Security, stability and compliance
Acceptable Use Policy
Last updated: 11 May 2026Responsible-use rules that protect Bacan, its customers and third parties.
1. Scope
This policy forms part of Bacan's conditions of use and applies to hosting, email, domains, reseller services, VPS, servers, web design, support and any related service that refers to it.
A breach may lead to limitation, suspension, removal of content, termination of service, preservation of evidence and, where appropriate, reports to competent authorities.
2. Lawful use
Services may only be used for lawful purposes and in compliance with applicable rules on electronic commerce, data protection, intellectual property, telecommunications, domains and computer security.
Bacan does not actively monitor all hosted content, but may act when it becomes aware of abuse, technical risk or a clear infringement.
3. Prohibited conduct
- Phishing, malware, credential theft, spoofing, social engineering or intrusion tools.
- DDoS attacks, aggressive scanning, brute force, vulnerability exploitation or unauthorised access.
- Open proxies, unlawful anonymous VPN use, exit nodes, abusive cryptocurrency mining or systems that damage the network.
- Identity impersonation, malicious traffic concealment, false data or header manipulation.
- Abusive consumption of CPU, RAM, IO, databases, email, DNS or other shared resources.
4. Prohibited content
- Content that infringes intellectual property, trademarks, image rights or other third-party rights.
- Child sexual abuse material: zero tolerance, immediate blocking and reporting to authorities.
- Fraud, scams, pyramid schemes, unlawful product sales or deceptive investment pages.
- Warez, cracks, serials, malware repositories, botnets, phishing kits or intrusion tooling.
- Services unsuitable for shared hosting, such as sustained streaming, mass mirrors, P2P, IRC, AutoSurf, TopSites or mass SMS gateways.
5. Technical resources
Bacan may apply fair-use limits to protect platform stability. These may affect processes, memory, CPU, database queries, cron tasks, inodes, outbound email, traffic or storage.
When usage affects other customers, Bacan may limit resources, request corrective action or suggest migration to a more appropriate plan.
6. Email and anti-spam
- Unsolicited email, purchased lists, open relays and messages without verifiable consent are prohibited.
- Customers must maintain appropriate SPF and DKIM records, recommended DMARC, functional unsubscribe mechanisms and reasonable bounce and complaint handling.
- If sending activity causes blocking, RBL listings or reputation damage, Bacan may block email, require corrective measures and charge reasonable clean-up costs.
7. Abuse reports
Reports must include the exact URL, domain, factual description, legal basis, available evidence and verifiable contact details.
To report abuse, write to abuse@bacan.com with the subject 'Abuse report'.