Acceptable Use Policy

VEQTOR Africa Legal

Last updated:

1. Introduction

This Acceptable Use Policy (“AUP”) forms part of the agreement applicable to all services, products, websites, systems, applications, networks, infrastructure and related offerings provided by VEQTOR Africa. This AUP is intended to ensure compliance with the laws of the Republic of South Africa, protect VEQTOR Africa’s systems and services, protect customers, third parties and the broader internet community, and provide a clear framework for conduct regarded as unacceptable when using VEQTOR Africa services.

By accessing the VEQTOR Africa website, ordering, using, or continuing to use any VEQTOR Africa service or product, the customer or visitor agrees to be bound by this AUP together with VEQTOR Africa’s other applicable terms, policies and service conditions.

2. Lawful Use and General Standard of Conduct

VEQTOR Africa services may only be used for lawful purposes and in a lawful manner. Customers may not use VEQTOR Africa services, systems or network in any way that is unlawful, fraudulent, abusive, harmful, defamatory, threatening, discriminatory, offensive, deceptive, invasive of privacy, or disruptive to VEQTOR Africa, other customers, third parties, or the public. Customers remain solely responsible for all content, actions, systems, applications, mail services, websites, databases, scripts and traffic generated from or hosted through their accounts or services.

3. Prohibited Content and Unlawful Activity

Customers may not use VEQTOR Africa services to store, publish, distribute, transmit, facilitate or link to any material or activity that violates the laws of South Africa or applicable international law. This includes, without limitation, content or conduct involving:

  • child sexual abuse material, child exploitation material, or any material unlawful in relation to minors;
  • obscene, unlawful or prohibited material;
  • unlawful discrimination, racial slurs, religious slurs, gender-based slurs, or unlawful hate speech;
  • speech or content intended to incite violence, intimidation or unlawful hatred;
  • defamation, harassment, stalking, threats, abuse or conduct intended to harm another person;
  • fraud, scams, deception, impersonation, misrepresentation or identity abuse;
  • pyramid schemes, unlawful financial schemes, or dishonest commercial activity;
  • any activity that infringes the rights, safety, dignity or lawful interests of others.

4. Intellectual Property and Copyright

Customers may not use VEQTOR Africa services in a manner that infringes copyright, trademarks, trade secrets, patents, database rights, licensing restrictions, or other intellectual property rights. This includes the distribution, sale, hosting, publication, sharing or facilitation of pirated software, unlawful streaming content, illegal downloads, counterfeit material, or other material distributed without the required rights, permissions, licences or authority.

5. Privacy and Personal Information

Customers may not unlawfully collect, intercept, process, publish, expose, sell or misuse personal information, confidential data, credentials, communications, usage information or private records belonging to any other person or entity. Any use of VEQTOR Africa services involving personal information must comply with applicable privacy and data protection laws, including POPIA where applicable.

6. Fraud, Misrepresentation and Account Misuse

Customers may not use VEQTOR Africa services to commit or facilitate fraud, misrepresentation or unauthorised transactions. This includes, without limitation:

  • impersonating another customer, business or individual without authority;
  • attempting to transact, subscribe, cancel or make changes on behalf of another person without lawful authority;
  • using false registration details, stolen identities, or fraudulent payment methods;
  • misrepresenting services, websites, products or offers hosted through VEQTOR Africa infrastructure.

7. Network Security and System Integrity

Customers may not engage in any conduct that threatens, weakens, interferes with, degrades, probes, abuses or compromises the security, operation, integrity or availability of VEQTOR Africa’s network, infrastructure, systems or services, or that of any third party. Prohibited conduct includes, without limitation:

  • attempting to gain unauthorised access to any system, service, account, application, device or network;
  • bypassing or attempting to bypass authentication or security controls;
  • hacking, cracking, credential stuffing, brute force activity, or privilege escalation attempts;
  • forging packet headers, spoofing, deceptive routing, or falsifying sender identity;
  • port scanning, vulnerability scanning, probing or monitoring without explicit written authorisation;
  • interfering with, altering or accessing another person’s software, data or systems without consent;
  • knowingly deploying insecure applications or services with critical known vulnerabilities where such deployment creates material risk to the network or third parties.

8. Denial of Service, Malware and Harmful Code

Customers may not use VEQTOR Africa services to launch, relay, host, facilitate, support, participate in or conceal denial of service attacks, distributed denial of service attacks, traffic flooding, amplification attacks, reflection attacks, mailbombing, network disruption or related abusive activity. Customers may not knowingly host, transmit, execute, link to or distribute malware, viruses, worms, trojans, botnets, ransomware, spyware, destructive code, phishing kits, credential theft tooling, command-and-control infrastructure or similar harmful software or components.

9. Open Relays, Amplification and Vulnerable Services

Customers must not operate services in a manner that exposes VEQTOR Africa or third parties to abuse, including, without limitation, insecure or publicly accessible SMTP relays, open DNS recursion where it may be used in amplification attacks, insecure proxies, vulnerable web applications, weakly secured APIs, abused form handlers, or other services that may be used for spam, abuse, relay or traffic amplification. VEQTOR Africa may require such services to be secured, limited, suspended or removed.

10. Resource Usage, Bandwidth and Shared Hosting Fair Use

Customers may not use VEQTOR Africa services in a manner that unreasonably consumes or monopolises shared or allocated resources, including CPU, RAM, disk I/O, storage, mail services, database capacity, process execution time, network throughput, connection capacity, or other platform resources, in a way that degrades service for others, creates operational risk, or places the platform under unreasonable strain.

Certain VEQTOR Africa shared hosting services may be advertised as including unmetered or unlimited data transfer. This does not mean that bandwidth throughput, port speed, CPU time, memory, disk I/O, process execution, mail usage, database activity, or platform impact are unlimited. All shared hosting services remain subject to fair and responsible use, package specifications, technical operating limits, acceptable platform behaviour, and the requirement that one customer’s use must not materially impair the performance, availability, security or stability of the shared environment for other customers.

Where VEQTOR Africa reasonably determines that a customer’s traffic profile, resource consumption, service configuration, usage behaviour, or technical footprint is excessive, abusive, commercially unreasonable, or unsuitable for a shared hosting environment, VEQTOR Africa may apply traffic management measures, require remediation, suspend affected services or functions, recommend migration to a VPS, cloud, dedicated or other more suitable service, or take such other steps as may reasonably be required to protect the platform and other customers.

11. Spam and Unsolicited Electronic Communications

It is contrary to VEQTOR Africa policy for customers to use VEQTOR Africa services, infrastructure or systems to send, relay, receive, facilitate, advertise through, or support unsolicited bulk communications. Prohibited activity includes, without limitation:

  • sending unsolicited bulk email for commercial, political, religious or other purposes;
  • operating mailing lists without the express and provable consent of all recipients;
  • sending “opt-out” mail where recipients did not first opt in;
  • failing to maintain reliable records of consent for mailing lists;
  • failing to honour unsubscribe requests promptly and effectively;
  • continuing to email invalid, unwilling or undeliverable recipients;
  • using VEQTOR Africa systems to collect replies to spam sent elsewhere;
  • advertising a website, service, IP or facility hosted on VEQTOR Africa infrastructure through spam;
  • referencing VEQTOR Africa in headers or identifying information in connection with spam activity;
  • failing to secure a mail server against unauthorised public relay.

VEQTOR Africa may treat list-washing, bought lists, scraped addresses, harvested email data and similar practices as spam-related activity even where a customer claims otherwise.

12. Prohibited Commercial and Deceptive Services

Customers may not use VEQTOR Africa services for unlawful, deceptive, exploitative or abusive commercial practices. This includes, without limitation, fraudulent offers, fake stores, impersonation-based selling, scam operations, coercive donation schemes, and misleading pseudo-services offered in exchange for payment where the service is inherently deceptive, abusive or unlawful.

13. Public Spaces, Third-Party Content and External Platforms

VEQTOR Africa does not control all information passing over the internet or all third-party content accessible through services, search tools, directories, links, email, chat rooms, forums, bulletin boards, news groups or similar public spaces. VEQTOR Africa acts as a provider of infrastructure and access and does not generally moderate third-party spaces or communications by default. Customers access and use public internet spaces and third-party content at their own risk and remain responsible for evaluating such content and complying with applicable rules, laws and standards.

14. Usenet, Forums and Discussion Platforms

Customers who access or participate in Usenet groups, forums, message boards, moderated communities or similar public discussion areas using VEQTOR Africa services must comply with the rules and posting standards applicable to those spaces. Without limitation, prohibited conduct includes:

  • excessive cross-posting of the same or substantially similar material;
  • posting irrelevant, misleading or off-topic material as spam;
  • posting binaries where binaries are not permitted;
  • posting adverts, solicitations or commercial messages where not expressly allowed.

15. Protection of Minors

VEQTOR Africa prohibits the use of its services to harm, exploit, groom, abuse, endanger or attempt to harm a minor in any way. This includes hosting, transmitting, storing, publishing, distributing or facilitating any unlawful material relating to minors, including child sexual abuse material or exploitative content of any kind. VEQTOR Africa will treat such matters with the utmost seriousness and may report them to law enforcement and relevant authorities.

16. Determination of Breach

VEQTOR Africa reserves the right, acting reasonably and in accordance with applicable law, to determine whether conduct, content, traffic, usage patterns, systems, communications or activities constitute a breach of this AUP. In doing so, VEQTOR Africa may consider the nature of the conduct, applicable legislation, network risk, customer impact, abuse complaints, security concerns, contractual obligations and the rights of affected parties.

17. Notice, Takedown and Abuse Handling

VEQTOR Africa reserves the right to investigate abuse reports, complaints, notices and alleged breaches of this AUP and to take such action as it reasonably considers necessary to protect its systems, customers, third parties or legal compliance position. Where unlawful content, infringing material, prohibited conduct or network abuse is identified or reasonably suspected, VEQTOR Africa may remove, disable, suspend, restrict, block or otherwise act against the relevant content, service, account, process or system.

Complaints and abuse notices should be submitted in writing and should include as much supporting information as reasonably possible, including the origin of the abuse, full headers where applicable, relevant logs, URLs, timestamps, source IP information, contact information for the complainant, and a concise explanation of the alleged breach.

18. Complaints Procedure

VEQTOR Africa may be unable to act on complaints involving systems, networks or users that are outside VEQTOR Africa’s control or that do not relate to services provided by VEQTOR Africa. Complainants are encouraged to provide full and accurate details. Anonymous complaints may be considered where sufficient technical or factual detail is supplied, although VEQTOR Africa may be limited in the action it can take where information is incomplete or unreliable.

19. Consequences of Breach

If VEQTOR Africa receives a complaint, detects abuse, or otherwise becomes aware of conduct that may breach this AUP, VEQTOR Africa may take one or more of the following actions, with or without prior notice where circumstances justify immediate action:

  • investigate the complaint or suspected activity;
  • inspect relevant service configurations, including mail relay exposure and service security posture;
  • block, filter, quarantine or intercept traffic or communications reasonably suspected to be abusive or unlawful;
  • suspend, restrict or terminate affected services or accounts;
  • require the customer to remediate insecure or abusive systems;
  • issue warnings or compliance demands;
  • assist other providers, administrators or affected parties in investigating credible abuse;
  • report suspected criminal conduct to law enforcement or competent authorities;
  • share relevant information where permitted or required by law;
  • pursue civil remedies or other contractual remedies available to VEQTOR Africa;
  • recover reasonable administrative, technical, legal and remediation costs arising from the incident;
  • withhold credits, refunds or prepaid amounts to the extent permitted by law and contract.

20. Interception of Communications and Legal Compliance

VEQTOR Africa may be required under applicable law to intercept, monitor, preserve, disclose or otherwise process communications or related information where lawfully required to do so. Any such action will be carried out in accordance with applicable legal requirements.

21. Amendments to this Policy

VEQTOR Africa reserves the right to amend, update or replace this AUP from time to time. Updated versions may be published on the VEQTOR Africa website, client portal or other official service channel. Customers and visitors remain responsible for reviewing the current version of this AUP. Continued use of VEQTOR Africa services after an update takes effect constitutes acceptance of the amended policy.

22. Contact Details

If you have any questions about this Acceptable Use Policy, or if you wish to report abuse, prohibited activity or a suspected breach, you may contact VEQTOR Africa using the official support or abuse channels published on the VEQTOR Africa website and customer platform.

Email: abuse@veqtor.africa
Website: https://veqtor.africa
Address: De Havillan Road, Honiton, EX52GE, UK