- Master Service Agreement
- Privacy policy
- General Data Protection Regulation, GDPR
- Domain deletion and auto renewal policy
- Policy on Transfer of Registrations between Registrars
- dotUA Policy Information
- Claim Consideration Policy
- Domain Registration Reseller Agreement
- Know Your Customer procedure
- Registrant rights and responsibilities
ACCEPTABLE USE POLICY
Effective date 28.10.2024
(revised)
(revised)
This acceptable use policy (hereinafter “AUP”) is entered by and between
COMPANY (or “We”), which means and includes Our successors, assigns and affiliates), and YOU, personally or the person on whose behalf You legally act (hereinafter referred to as “You”),
defines acceptable practices relating to the use of Company’s Services, registered domain names by You and Your users, partners, contractors, users, as follows:
Prohibited Uses
It is prohibited to use Services, Our Website, web-platforms, applications, products for or in connection with:
-
Dissemination of any information, photo, or video materials that encourage, propagandize, directly or indirectly
- military actions, justify war and/or military actions or any encroachment on states' territorial integrity and sovereignty; or
- national, ethic, racial, religious controversy, all types of chauvinism, information that constitutes incitement, appeal, justification, or encouragement of any discrimination, hostility, violence, cruelty to animals, destruction, property damage; or
- terrorism
-
Distribution of sexual or erotic materials that depict people under the age of eighteen (18) or in such a way as to suggest that they are under the age of eighteen (18), as well as other forms of sexual or erotic materials that are prohibited by applicable law (by the law of every and all states in whose territory the said materials are available.
-
Posting materials that contain information that depicts incest, snuff, excrement, or excretion of human body waste on another person, depicts or is associated with mutilation, rape, or zoophilia.
-
Distribution or provision of access to materials (content, software, torrent trackers, online cinemas, etc.) in violation of the intellectual property rights of any person, including, but not limited to, violation of copyright, related rights.
-
Distribution or promotion of information, materials, goods, or services violating a third party's trademark (logo, name, title) rights, patent rights, and trade secrets.
-
Sending messages to unsolicited mail, including sending “spam” or other promotional materials to persons who do not directly request such materials, or with whom You have no business relationship; or distributing, advertising or promoting software or services whose primary purpose is to encourage or facilitate the operation of unsolicited commercial email or spam, as well as mailing or advertising with elements that may be considered obscene, offensive, harassing, threatening.
Distribution of malware, codecs, and other similar software.
Implementation of actions aimed at seizing control (escalation of rights) over a remote/local computer system, or destabilizing it, or denial of service, or for similar purposes.
Collection, processing, publication, or dissemination of information violating privacy rights and obligations to maintain confidentiality or protect personal data.
Hacking attempts (phishing, fraud, etc.).
Causing damage to other people or entities.
Fraud and activities that require obtaining prior permits or licenses without such permits or licenses.
Creation and distribution of scripts and/or software for automatic account creation and automated reporting.
Dissemination of false or distorted information, including disinformation campaigns, as well as offensive and similar information.
Distribution of information about suicide and self-harm intended to shock or engage in such activities, as well as dissemination of materials that encourage dangerous or illegal activities.
Human trafficking, illicit sex work and pimping, sexual exploitation, trade in organs or human biological materials for donation.
Threats of bodily harm or other types of threats.
Promotion and distribution of prohibited or restricted services or goods, including, but not limited to, illegally obtained financial information, explosives/weapons, endangered species, prescription pharmaceuticals, drugs, counterfeit documents or money, etc., including publishing or distributing instructions for its manufacture.
Forgery of signatures or other identifiers of any person, as well as participation in activities aimed at deceiving others about the user’s identity.
Implementation of deceptive marketing techniques and activities that require obtaining prior authorizations or licenses without such authorizations or licenses.
Actions intended to abuse, restrict or interfere with the actions of another person using the Services, including by generating excessive network traffic through the use of automated or manual functions that are not related to the usual, personal or business use of Services.
Causing or attempting to cause security breaches or interruptions in Internet communications.
Performing any form of network monitoring that shall intercept data not intended for You.
Bypassing user authentication or security of any host, network, or account.
Interfering with or denial of service to your own websites (for example, a denial-of-service attack).
Using any program/script/command or sending messages designed to interfere with or disable another person's dialog session.
Providing false or incorrect data, including fraudulent use of credit card numbers, or attempting to circumvent or alter the processes or procedures for measuring time, bandwidth usage.
Causing concerns through the use of a particular language, sending frequency or message size.
Unauthorized use or forgery of message header information.
Soliciting a mailing address or any other email address other than an advertising account or services for the purpose of stalking or collecting responses.
Creating or forwarding “chain letters” and any other type of “pyramid schemes”.
Use of unsolicited email generated as part of use of the Services or networks of other Internet service providers on our behalf or for advertising any Services or enabled through the Services.
Exporting, re-exporting, or allowing the download of any content in violation of applicable export-import laws or without all necessary approvals or licenses.
Selling, exporting or re-exporting of the Services, directly or indirectly, in violation of any U.S. or EU sanctions, export or import laws, any executive orders, or any rules, regulations or orders issued by the U.S., European Union authorities.
You shall undertake Your best efforts to ensure that the purpose of this clause is not frustrated by any third parties further down the commercial chain, including by possible resellers. You shall set up and maintain an adequate monitoring mechanism to detect conduct by any third parties further down the commercial chain, including by possible resellers, that would frustrate the purpose of this clause.
Hosting, displaying, uploading, modifying, publishing, transmitting, storing, updating or sharing any information that violates Rule 3(1)(b) of the Intermediary Guidelines and Digital Media Ethics Code Rules, 2021.
The presence of the following programs or actions related to them, regardless of whether the actual intrusion leads to damage or loss of data: a server alert message or any message sent on an injection basis to any directly or indirectly connected network; attempt to bypass any user authentication or host, network or account security system; access to data not intended for the user; studying the security level of another network; creation of multiple processes; port scanning, query flooding, packet forgery, routing information spoofing; denial-of-service attacks, traffic sniffers, flooding, spoofing, ping attacks, smurf attacks, WinNuke attacks, land and teardrop attacks, virus propagation, as well as IRC bots such as egg-drop or BitchX.
Carrying out any other illegal activity or violating any applicable law, the rights of third parties in the territory of any country where you operate, or Your Content is available.
Investigations
In most cases, We shall notify You of complaints received regarding violations. You agree to promptly investigate all such complaints and take all necessary actions to remedy any violations. We may inform the complainant that You are investigating the complaint.
You shall make the most in order all the complaint reports of third parties be considered and resolved promptly. If Company shall become aware of AUP violation, Company may initiate an investigation that may include collecting information from You within terms specified by Company. You shall comply with all reasonable requests pursuant to investigations. You shall cooperate with Company in good faith. If You shall not provide assurances that You shall not violate AUP, or shall not get in communication with Company (including ignorance of notifications within the period specified by Company or providing incomplete information) Company may suspend Services or terminate Agreement.
Company shall fully cooperate with law enforcement authorities in investigating suspected lawbreakers and reserves the right to report to law enforcement authorities any suspected illegal activities that Company may become aware of.
Company reserves the right to disclose Your or Users’ information to the extent authorized by law. Company reserves the right to access, read, preserve, and disclose any information as Company reasonably believe is necessary and legitimately to
respond to any applicable law, regulation, legal process or governmental request; or
enforce AUP, including investigation of potential violations hereof; or
detect, prevent, or otherwise address fraud, security or technical issues; or
respond to all the legal requests; or
protect the rights, property or safety of Company, Our partners and the public.