SECURITY
No Abuse
Malware, phishing, DDoS, brute-force attacks, credential theft, and unauthorized scanning are strictly prohibited.
AUP
This policy defines acceptable and prohibited use of Zmirf services, including hosting, reseller accounts, domain operations, and managed infrastructure.
Last updated: March 18, 2026
SECURITY
Malware, phishing, DDoS, brute-force attacks, credential theft, and unauthorized scanning are strictly prohibited.
LEGAL
Content or operations that violate criminal law, IP rights, privacy law, or sanctions regimes are not allowed.
OPERATIONS
Service use must not degrade shared infrastructure or impact other customers through excessive or abusive consumption.
Acceptable use rules protect service stability, legal compliance, and customer trust. Organizations should align internal processes with these requirements before onboarding users, launching campaigns, or integrating third-party tools that generate traffic or process sensitive data.
Most policy violations come from unclear ownership or unmanaged automation. Defining responsible roles for security, content moderation, and incident response lowers risk and helps teams react quickly if abnormal activity is detected across accounts or hosted workloads.
FAQ
Depending on severity, actions can include warning, temporary restriction, suspension, or termination.
Set clear ownership for content, campaigns, and security monitoring before launch.
Practical controls include approval flows for high-volume campaigns, abuse reporting procedures, and routine reviews of integrations that can impact traffic quality, security posture, or legal compliance obligations.
Yes. Third-party scripts, automations, or traffic tools can still create abuse or compliance risk.
Review integrations for behavior, data handling, and traffic patterns before production deployment, and keep monitoring active after launch to catch unexpected policy-impacting behavior early.