Acceptable Usage  Policy

1. Use of the Services
All services provided by our company can only be used for legitimate purposes. The following illegal actions are prohibited: 
1.1. The spread of viruses, "worms", "Trojan horses".
1.2. Botnets and everything connected with them.
1.3. Destructive actions: flood, email "bombs" or DDOS attacks, as well as actions that disrupt the operation of the network and network equipment.
1.4. Spam.
1.5. Sale and distribution of narcotic drugs.
1.6. Dissemination, transfer, storage, publication and display of child pornography.
1.7. Illegal or unauthorized access to computers or networks.
Access, illegal or unauthorized, to computers, websites, bank accounts or networks belonging to another person / persons, or attempts to penetrate another person's systems ("hacking").
In addition, any activity that can be used as a precursor to attempts to enter the system (for example, port scanning, "stealth" scanning or other information gathering).
1.8. Fraudulent projects.
1.9. Sale and distribution of stolen credit cards.
1.10. Phishing
1.11. Illicit trade of medical products.
1.12. Terrorism.
Also any action that contradicts the laws of the country and the rules of location is prohibited.

2. Allowed activities wtih conditions.

2.1. Adult (pornography) is allowed in all locations except 18: Germany (Nuremberg), 44: Finland and 30: Russia (Moscow).
2.2. Torrents are now allowed.
2.3. Streaming is allowed in a number of locations.
2.4. Music and online video sites (if they can partially violate copyright) are allowed in a number of locations, provided that illegal materials are removed on request from the copyright holders.
2.5. VPN and Proxy are allowed for personal usage.
2.6. VPN and Proxy services are allowed if the whois information of the ip addresses refers to the company including web-stie. You can use your own ip network.
2.7. The operation of applications for mining crypto currencies is prohibited: only plotting is prohibited, storage (farming) is allowed.