Acceptable Usage Policy
Sixti Cloud – Acceptable Usage Policy (AUP)
Last Updated: 9 December 2025
In order to protect the stability and integrity of our services (“Services”), Sixti Cloud (“Sixti Cloud”, “we”, “us”, “our”) requires all clients (“you”) to comply with this Acceptable Usage Policy (“AUP” or “Policy”). This Policy is designed to ensure we can provide a reliable service to all customers through efficient management of resources and to make sure our Services are used as intended. Please read this Policy carefully before using our Services.
We reserve the right to update and modify this Policy at any time.
1. Your General Obligations on Acceptable Usage
- It must be legal. You must not use your website or any of our Services to promote, distribute, host, store, or transmit any material or content that is illegal under: (i) the laws of the country where you reside (“Your Country”), (ii) the laws of the country where the content is hosted (the server location for your account), or (iii) applicable Australian law. You acknowledge that the internet is global and that content legal in Your Country may be illegal elsewhere and could expose you or us to legal risk.
- It must not violate third-party intellectual property rights. You are solely responsible for ensuring that any content or materials on any website owned or operated by you only include material that you have created or have permission to use. You must ensure your content does not infringe copyright, trademark, or other intellectual property rights (“IP Rights”). You must have the right to store, use, and publish files from the copyright holder. Any infringing or unlawfully stored copyrighted material may be deleted without notice.
- You are responsible for IP disputes. You are solely responsible for resolving any dispute involving IP Rights associated with your website or your use of the Services. You agree to indemnify us against costs (including legal costs) of defending any claim by any third party relating to your use of IP Rights, where permitted by law.
- Our investigation and enforcement. We reserve the right to investigate potential abuse, including reviewing transaction data, identification information (where applicable), and content stored on our servers if abuse is suspected or reported. We may remove or block public access to content at any time, with or without notice, where we reasonably consider it necessary to: (i) comply with law, (ii) protect our systems and users, or (iii) enforce our terms and policies. Accounts found, in our reasonable discretion, to be abusive, to host illegal content, or to breach our terms may be suspended or terminated.
-
Prohibited activities.
You must not engage in:
- Any illegal or malicious activity, including (without limitation) hacking, phishing, spamming, botnets, port scanning, credential stuffing, or malware distribution.
- Any activity that violates the privacy or security of others, including unauthorised access to data, accounts, or systems.
- Operating VPN or proxy services on any of our Services, unless we have explicitly approved it in writing.
- Any other activity described in this Policy as not permissible or prohibited.
2. Acceptable Resource Usage
2.1 Resource allocation
Each hosting plan includes a defined allocation of resources, which may include bandwidth, disk space, CPU, memory, inode/file counts, database capacity, and email-related limits. Resource allocations are intended for normal website and email operation within the scope of the plan and this Policy.
2.2 No excessive consumption
You must not excessively consume resources in a way that adversely affects server performance or disrupts service quality for other users. We reserve the right to monitor resource usage and take appropriate action where excessive use occurs. Actions may include (without limitation) applying limits, requiring remediation, suspending services, or terminating services, with or without notice, as reasonably necessary to protect the platform.
2.3 Limits for violations
We reserve the right to impose limits on email accounts, mailbox size, database size, disk usage, bandwidth/data transfer, and other resource usage for accounts that violate this Policy or otherwise cause instability or risk.
3. Acceptable Shared Hosting Usage (Fair Use)
Fair use limits enable us to maintain speed, reliability, and integrity of our shared hosting services for all users. Unless otherwise specified in writing, the following fair use limits apply:
- (a) Multimedia storage: video and image content should not exceed 10GB total per hosting account.
- (b) Mailbox storage: email disk usage should not exceed 20GB per mailbox.
- (c) Database size: any single database exceeding 10GB disk usage may be considered excessive.
- (d) Local backups: locally generated backups must be kept to a minimum. We may delete local backups to maintain shared service performance.
- (e) Software downloads: account-holder-created downloads should not exceed 1GB total. We may require use of a CDN for distribution.
- (f) Reseller “unlimited” disk usage: reseller accounts using more than 400GB total disk may be required to ensure sub-account disk usage does not exceed 50GB per account.
- (g) Offsite backup use: using our Services primarily as an offsite backup facility is prohibited.
- (h) File storage / sync services: self-hosted file sync/storage services (e.g., Nextcloud, ownCloud, Pydio, Sparkleshare) are prohibited on shared hosting unless explicitly approved in writing.
- (i) File/software repositories: file/software download sites or repositories are not allowed on shared hosting.
3.1 Adult content
If you intend to upload adult content onto your website or service, you must contact us before placing an order. Whether content is legally defined as “adult content” will be determined in our reasonable discretion having regard to applicable laws, Your Country, and the server location. We may refuse, suspend, or terminate services where adult content creates legal or operational risk.
3.2 Regulated industries
We may require additional verification for websites or services we consider regulated (for example: financial services, pharmaceuticals, lotteries, or similar). We may request evidence that you are legally authorised to operate the business in relevant jurisdictions. If we cannot reasonably verify compliance, we may suspend or terminate Services.
3.3 Mailbox usage
We may provide the ability to send email using SMTP for normal day-to-day communication needs. Outbound mail may be scanned and filtered to protect recipients and our infrastructure. In relation to mailboxes:
- (a) Mailboxes are intended for use by you as the plan owner and should not be resold or provided to third parties unless your plan explicitly permits it.
- (b) You are responsible for managing mailbox size to remain within fair use limits.
- (c) We apply reasonable sending limits aligned with normal usage to protect service integrity.
- (d) We may limit email volume by queuing messages or temporarily rejecting send requests. We may block messages for any reason, with or without notice, to protect the Services and our reputation. To the extent permitted by law, we are not liable for losses arising from email queuing or blocking.
3.4 Visibility of files
Files uploaded to a domain hosted with us must generally be intended for use by that domain (for example, website content), except for configuration/hidden files needed to operate the website. We may delete files that appear to be stored primarily for purposes not permitted under this Policy, with or without notice, where reasonably necessary to protect our platform.
4. Acceptable Email Usage
4.1 Zero-tolerance policy against spam
We maintain a zero-tolerance policy against spam. Sending bulk or unsolicited email is prohibited. Customers who abuse email services may have accounts suspended, terminated, or blocked.
By purchasing or using our Services, you agree:
- (a) Not to send emails that might cause annoyance, inconvenience, or anxiety to a recipient.
- (b) Not to send any emails likely to cause distress, or any material which is offensive, indecent, obscene, menacing, or unlawful.
- (c) To include a clear opt-out mechanism for all non-transactional communications.
- (d) Not to send email to any user who does not wish to receive it.
- (e) Not to use our mail services or network to send unsolicited email in bulk or individually (spam).
- (f) Not to attempt to deprive others of service (e.g., “mail bombing”).
- (g) Not to use false headers or alter mail headers to conceal sender identity.
- (h) Not to use any email address you are not authorised to use.
- (i) To ensure any email servers you operate are not configured as an open relay.
- (j) To take full responsibility for your own sending reputation (including authentication, list hygiene, and complaint management).
- (k) Not to take any action that would put you or us in breach of applicable laws and regulations relating to email and data protection in relevant jurisdictions.
5. Reseller Accounts
If you are a reseller and you suspend a resold hosting account, we reserve the right to terminate the suspended account after 60 days. Unless your plan or a separate written agreement states otherwise, you are responsible for maintaining your own backups.
Resellers should communicate promptly with their clients regarding suspensions to avoid unintended data loss.
6. Notification and Resolution
6.1 Violations
If you violate this Policy or abuse resources, we may take immediate measures including limiting, suspending, or terminating Services. Where practical, we may notify you and provide an opportunity to remedy the issue. Timely resolution is required. Failure to remedy may result in further restrictions or termination.
6.2 Grace period for fair use breaches
For certain fair use breaches, we may provide a grace period to rectify the issue. Where practical, we aim to allow 24 to 72 hours for remediation before suspension. However, we may immediately suspend services where necessary to protect platform stability, security, or other users. If mailbox sizes exceed limits, we may impose inbox restrictions that prevent new email from being received until reduced.
7. Indemnification
To the extent permitted by law, you agree to defend, indemnify, and hold harmless Sixti Cloud and our contractors, agents, employees, officers, directors, affiliates, and assigns from and against any losses, liabilities, damages, costs, and expenses (including reasonable legal fees) arising out of or related to:
- (i) your breach of this AUP or any incorporated agreement;
- (ii) your use of the Services (including actions by anyone using the Services through your account);
- (iii) infringement or alleged infringement of IP Rights by you or your content;
- (iv) information or data you supplied to us (including misrepresentation);
- (v) any content, material, or services made available on your website hosted by us; or
- (vi) your negligence or wilful misconduct.
This section survives termination or cancellation of your Services.
8. Revisions to This Policy
We may update or modify this Policy at any time. While we may make reasonable efforts to notify customers of significant changes, it is your responsibility to regularly review this Policy to ensure ongoing compliance.
If you have questions about this Policy, please contact us via our support portal or email.
Contact: support@sixti.cloud
Sixti Cloud is an Australian web hosting and cloud infrastructure provider delivering fast, secure, and reliable services. We offer cPanel hosting, domains, email, DNS, and cloud solutions backed by modern infrastructure and real human support.