Overview
This Acceptable Usage Policy applies automatically to all clients upon service subscription. Customer agrees to use the Services only for lawful purposes, in compliance with all applicable law.
Review our acceptable usage policy that applies to all services.
Last updated: November 25, 2019
This Acceptable Usage Policy applies automatically to all clients upon service subscription. Customer agrees to use the Services only for lawful purposes, in compliance with all applicable law.
The following activities are strictly prohibited:
We will not search, sell, rent, lend, exchange, or give your email address or any personal information to any third party without your explicit permission.
Unsolicited email is explicitly prohibited, including opt-in lists. Customers cannot relay mail through other servers without permission or advertise external services pointing to our infrastructure. Violators face account restrictions, suspension, or termination.
Material published must comply with all applicable laws. We reserve discretion to determine what constitutes unlawful, indecent, or objectionable content.
Services cannot be used for file mirroring or distribution as a primary purpose.
It is strictly forbidden to publish adult content on shared web hosting, reseller web hosting, dedicated servers, and colocation servers.
Customers cannot compromise security or tamper with system resources. Any attempt to undermine or exploit system resources is prohibited.
Shared hosting accounts must stay below 15% total system resource usage and cannot provide public online services without authorization.
We have no obligation to provide warnings under any circumstances and can terminate accounts without prior notice for violations of this policy.
Insights, updates, and stories from our team
Is your infrastructure ready for AI workloads? Evaluate compute, storage, networking, and orchestration layer by layer to find the gaps before they stall you.
Prometheus monitoring, Grafana dashboards, log aggregation, and vulnerability scanning ship with every Atmosphere deployment. Security and compliance are built in — not upsold.
Only 54% of AI projects reach production. The bottleneck is infrastructure, not models. Learn how OpenStack and Kubernetes close the gap to deployment.