Acceptable Use Policy

Acceptable Use Policy (AUP)

This policy explains the rules for using Acorn Media hosting and digital services. It sets out prohibited activities, content restrictions and our enforcement rights.

Last updated: 22 April 2026.

Prohibited Activities

You may not use Acorn Media services to carry out any prohibited activity listed below. These rules apply to all hosted websites, applications, email accounts, and server resources.

  • Illegal Acts: Any activity that breaches UK law, including hosting copyright-infringing material (piracy), unlicensed software, or unlawful content.
  • Abuse: Sending unsolicited bulk email (spam), phishing, harvesting email addresses, or hosting Distributed Denial of Service (DDoS) tools, stressers or booters.
  • System Interference: Running scripts or applications that overload CPU, memory or network resources, or attempting unauthorised access to other accounts, services or server infrastructure.
  • Prohibited Content: Hosting pornographic material, hate speech, content that incites violence, or material that promotes discrimination, harassment or harm.
  • Resource Misuse: Using shared hosting as a file storage or backup service for personal archives, bulk file sharing, or non-website-related data storage.

Content and Service Restrictions

Acorn Media reserves the right to refuse, restrict or suspend any service that violates this policy. Examples include but are not limited to:

  • Sites designed solely to redistribute pirated media or illegal software.
  • Email systems used for unsolicited commercial marketing or deception.
  • Websites or services that probe, scan, or attack other systems.
  • Storage of large non-website file collections on shared hosting accounts.
  • Any content that breaches our acceptable use rules or exposes the platform to security risk.

Enforcement

We reserve the right to suspend or terminate any account that violates this Acceptable Use Policy immediately and without notice. Enforcement actions may include:

  • Temporary suspension of service while we investigate a breach.
  • Permanent termination of accounts that repeatedly or seriously violate this policy.
  • Removal of content or applications that pose a legal or security risk.

If you are unsure whether an activity is permitted, please contact us before proceeding.