Please read this agreement carefully, as it contains important information regarding your legal rights.
Last Updated: 11/01/2026
The Fair Usage Policy (FUP) aims to protect the stability and efficiency of the infrastructure and services provided to all clients, ensuring a fair and balanced experience across the platform’s resources. This policy applies to all hosting plans, cloud services, email, networking, and assets managed by the Company.
Services are permitted for reasonable, standard activities associated with website hosting, normal databases, professional business email, and the operation of web applications with predictable loads according to the client’s plan. Development and testing uses are allowed as long as they do not cause a noticeable impact on other clients or infrastructure stability.
Behaviors considered a breach of this policy include, but are not limited to:
Sending commercial bulk unsolicited email (SPAM) or using company servers to run unauthorized batch campaigns.
Hosting or distributing malware, hacking tools, or content that violates laws or third-party rights.
Cryptocurrency mining (Cryptomining) or any activity that utilizes excessive server resources without a dedicated service agreement.
Conducting or participating in network probes, scans, or attacks (such as DDoS or hacking attempts).
Using service resources in a manner that leads to unreasonable depletion of system resources (CPU, Memory, I/O, Storage, Bandwidth) to the detriment of other clients.
The Company monitors resource usage, operational logs, and performance metrics to detect excessive consumption or suspicious behavior. This includes periodic audits and automated alerts for resource exhaustion indicators or activities outside the normal range.
Upon detecting excessive use or a breach of this policy, Quality Group LTD will take the following actions based on the severity of the violation:
a. Written notification to the client explaining the type of violation, measurement data, and evidence, providing a reasonable period to rectify the situation—usually at least eighty-four (84) hours when possible—unless the risk necessitates immediate action.
b. Suggesting corrective solutions such as load balancing, code optimization, or upgrading the plan to dedicated resources.
c. If the violation persists or cooperation is lacking, the Company may temporarily suspend the service, impose technical operational limits, migrate the client to a dedicated environment, or terminate the service if necessary to protect systems and other clients.
If a client’s workload requires resources exceeding the limits of a shared hosting plan, the Company reserves the right to request an upgrade to a VPS, dedicated server, or metered cloud solutions. The client may not expect continued performance consistent with shared plans if their resource usage exceeds what has been allocated to them.
The Company reserves the right to cooperate with law enforcement and security providers when necessary, and to provide legally required information regarding suspicious or harmful activities.
To report abuse or request clarification, please contact: [email protected]. Reports will be handled with confidentiality and professionalism, with due regard for protecting infrastructure and individual rights.
This policy is reviewed periodically and may be updated to protect the system and meet operational or regulatory requirements. Material changes will be announced through the Company’s regular channels and become effective from the date of publication as stated in the Terms of Service.


