
Acceptable Use Policy
Effective Date: 16/01/2026
By using our services, you agree to comply with our Acceptable Use Policy ("AUP"), so please read them carefully.
1. Prohibited Activities
You are prohibited from using our services to publish content or participate in activities that are illegal under applicable law, harmful to others, or could potentially expose us to liability. This includes, but is not limited to, the following prohibited activities under this Acceptable Use Policy (AUP):
1.1 Security and Access Violations
- Unauthorized Network Scanning: Conducting port scans, vulnerability assessments, or security testing on systems or networks without explicit authorization.
- Unauthorized Access: Attempting to gain unauthorized access to accounts, systems, or networks, or attempting to penetrate security measures.
- Identity Fraud: Engaging in phishing, spoofing, or any form of identity theft or fraudulent impersonation.
- Phishing and Social Engineering: Hosting phishing pages, distributing phishing kits, conducting credential harvesting, or facilitating social engineering attacks designed to deceive users into revealing sensitive information.
1.2 Malicious Software and Network Attacks
- Malicious Code: Distributing, uploading, or facilitating the spread of viruses, worms, Trojan horses, ransomware, or other malicious software.
- Botnet and Malware Distribution: Hosting, distributing, or operating command and control (C&C) servers for botnets, malware, or other malicious software designed to compromise systems or networks.
- Network Attacks: Facilitating or conducting Denial of Service (DoS), Distributed Denial of Service (DDoS), or other attacks that disrupt network services.
1.3 Communications and Spam
- Unsolicited Communications: Distributing spam, unsolicited bulk emails, or other unwanted communications.
- Spam and Email Abuse: Operating open relays, generating backscatter, harvesting email addresses, or engaging in other email abuse practices that disrupt email services or violate anti-spam regulations.
1.4 Intellectual Property and Content
- Copyright Infringement and Piracy: Distributing, downloading, or facilitating the distribution of copyrighted material without authorization. Customers who receive copyright infringement notices must immediately cease the infringing activity and comply with all takedown requests. Continued infringement after notice may result in immediate service termination.
- Intellectual Property Infringement: Violating intellectual property rights, including copyright, trademark, or patent infringement.
1.5 Illegal Goods, Services, and Fraud
- Illegal Goods and Services: Facilitating the sale, distribution, or promotion of illegal goods or services, including but not limited to drugs, weapons, stolen goods, counterfeit merchandise, or services that violate applicable law.
- Fraud and Scams: Engaging in or facilitating fraudulent schemes, including pyramid schemes, investment fraud, romance scams, advance-fee fraud, or other deceptive practices designed to obtain money or valuables through deception.
1.6 Illegal Content and Discrimination
- Illegal Content: Publishing, hosting, or distributing content that is illegal under applicable law, including illegal escort services and non-consensual intimate imagery. Adult content and pornography are permitted only when fully compliant with UK law, including mandatory age verification systems, consent from all participants, and adherence to all applicable regulations regarding content classification and distribution.
- Hate Speech and Discrimination: Promoting, facilitating, or engaging in hate speech, discrimination, or harassment based on protected characteristics including race, ethnicity, religion, gender, sexual orientation, disability, or national origin.
1.7 Cryptocurrency and Resource Abuse
- Unauthorized Cryptocurrency Mining: Conducting cryptocurrency mining operations without explicit authorization or using resources beyond allocated limits.
1.8 Customer Responsibility
- Third-Party Liability: Customers are responsible for the actions of all authorized users of their account. Customers may not resell, redistribute, or allow third parties to use services for prohibited activities. Customers must ensure all authorized users comply with this policy.
2. Child Sexual Abuse Material (CSAM)
ParadoxNetworks Limited has a zero-tolerance policy for child sexual abuse material (CSAM) and any content depicting the exploitation or abuse of minors. This is a serious criminal offense and a severe violation of this policy.
2.1 Prohibited Activities
- Publishing, distributing, possessing, or facilitating access to child sexual abuse material (CSAM)
- Creating, producing, or commissioning content depicting the exploitation or abuse of minors
- Grooming, soliciting, or facilitating the abuse of minors
- Any activity that sexualizes, exploits, or harms children
2.2 Mandatory Reporting
ParadoxNetworks Limited will:
- Immediately suspend or terminate services upon discovery of CSAM or child exploitation
- Report all violations to the National Center for Missing & Exploited Children (NCMEC)
- Report violations to relevant law enforcement authorities
- Preserve all evidence and cooperate fully with investigations
- Not provide advance notice before reporting to authorities
Customers acknowledge that ParadoxNetworks Limited will not hesitate to report suspected child exploitation to law enforcement and will not provide warning or opportunity to delete evidence.
3. Blacklist Policy
You are prohibited from utilizing our services in a manner that results in us or our resources being subjected to blacklisting or blocking. We retain the right to suspend or terminate your services, client account, and any access to our network or physical infrastructure. Engaging in operations or reselling services on behalf of or in connection with individuals or entities listed in the Spamhaus Register of Known Spam Operations database at https://check.spamhaus.org/ will be regarded as a breach of this Acceptable Use Policy (AUP).
3.1 Abuse Reporting and Customer Cooperation
Customers who discover abuse or violations of this policy occurring on their account or services must immediately report such activity to ParadoxNetworks Limited at abuse@pdxnet.co.uk. Customers are required to:
- Promptly report any suspected abuse or policy violations discovered on their account
- Cooperate fully with ParadoxNetworks Limited investigations into alleged violations
- Preserve evidence and logs related to suspected abuse
- Implement reasonable security measures to prevent unauthorized use of their account
- Notify ParadoxNetworks Limited immediately upon discovering account compromise or unauthorized access
Failure to report known abuse or cooperate with investigations may result in service suspension or termination.
3.2 Monitoring and Logging
ParadoxNetworks Limited reserves the right to monitor network traffic, account activity, and service usage to detect and prevent violations of this policy. Customers acknowledge that:
- ParadoxNetworks Limited may monitor account activity for compliance purposes
- Logs and records may be retained for abuse investigation and law enforcement cooperation
- Monitoring may include automated detection systems and manual review
- Evidence of policy violations may be shared with law enforcement or relevant authorities
- Customers have no expectation of privacy in activities conducted through our services that violate this policy
4. Prohibited Network Activities
4.1 Tor Nodes
The use of Tor Exit, Tor Relay, and Tor Bridge nodes on our network using our IP address space is strictly prohibited. Violation of this policy will lead to the immediate suspension and/or termination of your services and/or client account.
5. BGP Usage Policy
BGP (Border Gateway Protocol) services are provided under strict compliance policies to ensure the stability and security of our network and the wider internet. Customers utilizing BGP must adhere to the following guidelines:
5.1 BGP Configuration and Use
5.1.1 Route Announcements
- Customers must ensure that all BGP route announcements are accurate, necessary, and authorized. Only prefixes owned by the customer or explicitly allowed by the prefix owner should be announced.
5.1.2 Route Registry Accuracy
- It is required that customers maintain accurate records in an Internet Routing Registry (IRR) for all prefixes they announce. Additionally, creating Route Origin Authorizations (ROAs) via the RPKI system is highly recommended to improve routing security.
5.1.3 Prevention of Route Leaks
- Customers must implement appropriate prefix filters based on their routing policy to prevent route leaks and mis-announcements. This includes both outgoing and incoming route filters to and from ParadoxNetworks Limited.
5.1.4 Coordination and Notification
- Any significant changes to BGP configurations or planned large-scale announcements must be pre-coordinated with ParadoxNetworks Limited's network operations team to ensure network stability and to prevent any adverse impacts.
5.2 BGP Community Usage
5.2.1 BGP Community Support
- ParadoxNetworks Limited provides BGP community tags to customers for managing traffic flows and implementing routing policies. The use of these communities must adhere to the guidelines provided by ParadoxNetworks Limited.
5.2.2 Prohibited Uses
- Manipulating BGP communities to circumvent ParadoxNetworks Limited's traffic engineering, cause unnecessary route propagation, or otherwise negatively impact network performance or stability is strictly prohibited.
5.3 Monitoring and Compliance
5.3.1 Monitoring
- ParadoxNetworks Limited actively monitors BGP sessions for anomalies, misconfigurations, and policy violations. Customers found to be in violation may have their BGP sessions temporarily suspended pending resolution.
5.3.2 Compliance
- Failure to comply with these BGP usage policies may result in temporary suspension or permanent termination of BGP services and, depending on the severity, may impact the overall service.
Customers are encouraged to engage with our technical support team for best practice advice, configuration assistance, and any questions regarding BGP service use. Ensuring the security and stability of our network and the broader internet ecosystem is a shared responsibility, and we appreciate our customers' adherence to these policies.
6. Resource Usage Policy
6.1 Fair Use of Resources
6.1.1 CPU and RAM Usage
- Activities that consistently utilize excessive CPU or RAM may adversely affect the performance for other users on the same server. We reserve the right to limit CPU resources for processes that negatively impact overall server performance.
6.1.2 Bandwidth
- Bandwidth usage is monitored monthly for each customer. Usage exceeding the allocated limit may result in throttled internet speeds or the imposition of additional charges.
6.2 Monitoring and Enforcement
To ensure compliance with our resource usage policy, we implement the following measures:
6.2.1 Automated Monitoring
- Automated systems are in place to monitor and manage resource usage across all hosted services.
6.2.2 Notification of Excessive Use
- Customers whose resource usage poses a threat to the stability of our environment will be notified and provided with options to either reduce their usage or upgrade their service plan.
6.2.3 Remedial Actions
- In instances of significant overuse, we may take necessary actions to maintain server stability, including the temporary suspension of services or an automatic upgrade to a higher service plan, subject to the customer’s agreement.
This Resource Usage Policy aims to prevent the misuse of shared resources and guarantee access to necessary services for all customers. Adhering to these guidelines is crucial for maintaining the high performance and reliability of our hosting services, benefiting all users.
7. Colocation Services Policy
7.1 Power Consumption Policies
7.1.1 Power Allocation
- Each colocation customer is allocated a specific amount of power usage based on their service plan. It's crucial to operate within these limits to ensure the stability and efficiency of the data center's power resources.
7.1.2 Monitoring and Compliance
- Power usage is monitored to ensure compliance with allocated limits. Customers consistently exceeding their power allocation may be subject to additional charges or may need to upgrade their service package to accommodate their power needs.
7.1.3 Energy Efficiency
- Customers are encouraged to utilize energy-efficient equipment to minimize power consumption. This contributes to the overall sustainability of the data center and supports our commitment to environmental stewardship. Using modern, efficient hardware reduces operational costs and enhances environmental benefits.
Customers should consult the details of their specific service plan for comprehensive information on power usage allocation and any associated fees for exceeding these limits. Our aim is to provide a reliable and sustainable hosting environment, and adherence to these power consumption policies is essential for all colocation clients.
For further details on accessing colocated equipment and additional terms, please refer to the Terms of Service (TOS) available at https://pdxnet.co.uk/tos.
8. IP Transit Services Policy
8.1 Usage and Bandwidth
- Fair Use: Customers are expected to use IP Transit services within the allocated bandwidth limits and not to exceed agreed-upon capacity without prior arrangement.
- Traffic Management: ParadoxNetworks Limited reserves the right to implement traffic management policies to ensure equitable access and network efficiency for all customers.
8.2 Security and Compliance
- DDoS Protection: In the event of a DDoS attack targeting customer networks, ParadoxNetworks Limited will implement protective measures by blackholing traffic to the affected IP addresses down to the most specific /32 (for IPv4) or /128 (for IPv6) prefixes. This action is taken to mitigate the impact of the attack on the broader network and maintain service stability for all customers.
- Lawful Use: All use of IP Transit services must comply with applicable laws and regulations, including those related to data protection and copyright.
9. UK Broadband Provisions
9.1 Compliance with UK Broadband Code of Practice
ParadoxNetworks Limited complies with the UK Broadband Code of Practice and relevant Ofcom regulations. All broadband services provided are subject to the following provisions:
9.2 Service Quality and Performance
- Reasonable Speeds: ParadoxNetworks Limited will provide broadband services at speeds that are consistent with the service plan purchased. Actual speeds may vary due to network conditions, equipment, and usage patterns.
- Service Availability: We aim to maintain service availability of 99.5% uptime, measured monthly. Scheduled maintenance windows are excluded from uptime calculations.
- Performance Monitoring: Customers have the right to monitor their service performance and request performance reports upon request.
9.3 Fair Usage and Traffic Management
- Fair Usage Policy: All broadband services are subject to fair usage policies to ensure equitable access for all customers. Excessive usage that impacts network performance may result in traffic management or service throttling.
- Traffic Management Transparency: ParadoxNetworks Limited will transparently communicate any traffic management practices and their impact on service performance.
- Notification of Changes: Customers will be notified of any changes to traffic management policies with reasonable notice.
9.4 Complaints and Dispute Resolution
- Complaints Procedure: Customers with complaints regarding broadband service quality should contact ParadoxNetworks Limited at legal@pdxnet.co.uk. We will acknowledge receipt of complaints within 2 business days and provide a substantive response within 14 days.
- Alternative Dispute Resolution: If a complaint cannot be resolved through direct negotiation, customers may refer the matter to an approved Alternative Dispute Resolution (ADR) provider.
- Ofcom Escalation: If disputes cannot be resolved through ADR, customers have the right to escalate complaints to Ofcom, the UK communications regulator.
9.5 Service Suspension and Termination
- Suspension Procedures: ParadoxNetworks Limited will provide reasonable notice before suspending broadband services for non-payment or policy violations, except in cases of emergency or serious breach.
- Termination Notice: Customers will receive at least 30 days' written notice before termination of broadband services, except in cases of serious breach or emergency.
- Data Preservation: Upon service termination, customers will have a reasonable period to retrieve their data before access is permanently revoked.
9.6 Billing and Charges
- Transparent Pricing: All charges for broadband services will be clearly itemized and explained. Customers will receive detailed invoices showing all applicable charges and fees.
- Price Changes: Any changes to broadband service charges will be communicated to customers with at least 30 days' notice. Customers have the right to cancel services without penalty if they do not accept price increases.
- Billing Disputes: Customers may dispute charges within 30 days of invoice issuance. Disputed amounts will not accrue interest or late payment penalties pending resolution.
10. General Compliance and Enforcement
10.1 Adherence to Policies
Customers must ensure their use of ParadoxNetworks Limited's services is in full compliance with our Terms of Service (TOS) and the Acceptable Use Policy (AUP). This includes, but is not limited to, maintaining the security and integrity of their systems and data, and not engaging in activities that could harm ParadoxNetworks Limited's network, affect other customers, or negatively impact the broader internet.
10.2 Responsibility for Compliance
It is the customer's responsibility to understand and adhere to all applicable policies and guidelines. This responsibility extends to ensuring that their use of ParadoxNetworks Limited's services does not result in harm or disruption to the network, other users, or the internet at large.
10.3 Consequences of Violation
Violations of these policies may lead to enforcement actions, including but not limited to:
- Temporary suspension of services.
- Permanent termination of services.
- Other actions as deemed necessary to maintain the integrity and security of ParadoxNetworks Limited's services and infrastructure.
ParadoxNetworks Limited is dedicated to offering a secure, reliable, and high-quality hosting environment. We expect all customers to contribute positively to this environment by adhering strictly to these policies.
11. Reporting Violations
11.1 How to Report
Misuse of services can be reported to abuse@pdxnet.co.uk, with a commitment from ParadoxNetworks Limited to investigate thoroughly and take appropriate action.
You may or may not receive a response if action is taken. Law enforcement is encouraged to contact us at legal@pdxnet.co.uk with all requests.
12. Legal Compliance
Users must comply with all relevant laws and regulations while using our services, including but not limited to data protection laws, copyright laws, and anti-spam regulations.
13. Disclaimer of Liability
ParadoxNetworks Limited is not responsible for the content transmitted or stored on its network by users. Users are solely responsible for their actions and content.
14. Unfair Contract Terms Act 1977
ParadoxNetworks Limited ensures that all terms and conditions in this Acceptable Use Policy are fair, reasonable, and transparent. We do not exclude or limit liability for death, personal injury, or fraud. Any limitations of liability apply only to the extent permitted by law and are intended to be fair and proportionate to the services provided.
15. Electronic Commerce Regulations 2002
ParadoxNetworks Limited is registered as a service provider under the Electronic Commerce Regulations 2002. We maintain clear identification of our business, transparent pricing including all applicable taxes and fees, and accessible complaint handling procedures. Customers may refer unresolved complaints to an approved Alternative Dispute Resolution (ADR) provider.
16. Limitation Period
Customers must bring any claims arising from this Acceptable Use Policy or related to service violations within 6 years of the date the cause of action arose, in accordance with the Limitation Act 1980.
17. Changes to the Policy
ParadoxNetworks Limited reserves the right to update or modify the Acceptable Use Policy at any time. Users will be notified of any changes. It is the responsibility of the customer to regularly review the policies to ensure compliance. The continued use of our services after any such changes constitutes acceptance of the updated policies.