Acceptable Use Policy
Home / Acceptable Use Policy (AUP)
SeraHive Acceptable Use Policy (AUP)
Last Updated: March 23, 2025
This Acceptable Use Policy (“AUP”) defines the rules and restrictions that apply to users of SeraHive Global System Integrators Pvt Ltd (“SeraHive,” “we,” “our,” or “us”) services. This policy is designed to protect our users, network, and reputation from abuse.
1. Prohibited Content and Activities
The following content and activities are strictly prohibited on all SeraHive services:
1.1 Illegal Content and Activities
- Content that violates any applicable local, state, national, or international law
- Unauthorized access to, or use of, data, systems, or networks, including attempts to probe, scan, or test vulnerabilities
- Interference with service to any user, host, or network, including mail bombing, flooding, or denial of service attacks
- Activities that could be used to launch Distributed Denial of Service (DDoS) attacks
- Introduction of malicious programs into the network or servers (e.g., viruses, worms, Trojan horses)
- Fraudulent activities, including impersonation or misrepresentation of affiliation
1.2 Abusive or Offensive Content
- Content that promotes or incites violence, terrorism, or hatred against individuals or groups
- Content that is defamatory, harassing, or threatens others
- Content that is excessively violent, incites violence, or contains graphic depictions of violence
- Content containing obscene materials or child exploitation imagery
- Content that infringes on the privacy or publicity rights of others
1.3 Intellectual Property Infringement
- Unauthorized use of copyrighted material, including illegally distributed software, music, video, and other media
- Selling or distributing counterfeit goods or services
- Unauthorized use of trademarks, service marks, or other protected intellectual property
1.4 Unsolicited Communications
- Sending unsolicited bulk email (“spam”)
- Harvesting email addresses or collecting personal information without consent
- Operating, advertising, or promoting email address lists for the purpose of sending spam
- Activities that facilitate the distribution of spam, including providing services to spammers
- Forging or manipulating message headers to disguise the origin of messages
1.5 Resource Abuse
- Cryptocurrency mining without explicit written permission
- Operating high-volume file-sharing applications or websites primarily serving downloadable content
- Running bit torrent applications or servers for extended periods
- Using services as a content delivery network without appropriate subscription
- Any activities designed to place excessive load on our infrastructure
- Operating proxy, VPN, or TOR exit nodes without explicit permission
2. System and Network Security
2.1 Unauthorized Access
You may not attempt to gain unauthorized access to any portion of our network or circumvent user authentication or security of any host, network, or account.
2.2 Network Scanning
Port scanning, vulnerability scanning, and penetration testing of our network or other customer networks is prohibited unless explicitly authorized in advance.
2.3 Security Controls
You are responsible for maintaining reasonable security controls for your service, including:
- Using strong passwords and regularly updating them
- Securing access to administrative controls
- Promptly applying security patches to any software you install
- Implementing appropriate access controls
- Monitoring for unauthorized access or unusual activity
3. Resource Usage Limitations
3.1 CPU and Processing Resources
- Shared hosting accounts are limited to using a reasonable share of system resources
- Processes that consume excessive CPU time, memory, or disk I/O for extended periods are not permitted on shared platforms
- VPS and dedicated server plans have allocated CPU resources as specified in your service plan
3.2 Bandwidth and Data Transfer
- All services include the monthly bandwidth allocation specified in your service plan
- Exceeding your allocated bandwidth may result in additional charges or service limitations
- We reserve the right to limit bandwidth for specific protocols or applications that negatively impact network performance
3.3 Storage Usage
- Storage space is to be used for normal website and application data only
- Using our services primarily for file storage or file sharing is prohibited unless specifically subscribed to a storage-oriented service
- Maintaining backups of your data remains your responsibility
4. Email Policies
4.1 Email Usage
- Mass mailing is only permitted when recipients have explicitly opted in to receive such communications
- Mailing to purchased or rented lists is strictly prohibited
- Sending emails with misleading subject lines or content is prohibited
4.2 Email Technical Requirements
- All bulk email must contain a legitimate unsubscribe mechanism
- Proper reverse DNS must be configured for mail servers
- SPF, DKIM, and DMARC records are strongly recommended
- Open email relays are strictly prohibited
5. Enforcement and Violations
5.1 Monitoring and Investigation
We reserve the right to monitor your service for compliance with this AUP. While we do not actively monitor customer content, we will investigate complaints and may review content when violations are reported.
5.2 Violation Consequences
Violations of this AUP may result in:
- Warning and request to remedy the violation
- Immediate service suspension or limitation
- Termination of services without refund
- Reporting to relevant authorities when required by law
5.3 Reporting Violations
To report violations of this policy, please contact us at abuse@serahive.com with detailed information about the violation.
6. DMCA and Copyright Infringement
6.1 DMCA Compliance
We comply with the Digital Millennium Copyright Act (DMCA) and respond to notices of alleged copyright infringement.
6.2 Copyright Infringement Notices
If you believe your copyrighted work has been used inappropriately on our services, please submit a notification to dmca@serahive.com including:
- Your contact information
- Identification of the copyrighted work
- Identification of the allegedly infringing content
- A statement of good faith belief that the use is not authorized
- A statement under penalty of perjury that the information is accurate
- Your physical or electronic signature
6.3 Counter Notifications
Users who believe a DMCA takedown was in error may submit a counter-notification following the procedures outlined in the DMCA.
7. Changes to This Policy
We reserve the right to modify this Acceptable Use Policy at any time. Changes will be posted on our website and will become effective immediately upon posting. Your continued use of our services constitutes acceptance of any changes to this policy.
8. Contact Information
If you have questions about this policy or need to report violations, please contact us:
- Email: abuse@serahive.com
- Phone: +91 91670 18730, +91 95997 30402
- Address: B/11, Block B, Vintage City, Greater Noida West, Uttar Pradesh, India – 201306