Acceptable Use Policy
Last updated January 2026
This Acceptable Use Policy (“AUP”) governs the use of all services provided by Chajio Cloud (“we,” “us,” or “our”), including web hosting, VPS servers, domain registration, SSL certificates, and app deployment. By using our services, you agree to comply with this policy. Violation of this policy may result in suspension or termination of your account without prior notice or refund.
1. Purpose
The purpose of this AUP is to protect the integrity, security, and reliability of Chajio Cloud's infrastructure and the broader internet community. It defines what constitutes acceptable and unacceptable use of our services, and establishes the consequences of policy violations.
2. Prohibited Activities
The following activities are strictly prohibited on all Chajio Cloud services:
2.1 Illegal Activities
- Using our services to engage in or facilitate any activity that violates applicable local, national, or international law, including the laws of Kenya.
- Hosting, distributing, or transmitting content that is illegal, defamatory, obscene, or constitutes a criminal offense.
- Engaging in fraud, identity theft, phishing, or any other deceptive practices.
- Selling, distributing, or facilitating the distribution of controlled substances or illegal goods and services.
2.2 Spam and Unsolicited Communications
- Sending unsolicited bulk email (spam) using our servers, or using our services in any way that facilitates spam sent from elsewhere.
- Operating or hosting services that facilitate the sending of spam, including open mail relays, spam bots, or bulk emailing scripts.
- Harvesting or collecting email addresses or other personal data without consent.
- Any violation of the CAN-SPAM Act, CASL, or equivalent anti-spam legislation.
Penalty: Accounts found to have sent spam may be suspended immediately without warning. A penalty of Ksh 10,000 may be assessed for each spam policy violation. Chajio Cloud solely reserves the right to refuse or cancel service to known spammers.
2.3 Malware and Security Threats
- Hosting, distributing, or executing malware, viruses, ransomware, spyware, adware, or any other malicious software.
- Conducting or facilitating hacking, cracking, port scanning, vulnerability scanning, or any form of unauthorized system access.
- Hosting phishing pages, fraudulent login forms, or any content designed to deceive users into revealing sensitive information.
- Distributing tools (software, scripts, or documentation) primarily intended to facilitate unauthorized access to systems.
- Launching or facilitating Distributed Denial of Service (DDoS) or Denial of Service (DoS) attacks against any target.
2.4 Intellectual Property Violations
- Hosting, distributing, or transmitting content that infringes upon any copyright, trademark, patent, trade secret, or other intellectual property right of any party.
- Hosting warez, cracked software, key generators, serial number databases, or piracy-related content.
- Distributing nulled themes, plugins, or software that contain hidden backdoors or malicious code.
2.5 Prohibited Content
- Any content depicting or promoting sexual exploitation of minors (child sexual abuse material — CSAM). Violations will be reported immediately to law enforcement.
- Pornographic or adult content, unless you hold a valid licence and have disclosed this at account registration and obtained explicit written approval from Chajio Cloud.
- Content that promotes, incites, or facilitates violence, terrorism, or hate crimes.
- Content that is grossly offensive, including blatant expressions of bigotry, racism, or discrimination based on race, religion, gender, sexual orientation, or disability.
- Content that facilitates gambling services in jurisdictions where such services are illegal.
2.6 Resource Abuse
- Consuming excessive server resources (CPU, RAM, disk I/O, or network bandwidth) that degrade the performance or stability of shared infrastructure.
- Running persistent background processes, daemons, or cron jobs on shared hosting plans without explicit written approval from Chajio Cloud.
- Storing video files (MP4 or other media formats) on shared or eCommerce hosting plans. These must be stored externally (e.g., YouTube, Vimeo, cloud storage) and embedded.
- Using our services as a backup destination or file storage service not related to website operation.
- Running cryptocurrency mining software, botnets, or any resource-intensive application not directly related to website hosting.
2.7 Network Abuse
- Attempting to circumvent security measures, firewalls, or rate limiting implemented by Chajio Cloud.
- Forging IP addresses, email headers, or any other network identifier (IP spoofing).
- Operating open network proxies or Tor exit nodes from our infrastructure.
- Conducting unauthorized network reconnaissance or packet sniffing.
2.8 Privacy Violations
- Collecting, storing, or transmitting personal data without obtaining appropriate consent as required by applicable law.
- Publishing, disclosing, or sharing personally identifiable information about any third party without their express consent.
- Operating services that track users without disclosure or operate in violation of applicable privacy regulations.
3. Permitted Use
Our services are intended for the following permitted uses:
- Hosting websites, blogs, portfolios, and web applications for personal, business, or organizational purposes
- Operating legitimate online stores and eCommerce platforms
- Deploying and running web applications built on standard frameworks and languages
- Hosting business email accounts associated with a hosted domain
- Storing and serving website files, images, scripts, and databases required for the operation of hosted sites
4. Customer Responsibility
You are solely responsible for all content published, transmitted, or stored through your Chajio Cloud account, including content uploaded by your end users or visitors if you operate a platform or community site. “I did not know” is not a defense — if you operate a service that allows user-generated content, you are responsible for implementing appropriate moderation and abuse reporting mechanisms.
You are responsible for ensuring that all software running on your account (WordPress plugins, CMS themes, custom scripts, etc.) is kept up to date and is free of known security vulnerabilities. Accounts compromised due to outdated or insecure software may be suspended until the security issue is resolved.
5. Reporting Violations
If you become aware of a violation of this AUP by another Chajio Cloud customer, please report it to our abuse team at [email protected] with the subject line “AUP Violation Report.” Include as much detail as possible: the offending domain or IP address, the nature of the violation, and any supporting evidence.
We take all abuse reports seriously and will investigate promptly. We may be unable to disclose the outcome of an investigation due to privacy and legal constraints.
6. Enforcement
Chajio Cloud reserves the right to take any of the following actions in response to AUP violations, at our sole discretion:
- Issue a formal warning and require immediate remediation
- Suspend access to the offending service or content
- Terminate the account without prior notice and without refund
- Pursue civil or criminal legal remedies where applicable
- Cooperate with law enforcement agencies and disclose account information as required by law
Chajio Cloud is the sole arbiter of what constitutes a violation of this AUP. Our determination is final.
7. Amendments
Chajio Cloud reserves the right to modify this Acceptable Use Policy at any time. Changes will take effect upon posting to our website. Continued use of our services after changes are posted constitutes acceptance of the revised policy. We recommend reviewing this policy periodically.
8. Contact
For questions about this policy or to report abuse, contact us at:
- Email: [email protected]
- Phone: +254 20 2166166 or +254 700 050008
- Support ticket: my.chajiocloud.com