Keeping Clients Safe With Our Acceptable Use Policy
Need support?
Last updated: 30 April 2026
1. Introduction
This Acceptable Use Policy explains the rules that apply when using services provided by Conor Bradley Digital Agency.
This policy applies to all services we provide, including website hosting, managed WordPress hosting, reseller hosting, VPS hosting, email hosting, domain services, website support and related technical services.
By using our services, you agree to comply with this Acceptable Use Policy, our Terms of Service, Anti Spam Policy, Privacy Policy and any other policies or agreements that apply to your service.
Our services must only be used for lawful purposes.
We may suspend, restrict or terminate any service that breaches this policy, creates a security risk, affects other users, affects server performance, damages our reputation, breaches supplier rules or breaks the law.
A breach of this Acceptable Use Policy may be treated as a material breach of our Terms of Service.
2. Your responsibilities
You are responsible for all activity carried out through your account, website, hosting service, email service, VPS, reseller account or any service provided to you.
You are responsible for:
- Keeping login details secure
- Using strong passwords
- Using two factor authentication where available
- Keeping websites, scripts, plugins, themes and software updated where this is your responsibility
- Ensuring your content is lawful
- Ensuring your users and customers comply with this policy
- Responding to abuse, security or support notices promptly
- Keeping suitable backups of your own data
- Ensuring your account does not harm our systems, suppliers or other users
If you use reseller hosting, you are responsible for your own clients and for ensuring they comply with this policy.
3. Prohibited use
You must not use our services for unlawful, harmful, abusive, fraudulent, misleading, high risk or prohibited activity.
Prohibited use includes, but is not limited to:
- Illegal activity
- Fraud or attempted fraud
- Phishing or impersonation
- Credential theft
- Malware, viruses, trojans, ransomware or spyware
- Botnets or command and control activity
- DDoS attacks or stress testing without permission
- Hacking, cracking or unauthorised access
- Port scanning or vulnerability scanning of third party systems without permission
- Brute force activity
- Spam or unsolicited bulk messaging
- Mail bombing
- SMS abuse or bulk messaging gateways
- Hosting or linking to malicious files
- Hosting stolen data or leaked credentials
- Hosting counterfeit goods
- Selling or promoting illegal goods or services
- Investment scams, pyramid schemes or Ponzi schemes
- High risk financial schemes
- Fake escrow or banking schemes
- Content that promotes illegal activity
- Content that infringes copyright, trade marks or other intellectual property rights
- Content that is defamatory where a court or lawful authority has required removal
- Content that exploits, abuses or endangers children
- Content that encourages violence, terrorism or serious harm
- Content that breaches applicable law or regulation
4. Security testing and vulnerability scanning
You must not carry out penetration testing, vulnerability scanning, load testing, stress testing or security testing against our servers, networks, hosting infrastructure, supplier systems or other clients without our prior written permission.
If you want to test your own website or service hosted with us, you must contact us first so we can confirm what is permitted and avoid disruption to other users.
Unauthorised testing may be treated as abuse and may result in suspension or termination.
5. Child sexual abuse material
We have zero tolerance for child sexual abuse material.
If we become aware of any such material, we may immediately suspend or terminate the service, preserve relevant evidence where appropriate and report the matter to law enforcement or the appropriate authority.
6. Adult, offensive or high risk content
We may refuse, restrict, suspend or terminate services used for content we consider unsuitable for our platform, suppliers or business.
This may include, but is not limited to:
- Pornographic or explicit adult content
- Extreme violent content
- Hate content
- Content encouraging self harm or serious harm
- Content promoting illegal substances
- Content promoting unlawful weapons sales
- Fraudulent financial schemes
- High risk investment schemes
- Gambling or betting services where not properly licensed
- Any content that may place our infrastructure, suppliers, clients or reputation at risk
We may make reasonable decisions about what content is acceptable on our services.
7. User generated content and interactive services
If your website or service allows users to upload, post, submit, share or exchange content, you are responsible for managing that content and ensuring your service complies with any laws or regulations that apply.
This may include comments, forums, reviews, directories, classified listings, membership areas, customer accounts, file uploads, messaging features, community areas, booking systems, forms or other interactive features.
You are responsible for moderating, removing, restricting or reporting illegal, harmful, abusive or infringing content where required.
Where your website or service falls within the scope of online safety, user generated content, search, marketplace, community, messaging or safeguarding laws, you are responsible for understanding and complying with those obligations.
You must not use our services to operate an interactive service that exposes us, our suppliers, our infrastructure, other clients or the public to unacceptable legal, security, safeguarding or reputational risk.
Where required by law or where we reasonably believe there is a serious risk, we may restrict, suspend or remove access to content, accounts or services.
8. Privacy, personal data and data misuse
You must not use our services to collect, store, publish, sell, share or misuse personal data unlawfully.
You must not use our services for doxxing, identity theft, credential leaks, unlawful data scraping, unlawful tracking, unlawful profiling or publishing personal data without a lawful basis.
You are responsible for ensuring that any personal data collected through your website, forms, customer accounts, analytics tools, tracking tools or marketing systems is handled lawfully.
Where we reasonably believe a service is being used to misuse personal data or expose personal data unlawfully, we may suspend, restrict or remove access to the affected service.
9. Regulated or high risk services
You are responsible for ensuring that any regulated activity promoted, sold or operated through your website or service complies with all laws, licences, permissions and industry rules that apply.
This may include financial services, medical services, legal services, gambling, alcohol, controlled goods, training, recruitment, property, health claims, investment offers or other regulated sectors.
We do not provide legal, financial, medical, tax or regulatory advice.
We may refuse, suspend or terminate services where we reasonably believe the activity is unlawful, misleading, unlicensed, high risk or likely to create legal, regulatory, supplier or reputational risk.
10. Intellectual property complaints
You must not use our services to infringe copyright, trade marks, design rights, database rights or any other intellectual property rights.
This includes, but is not limited to:
- Distributing pirated software
- Sharing copyrighted films, music, games or books without permission
- Selling counterfeit goods
- Using trade marks without permission
- Hosting copied website content where this infringes another party’s rights
- Using images, fonts, logos or content without the required licence
If we receive a credible intellectual property complaint, we may remove or disable access to the content, ask you to respond, request evidence of your right to use the content, suspend the affected service or terminate the service.
If you believe your intellectual property rights are being infringed by content hosted on our services, contact:
Please include the domain name, the content in question, evidence of your rights and your contact details.
11. Spam and email abuse
You must not use our services to send spam or unsolicited bulk email.
You must not use purchased, scraped, harvested or third party email lists.
You must not use our services for:
- Spam
- Bulk unsolicited email
- Phishing emails
- Fraudulent emails
- Malware emails
- Mail bombing
- Email spoofing
- Open relays
- High volume sending that harms server reputation
- Sending email that breaches our Anti Spam Policy
- Sending email that breaches privacy or marketing law
Websites advertised by spam may not be hosted on our services.
Accounts listed on recognised spam abuse databases may be suspended or terminated.
You are responsible for ensuring that website forms, contact forms, booking forms, newsletter forms, scripts and mailboxes are protected from spam, abuse and automated submissions.
We may restrict, rate limit, disable or require changes to forms, scripts, mailboxes or sending functions that generate spam, excessive email volume, bounces, complaints, blacklisting or reputation damage.
We may charge reasonable cleanup, investigation, administration or blacklist removal costs where your account, website, mailbox or service causes spam, abuse or email reputation damage.
12. Malware, compromised websites and security risks
You must not upload, host, distribute or link to malware or harmful code.
If your website, hosting account, mailbox or service is compromised, we may suspend, restrict, isolate, clean, remove files from or terminate the affected service to protect our systems, suppliers and other users.
You are responsible for resolving malware, compromised files, insecure plugins, outdated software, weak passwords and unauthorised access issues unless you have purchased a service that specifically includes this work.
Additional charges may apply for malware cleanup, investigation, restoration, blacklist removal, spam cleanup, security hardening or other remedial work.
13. Resource usage
Shared hosting and managed WordPress hosting are shared environments. You must use resources fairly and must not negatively affect other users or server performance.
You must not:
- Use 25 percent or more of system resources for longer than 90 seconds at a time
- Run unattended server side processes unless specifically permitted
- Run software that connects to IRC networks
- Run IRC scripts, bots or servers
- Run torrent applications
- Participate in peer to peer file sharing
- Run gaming servers
- Run crypto mining or blockchain mining software
- Run cron jobs at intervals of less than 15 minutes
- Run MySQL queries that last longer than 15 seconds
- Use hosting as mass file storage, backup storage or archive storage
- Use excessive CPU, RAM, disk I/O, database, email, inode or bandwidth resources
- Run scripts that cause excessive load, repeated errors or performance issues
- Use excessive WP Cron activity or automated tasks that affect server stability
If your usage affects server performance, security, availability or other users, we may ask you to reduce usage, optimise the website, upgrade to a more suitable service, move to VPS or reseller hosting, or we may suspend or restrict the service.
14. Disk usage, backups and storage
Hosting space must be used for active website files, email and related service content.
You must not use shared or reseller hosting as:
- File storage
- Backup storage
- Media archive storage
- Cloud storage
- Mirror storage
- Download repository
- Large file dump
- Software distribution archive
- Personal file storage
- Unrelated data storage
We may remove files, suspend accounts or ask you to upgrade where storage usage is excessive or outside the intended use of the service.
Backups are provided subject to the service purchased and are not guaranteed unless specifically agreed in writing.
Accounts may be excluded from backups due to excessive disk usage, excessive inode usage, technical limitations, abuse, unsupported content or other operational reasons.
You are responsible for maintaining your own independent backups of important files, databases, emails and website data.
15. Inodes
Each file, folder, email, image, cache file or system file may count as an inode.
Use of more than 250,000 inodes on a shared or reseller hosting account may result in a warning, restriction, suspension or requirement to reduce usage.
Accounts using more than 100,000 inodes may be excluded from backups.
You are responsible for reducing excessive inode usage, including old emails, cache files, temporary files, unused backups, staging files, duplicate uploads or unnecessary website files.
16. Prohibited scripts and applications
You must not run scripts, applications or services that are unsuitable for shared hosting, harmful to our systems or prohibited by this policy.
This may include:
- Proxy scripts
- Anonymisers
- IP scanners
- Brute force tools
- Mailer scripts
- Bulk mail tools
- Push button mail scripts
- Torrent software
- Crypto mining software
- Auto surf scripts
- File dump scripts
- Mirror scripts
- Unlicensed streaming scripts
- Scripts used for fraud, phishing or spam
- Any script that causes excessive load, abuse or security risk
We may disable, remove or restrict scripts that breach this policy or harm server stability.
17. Automation, bots, scraping and AI tools
You must not use our services to run excessive bots, scrapers, crawlers, automated signup systems, automated posting systems, spam tools, credential testing tools, AI scraping tools or automation that causes abuse, excessive load, privacy risk or third party rights issues.
You must not use our services to scrape, harvest or process personal data unlawfully.
You must not use our services to generate, host or distribute unlawful, infringing, harmful, deceptive or abusive AI generated content.
We may restrict or suspend automation, scripts, bots, crawlers or AI related activity that causes excessive resource usage, breaches third party rights, misuses personal data, sends spam, bypasses security controls or creates legal, security or reputational risk.
18. Streaming, media and downloads
You must not use shared hosting for heavy streaming, mass downloads, commercial audio streaming, live sports streaming or large scale media delivery unless this has been agreed in writing.
If your website needs high volume media hosting, streaming or downloads, you should use a suitable CDN, dedicated service, VPS or other appropriate infrastructure.
19. Reseller accounts
If you use reseller hosting, you are responsible for all accounts, websites, users and clients under your reseller account.
You must ensure your clients comply with this Acceptable Use Policy, our Anti Spam Policy, our Terms of Service and any supplier rules that apply.
We may suspend or restrict individual accounts under a reseller account, or the entire reseller account, where necessary to protect our systems, suppliers or other users.
20. VPS services
For unmanaged VPS services, you are responsible for server administration, updates, security, firewall configuration, backups, monitoring, software, scripts and user activity unless additional management services are purchased.
For managed VPS services, we provide the management services agreed in your plan, quote or service description.
You must not use VPS services for prohibited, abusive, unlawful, harmful or high risk activity.
We may suspend or restrict VPS services where necessary to protect infrastructure, suppliers, other users, IP reputation or legal compliance.
21. Email reputation and blacklists
You are responsible for ensuring your website, forms, scripts, mailboxes and users do not harm email reputation.
If your account causes spam complaints, blacklisting, phishing, spoofing, malware sending or reputation damage, we may suspend mail services, restrict sending, disable scripts, require cleanup or terminate the affected service.
We may charge reasonable costs for investigation, cleanup, blacklist removal, administration or recovery work.
22. Defamation and unlawful content complaints
We are not the publisher of user content hosted through our services.
We will not normally decide legal disputes about defamation, harassment, infringement or unlawful content unless there is a clear legal requirement, court order, regulator instruction, law enforcement request, supplier requirement or serious risk.
Where we receive a credible complaint, we may forward the complaint to you, ask you to respond, request evidence, restrict access, remove content, suspend the service or take other reasonable action.
If a court, regulator, law enforcement agency or other lawful authority requires removal, restriction or disclosure, we may comply.
23. Law enforcement and regulatory requests
We may disclose account, billing, contact, domain, hosting, server log or other relevant information where required by law, court order, regulator, law enforcement request, domain authority, registrar, registry, payment provider, supplier or other lawful process.
We may also preserve or disclose information where reasonably necessary to protect our rights, users, systems, suppliers or the public.
24. Abuse notices and response times
If we contact you about abuse, malware, spam, excessive resource usage, unlawful content, security risks or policy breaches, you must respond promptly and take the required action.
Where a response is required, we may specify a response deadline. Failure to respond within the deadline may result in suspension, restriction or termination.
For serious or urgent issues, we may suspend, restrict or remove access immediately without waiting for a response.
25. Suspension, restriction and termination
We may suspend, restrict or terminate services where we reasonably believe:
- This policy has been breached
- Our Terms of Service have been breached
- Our Anti Spam Policy has been breached
- A supplier rule has been breached
- The service is being used unlawfully
- The service creates a security risk
- The service affects other users
- The service affects server performance
- The service damages email or IP reputation
- The service exposes us to legal, regulatory, supplier or operational risk
- Immediate action is needed to protect systems, data, clients, suppliers or the public
Suspension or termination may happen with or without notice depending on the seriousness and urgency of the issue.
Refunds are not available for services suspended or terminated due to policy breaches, abuse, unlawful activity or security risks.
26. Cleanup and administrative fees
Where your account, website, mailbox, VPS, reseller account or service causes abuse, malware, spam, blacklisting, security incidents, excessive resource usage or other harm, we may charge reasonable fees for:
- Investigation
- Cleanup
- Malware removal
- Spam cleanup
- Blacklist removal
- Administration
- Restoration
- Technical support
- Supplier charges
- Legal or compliance work
- Other remedial work required
27. Changes to this policy
We may update this Acceptable Use Policy from time to time.
The latest version will be published on our website with the updated date shown at the top.
Where practical, we will try to give reasonable notice of material changes.
28. Reporting abuse
If you believe our services are being used in breach of this Acceptable Use Policy, please report it to:
Conor Bradley Digital Agency
Abuse email: ku.oc.yeldarbronoc@esuba
Website: https://conorbradley.co.uk
Please include as much detail as possible, including the domain name, IP address, URLs, screenshots, logs, email headers or other evidence where available.