Compliance

Acceptable Usage

Standard operating procedures and ethical usage guidelines for all clients.

This Acceptable Usage Policy (AUP) outlines the rules for using our Managed IT, Cloud, and Hosting services. It is designed to protect our infrastructure, our customers, and the broader internet community.

1. System & Network Resource Usage

1.1. Linux/Shared Hosting: "Unlimited" space is intended for active website files only. Storage of backups, media archives, or non-web files is prohibited.

1.2. Burst Resources: Burstable RAM and CPU allocations are for temporary spikes. Sustained high usage that impacts other tenants on the node will result in immediate suspension.

1.3. Mailboxes: Email accounts are for professional use. Mailboxes inactive for more than 180 days may be archived or deleted to maintain system performance.

2. Microsoft 365 & Azure Guidelines

2.1. Identity Security: Users must not share Microsoft 365 credentials. Multi-Factor Authentication (MFA) must be enabled on all administrative accounts.

2.2. Azure Resource Integrity: You may not use Azure resources for unauthorized vulnerability scanning, crypto-currency mining, or any activity that violates Microsoft’s Online Service Terms.

2.3. Managed Access: In a Managed Service environment, You agree not to bypass our management tools or security configurations without prior written consent.

3. Prohibited Activities

You may not use Swift Computing services for:

  • SPAM/UCE: Sending unsolicited bulk email via Linux or M365 tenants.
  • Warez/Illegal Content: Hosting pirated software or copyrighted material.
  • IP Spoofing: Forging headers or engaging in DDoS activities.
  • Unsafe TLDs: Hosting on free-to-register domains (e.g., .tk, .ml) without prior approval.

4. Security Compliance

4.1. Vulnerability Management: Linux web applications (WordPress, etc.) must be kept updated. We reserve the right to quarantine sites that are compromised or running outdated, vulnerable code.

4.2. Reporting Abuse: Any suspected abuse of our network should be reported immediately to our Security Response Team.

5. Enforcement & Cooperation

5.1. Swift Computing cooperates fully with law enforcement agencies. We reserve the right to suspend any account without notice if a breach of this AUP is detected.

5.2. Violation of this policy may lead to immediate termination of all Managed Services without eligibility for refund.

Suspect a Policy Violation?

Report abuse at abuse@swiftcomputing.co.za