What you can and can't do with our products.

Acceptable Usage Policy

1. Hardware and Physical Systems

1.1. Additional hardware tuning (also known as "overclocking") or modifying existing is not acceptable on our services without prior consent.

1.2. Attempts to change, gain unauthorized access or disable any out-of-band access is strictly prohibited.

1.3. Crypto-currency mining is not prohibited on hardware without consent. Crypto validation nodes are conditionally approved for customers who request.

2. Network and Data

2.1. We maintain control over our network, infrastructure and devices. Some of our devices may be controlled by data centers (upstreams) where we lease cabinet space and/or bandwidth as such we control your data and the data that flows on any systems maintained by us.

2.2. You and/or customers that utilise our network to access or distribute content are prohibited from obtaining and/or redistributing any unlawful materials, including but not limited to child pornography, intellectual property and/or unlawful hate-speech materials.

2.3. Any use of "bandwidth mining" technologies falls under Section 1.3 and is not prohibited.

2.4. IPTV (and/or any other media distribution services) is not prohibited on our network without prior consent and valid/current video streaming licenses for the content you are distributing.

3. Lawful Operation

3.1. We abide by the "law of the land" your usage must abide by this convention based upon the geographical location your service is run.

3.2. You are not to store, redistribute or harbour content that is unlawful, this includes but is not limited to protected material by copyright, trademark, trade secrets and/or any other intellectual property laws applicable in the country of operation.

3.3. You are prohibited to use our service(s) for any illegal activities, this is includes but is not limited to denial of service attacks (DDoS) and/or protection of sites advertising such services.

4. Security

4.1. All systems on our network assume allow-list access methods. You must not attempt to gain unauthorized to our systems, other customer systems and/or external systems (regardless of if on our infrastructure). This also extends to attempting to gain access to expired or suspended products (regardless of reason).

4.2. A user must not circumvent (also known as "hacking" or "cracking") any authentication method or security of any network, host or customer account. This extends to the temporary (or permanent) disruption to services known as DDoS attacks, see Section 3.3.

4.3. No unauthorized access and/or use of data, systems or network including attempts to scan, test or circumvent. You are not to test the vulnerability of any system without prior consent from us and any involved provider(s).

5. Reduced Access

5.1. We reserve the right to reduce (and completely restrict) access to your service at any time.

5.2. New accounts will be restricted with burstable bandwidth usage and deployment quantities for the first fourteen (14) days of service operation. This restriction is not applicable for entities with enterprise agreements stating otherwise.

5.3. We may choose to rate-limit or reduce service access for individuals that regularly (or in signifcant excess) exceed fair-usage policies on services.

6. Abuse of Resources

6.1. Some products will reference "shared" (applicable to fair-use terms) resources. Where possible we aim to balance shared resources across a node cluster to ensure everyone can take full advantage of their resources.

6.2. Abuse of resources is described as any activity (intentional or not) that consumes sufficient shared resources causing a degregation in service for other clients or equiptment.

6.3. We will aim to resolve any cases of abuse through remidal action via a ticket with the client. We hold the right to suspend and in extreme cases terminate if corrective actions are not followed.

6.4. Cloud Instance vCPUs are shared between small groups of customers on any given node. Where reasonable clients must not use 90% or more of their allocated vCPUs consecutively for over 1 hour. In cases where a client has consistent usage of their allocated vCPU they may be requested to upgrade to a dedicated vCPU plan.

7. Fair-use and Unmetered

7.1. Bare Metal services provided with unmetered bandwidth, we expect customers to adhere to a "fair-use" bandwidth approach. While we won't charge for network usage, if we detect excessive use such as continuous high-volume or irrelevant traffic (for instance, continuous speed tests), we reserve the right to impose rate limits and communicate with the client (as described in Section 6).

7.2. A client requiring reserved bandwidth, will be offered a quote based on current market rates. This ensures sufficient networking capacity for all customers. For Bare Metal servers, sustained or consistent usage over 1 Gbps 95th percentile is generally considered our upper limit for fair-use bandwidth.

7.3. Cloud Instances operate with a similar fair-use model, with ports being shared across any given node. We may enforce rate limits on virtual port usage if we observe sustained high usage beyond reasonable fair-use.

7.4. Sustained or constant usage over 35Mbps per GB of RAM (95th percentile) is typically seen as the upper limit for fair-use bandwidth for Cloud Instances. This excludes plans sold with a specific bandwidth entitlement included defined (typically) in TB on the service page.

7.5. DDoS Protected Bandwidth is billed independantly to services. 30TB/mo is included within your service quote unless specified in the terms of your agreement. Additional excess is billed at £3.45/TB/mo unless agreed upon with your account/sales manager.

8. TOR and Anonymity Networks

8.1. You are permitted to run TOR nodes on our services. Any or all abuse emails relating to your service will be forwarded to you via email (or a ticket), and a prompt response is expected. For TOR in particualr you can find some common/best practices for these responses here.

9. Account Restrictions (previously ARPs)

9.1. Scaleblade may identify your account as "at-risk" and put it into bad standing. Depending on the risk factor you may be limited on the type of service you can deploy. Account standing is calculated for all projects owned by one account.

9.2. New accounts will be given a 14-day grace period where they will be classed as "at-risk". New accounts can bypass this 14-day restriction by opening a support ticket and completing a identity check with a form of Government ID.

10. Abuse Policies (Free Speech and Neutrality)

10.1. Scaleblade aims to align itself with a free-speech policy in regards to content moderation. We do not act upon, restrict or filter content or a service based on political belief, race, gender/sex(, etc) abuse reports.

10.2. Scaleblade is not a "bullet-proof hosting" provider. All content must comply with local laws in the location that the service is hosted in including copyright and DMCA compliance.

10.3. We aim to verify abuse report authenticity (and copyright holding) we will then forward this report to you (the client) to appropriately deal with. In the event you do not comply with a lawful request (copyright or other) we may have to restrict or suspend your service.

10.4. Clients are given a period of ten (10) days to respond to abuse reports once sent by Scaleblade before escalated action.

10.5. Abusive practicies including but not limited to (Outbound ddos attacks, email spam, bot spam, abuse of resources, command and control servers) are not covered under protected or free speech and violate other usage clauses laid out in this agreement.