps others circumvent technical measures protecting such rights.
Unlawful Pornography
Distributing child sexual abuse material (CSAM) or non-consensual intimate imagery ("revenge pornography"). Violations will be reported to law enforcement immediately.
Violent, Harassing, or Abusive Content
Content that incites or threatens violence, promotes terrorism, harasses or abuses individuals, creates a risk to public safety, or encourages harm based on race, ethnicity, national origin, religion, gender identity, sexual orientation, disability, or immigration status.
Controlled Substances
Unlawfully selling, advertising, or distributing controlled substances or prescription drugs.
3. Security Violations
You may not use the Services to violate the security or integrity of any network, system, or application. Prohibited activities include:
- Malware distribution — deploying viruses, ransomware, spyware, Trojans, worms, or any software designed to damage, intercept, or compromise systems
- Unauthorized access — attempting to access, probe, scan, or exploit any system, network, or application without explicit permission from its owner
- Traffic interception — monitoring or capturing data or traffic on a network without permission
- Spoofing — using falsified IP headers, email headers, or any technique to misrepresent the origin or route of communications
- Credential theft — phishing, password harvesting, or any technique designed to obtain account credentials or personal data without consent
4. Network Abuse
You may not make network connections to hosts or networks without permission, or engage in any conduct that disrupts or degrades the network. Prohibited activities include:
- Open proxies or relays — operating open HTTP proxies, open mail relays, open recursive DNS resolvers, or Tor exit nodes
- Intentional interference — deliberately attempting to overload or disrupt any system through mail bombing, broadcast attacks, or flooding techniques
- Automated scraping — crawling or scraping systems in a manner that impairs or disrupts the target system
- Identity concealment — withholding or forging identification or contact information in a manner that harms others or violates applicable law
- Circumventing restrictions — using any automated or manual means to bypass rate limits, access controls, or usage restrictions on third-party systems
- Retaliation — any conduct likely to result in retaliatory action against RemarkableCloud or its infrastructure, including provoking a DDoS attack against our network
5. Spam & Email Abuse
RemarkableCloud maintains a strict zero-tolerance policy on spam. You may not distribute, publish, or facilitate the sending of unsolicited bulk email or messages ("spam"). Specifically prohibited:
- Sending unsolicited commercial or bulk email from your Cloud Cube
- Operating open SMTP relays
- Forging or obscuring email headers or sender identities
- Collecting email addresses or other identifiers through deceptive means (spidering, harvesting)
- Taking any action that results in RemarkableCloud IP addresses appearing on spam blocklists (e.g., Spamhaus)
If you send legitimate bulk or commercial email from your Cloud Cube, you must:
- Have documented, affirmative opt-in consent from every recipient — available for review within 72 hours of request
- Include a valid, functional unsubscribe mechanism and honor opt-outs promptly
- Include your physical mailing address and a working abuse contact in every message
- Maintain a privacy policy on every domain associated with the mailing
- Not obscure the origin, route, or sender of any message
A spam cleanup fee of $50–$500 may be assessed for cleanup and remediation costs caused by spam originating from your Cloud Cube, in addition to account suspension or termination.
6. DDoS & Stress Testing
The following are strictly prohibited on all RemarkableCloud services:
- Launching or participating in distributed denial-of-service (DDoS) or denial-of-service (DoS) attacks against any target
- Offering, advertising, or operating DDoS-for-hire services, booters, or stressers
- Deliberately attracting inbound DDoS attacks to RemarkableCloud infrastructure ("stress testing" your own server)
- Operating botnet command-and-control infrastructure
Zero tolerance. Accounts found participating in DDoS activity will be immediately terminated with no refund and may be reported to law enforcement.
7. Cryptocurrency Mining
Mining any cryptocurrency — including but not limited to Bitcoin, Ethereum, Monero, and any proof-of-work or proof-of-stake currency — is prohibited on all RemarkableCloud services without prior explicit written approval from RemarkableCloud.
Accounts found conducting cryptocurrency mining will be terminated immediately with no refund.
8. Resource Usage
Unlike shared hosting, your Cloud Cube has dedicated, non-oversold resources — you are allocated dedicated RAM, CPU, storage, and bandwidth. You may use your full allocated resources at any time without artificial throttling.
However, you may not use your Cloud Cube to deliberately interfere with other customers' services or with RemarkableCloud's infrastructure. Prohibited resource-related activities include:
- Running processes that generate abusive outbound traffic volumes impacting network infrastructure
- Storing data unrelated to your hosted services (bulk file storage, media archiving, personal backups not covered by your included S3 storage)
- Deliberately consuming resources for the purpose of impacting RemarkableCloud's ability to serve other customers
If your usage is causing infrastructure-level impact, we will contact you and work with you on a resolution before taking action, except in cases of active abuse or emergency.
9. Vulnerability Testing
You may not attempt to probe, scan, or test the vulnerability of RemarkableCloud's infrastructure, network, or control systems — whether by passive or active techniques — without prior explicit written consent from RemarkableCloud.
You are permitted to run authorized vulnerability assessments and penetration tests against your own Cloud Cube only, provided they do not generate traffic volumes or patterns that impact other customers or RemarkableCloud infrastructure. Please notify us before conducting any such testing.
10. Prohibited Content
The following categories of content are not permitted to be hosted, stored, or distributed using RemarkableCloud services under any circumstances:
- Child sexual abuse material (CSAM) or any content sexualizing minors
- Non-consensual intimate imagery
- Content that incites, plans, or promotes terrorism or mass violence
- Malware, exploit kits, ransomware, or tools designed to compromise third-party systems
- Phishing pages, credential harvesting sites, or fraudulent financial pages
- Warez, nulled or pirated software, and associated distribution sites
- Content that directly facilitates illegal activity under applicable law
11. Enforcement
RemarkableCloud reserves the right — but has no obligation — to investigate suspected violations of this AUP or misuse of the Services. In connection with such investigations, we may:
- Remove, disable access to, or modify any content or resource
- Suspend or terminate your use of the Services
- Intercept or block traffic associated with confirmed abuse
- Report violations to law enforcement, regulators, or appropriate third parties and cooperate fully with investigations
- Disclose customer information as required by applicable law or as necessary to protect the safety of others
Our right to suspend or terminate applies even if a violation occurs unintentionally or without your direct authorization (e.g., through a compromised application). This right is exercised at our sole discretion and does not obligate us to act in any particular timeframe or manner.
Accounts terminated for AUP violations are not eligible for refunds.
12. Reporting Violations
If you become aware of any content or activity that violates this AUP on RemarkableCloud's network, please report it with a full explanation to:
- Email: abuse@remarkablecloud.com
- Support portal: manager.remarkablecloud.com — open an Abuse department ticket
We take abuse reports seriously and respond to all valid reports. We may request your assistance to help stop or remedy the violation.