Acceptable Use Policy

Last updated: March 2026

This Acceptable Use Policy ("AUP") governs the use of all services provided by SIA ROOTAPI, operating as NetPoint ("we", "us", or "our"), including domain registration, DNS management, web hosting, VPS, dedicated servers, and related services (collectively, "Services"). This AUP is incorporated into and forms part of our Terms of Service.

By using our Services, you ("Customer", "you", or "your") agree to comply with this AUP. Violation of this AUP may result in suspension or termination of your Services.

1. General Principles

1.1. You must use our Services in a lawful, ethical, and responsible manner. You are responsible for all activity conducted through your account and all content hosted on or transmitted through our infrastructure.

1.2. You must comply with all applicable local, national, and international laws and regulations, including but not limited to the laws of the Republic of Latvia and the European Union.

1.3. You must not use our Services in any way that could damage, disable, overburden, or impair our infrastructure, or interfere with any other customer's use of the Services.

2. Prohibited Activities

The following activities are strictly prohibited when using our Services:

2.1. Illegal Activities

  • Any activity that violates applicable law, statute, ordinance, or regulation
  • Distribution, hosting, or facilitation of child sexual abuse material (CSAM) -- this will result in immediate termination and reporting to law enforcement
  • Fraud, identity theft, phishing, or financial crimes
  • Sale or distribution of illegal drugs or controlled substances
  • Hosting content that facilitates terrorism or violent extremism
  • Money laundering or financing of criminal activity
  • Violation of export control laws or sanctions

2.2. Intellectual Property Violations

  • Copyright infringement, including unauthorized distribution of copyrighted material
  • Trademark infringement or domain name cybersquatting
  • Distribution of pirated software, media, or other protected works
  • Operating warez sites or torrent trackers for infringing content

2.3. Harmful or Malicious Activities

  • Distribution of malware, viruses, trojans, ransomware, or other malicious software
  • Operating command-and-control (C2) infrastructure for botnets
  • Hosting phishing pages or credential harvesting sites
  • Operating deceptive or fraudulent websites
  • Unauthorized access to or interference with third-party systems or networks
  • Port scanning, vulnerability scanning, or penetration testing of third-party systems without authorization

3. Spam and Unsolicited Communications

3.1. No Spam. You must not use our Services to send, facilitate, or support the sending of unsolicited bulk email (spam), unsolicited commercial email, or any form of unsolicited mass messaging.

3.2. Email Standards. All email sent through our Services must comply with applicable anti-spam laws, including:

  • EU ePrivacy Directive (Directive 2002/58/EC)
  • CAN-SPAM Act (for messages sent to US recipients)
  • Any applicable local anti-spam legislation

3.3. Mailing Lists. All mailing lists must be opt-in, include a clear and functional unsubscribe mechanism, and honor unsubscribe requests within 10 business days.

3.4. Spoofing. You must not forge, misrepresent, or obscure email headers, sender information, or source IP addresses.

3.5. DNS Spam. You must not use domain names registered through our Services primarily for the purpose of sending spam or hosting spam-support services (e.g., spamvertised websites).

4. Content Restrictions

4.1. You are solely responsible for all content hosted on, stored in, or transmitted through our Services. The following types of content are prohibited:

  • Child sexual abuse material (CSAM) or any content that exploits minors
  • Content that promotes or facilitates terrorism or violent extremism
  • Content that constitutes or facilitates harassment, threats, or incitement to violence
  • Content that is defamatory, libelous, or constitutes an invasion of privacy
  • Content that violates the intellectual property rights of others
  • Deceptive content designed to mislead users (e.g., fake news sites impersonating legitimate media)

4.2. Adult Content. Legal adult content is permitted on VPS and dedicated server plans only, provided it complies with all applicable laws and does not involve the exploitation of minors. Adult content is not permitted on shared hosting plans.

4.3. Resource Limits. Content and applications must not exceed the resource limits of your plan. We reserve the right to throttle or suspend services that consume excessive resources and negatively impact other customers.

5. Network Abuse

5.1. DDoS Attacks. You must not initiate, facilitate, or participate in Distributed Denial of Service (DDoS) attacks or any other form of denial-of-service attack against any target.

5.2. Traffic Amplification. You must not operate open resolvers, open relays, or any other service that can be used for traffic amplification attacks.

5.3. Unauthorized Access. You must not attempt to gain unauthorized access to any system, network, server, or account, whether our infrastructure or any third party's.

5.4. Network Monitoring. You must not engage in network monitoring or packet sniffing to intercept data not intended for your use.

5.5. IP Reputation. You must not engage in activities that damage the reputation of IP addresses assigned to you or our network. If an IP address assigned to your service is blocklisted due to your activity, you are responsible for remediation.

5.6. Cryptocurrency Mining. Cryptocurrency mining is only permitted on VPS and dedicated server plans where you have explicitly allocated resources for this purpose. Mining is strictly prohibited on shared hosting plans and must not negatively impact other customers or our infrastructure.

6. Domain Name Abuse

6.1. Domain names registered through our Services must not be used for:

  • Phishing or credential harvesting
  • Malware distribution or command-and-control operations
  • Spam support (e.g., spamvertised domains)
  • Cybersquatting or typosquatting
  • Any activity that constitutes DNS abuse as defined by ICANN

6.2. We reserve the right to suspend or place a client hold on any domain name found to be involved in abusive activity, in accordance with our obligations to the sponsoring registrar (Internet.bs Corp.) and ICANN.

7. Enforcement and Suspension Procedures

7.1. Investigation. We reserve the right to investigate any suspected violation of this AUP. During an investigation, we may review server logs, network traffic data, and content hosted on our infrastructure as necessary to determine whether a violation has occurred.

7.2. Notice and Opportunity to Cure. For non-critical violations, we will generally provide you with written notice (via email) of the violation and a reasonable period (typically 24 to 72 hours) to remedy the issue. Repeated violations may result in immediate suspension without additional notice.

7.3. Immediate Suspension. We reserve the right to immediately suspend or terminate Services without prior notice in cases of:

  • Hosting or distribution of CSAM
  • Active participation in or facilitation of DDoS attacks
  • Active distribution of malware or operation of botnet infrastructure
  • Phishing or active fraud operations
  • Any activity that poses an immediate threat to our infrastructure, other customers, or third parties
  • Any activity that may expose NetPoint to criminal or civil liability

7.4. Proportionate Response. Enforcement actions will be proportionate to the severity of the violation and may include:

  • Written warning
  • Temporary suspension of specific Services
  • Removal or disabling of offending content
  • Suspension or cancellation of domain names
  • Full account termination
  • Reporting to law enforcement authorities

7.5. Appeals. If you believe your Services were suspended or terminated in error, you may appeal by contacting [email protected] with a detailed explanation. We will review all appeals in good faith and respond within five (5) business days.

7.6. Refunds. No refunds will be issued for Services suspended or terminated due to AUP violations.

8. Reporting Abuse

If you become aware of any violation of this AUP or any abuse originating from our network, please report it to:

Please include as much detail as possible in your report, including relevant logs, timestamps, IP addresses, URLs, and a description of the abusive activity.

9. Customer Responsibility

9.1. You are responsible for ensuring that all users of your account, including employees, contractors, and end users, comply with this AUP.

9.2. If you provide hosting or other services to third parties using our infrastructure (e.g., as a reseller), you are responsible for ensuring that your customers also comply with this AUP. You must maintain your own acceptable use policy that is at least as restrictive as this one.

9.3. You must maintain appropriate security measures on your servers and applications to prevent your infrastructure from being used for abuse (e.g., securing open mail relays, patching known vulnerabilities, using strong authentication).

10. Changes to This Policy

We reserve the right to modify this AUP at any time. Changes will be posted on our website and will take effect immediately upon posting. Material changes will be communicated to active customers via email. Your continued use of the Services after any modification constitutes your acceptance of the updated AUP.

11. Contact Information

If you have any questions about this Acceptable Use Policy, please contact us: