Usage Policy

This policy defines the acceptable use of E5-Compute infrastructure.

1. System Integrity

Users may not attempt to circumvent system security or gain unauthorized access to other accounts or network segments.

2. Resource Usage

While we offer scalable solutions, intentional resource exhaustion that impacts other users is prohibited.

3. Prohibited Content

You may not host content that:

  • Infringes on intellectual property rights.
  • Promotes violence or illegal activities.
  • Contains malware or phishing scripts.

4. Enforcement

Violation of this policy may lead to immediate suspension or termination of services without refund.