Acceptable Use Policy
Last updated April 27, 2026
About this page
On the left is the actual legal text — that's what binds the agreement. On the right we've included In Simpler Terms — plain-English summaries to help you understand what each section means. The plain column is for clarity only and is not legally binding.
1. Overview and Purpose
This Acceptable Use Policy ("AUP") governs use of Lagless.gg services, including multiplayer server hosting, VPS, web/app hosting, and related infrastructure. This AUP forms part of our Terms of Service and applies to all customers and their end users. Capitalized terms not defined here have the meanings given in our Terms of Service.
In Simpler Terms
This is the policy that says what you can and can't do on our services. It's part of the Terms of Service. It applies to you AND to anyone using your services downstream of you.
2. Community Standards and Responsible Use
- Use services lawfully and responsibly, respecting the rights and safety of others.
- Maintain the security and integrity of our shared infrastructure.
- Comply with applicable laws, regulations, and third-party platform terms.
- Avoid content or conduct that promotes hatred, harassment, or discrimination.
- Promptly report abuse, security issues, or policy violations to support.
In Simpler Terms
Be a decent operator. Follow the law. Don't abuse our shared infrastructure. Don't host hate, harassment, or discrimination. If you spot abuse — yours or someone else's — tell us.
3. Prohibited Activities and Content
3.1 Illegal Content and Criminal Activity
- CSAM or exploitation of minors; trafficking; violent extremism or terrorism.
- Illegal drugs, weapons trafficking, fraud, identity theft, money laundering.
- Unauthorized access, hacking, credential harvesting, social engineering.
- Malware, ransomware, botnets, exploit kits, distribution of stolen data.
- Copyright/trademark infringement, DRM circumvention, or counterfeit goods.
3.2 Network and Infrastructure Abuse
- DDoS, amplification/reflection, stress testing third parties without consent.
- Unauthorized scanning, probing, or exploitation; zero-day distribution.
- IP spoofing, traffic interception, BGP manipulation, route hijacking.
- Excessive bandwidth usage that materially impacts other customers.
- Unauthorized monitoring or packet capture of third-party traffic.
3.3 Communication and Spam Abuse
- Unsolicited bulk messages (email/SMS/social), phishing, spoofing, impersonation.
- Harvesting addresses, mail relay abuse, deceptive or manipulative campaigns.
- Automated posting or engagement manipulation across platforms.
3.4 Resource Abuse and Service Exploitation
- Cryptocurrency mining on shared infrastructure; GPU/ASIC mining on prohibited tiers.
- Resource-intensive processes intended to exhaust CPU, memory, I/O, or bandwidth.
- Multiple accounts to evade limits; unauthorized resale or sub-leasing of services.
- Circumventing usage quotas, rate limits, or security/access controls.
3.5 VPS-Specific Restrictions
- Open/anonymous proxies, TOR exit nodes, or unlawful VPN services.
- Illegal file sharing (BitTorrent/P2P) or operation of darknet marketplaces.
- Unlicensed gambling, sexually explicit content that violates law or platform rules.
- Root access responsibility: security patching, monitoring, and compliance remain the Customer's responsibility.
3.6 Game/Server Hosting Content Guidelines
- Hate symbols/speech; harassment; doxxing; stalking; targeted abuse.
- Content glorifying real-world violence or promoting harmful activities.
- Terms-violating cheats, exploits, or unauthorized modifications.
- Proxies: You may not use our infrastructure to proxy or route traffic to external providers. Velocity proxies are permitted only within the Lagless/Elcro ecosystem.
3.7 Artificial Intelligence and Automated Content
- Violations of applicable AI regulations or platform terms (e.g., EU AI Act obligations).
- Training on copyrighted material without rights; deceptive deepfakes/synthetic media.
- Automated decisions impacting individuals without required transparency or consent.
In Simpler Terms
The full list of stuff that gets you suspended or banned. The categories below are all hard rules.
3.1 Illegal Content and Criminal Activity
The serious stuff: child exploitation, terrorism content, drug/weapon trafficking, fraud, hacking other people's systems, malware/ransomware/botnets, distributing stolen data, pirated software, counterfeit goods. Zero tolerance — we report this stuff and terminate immediately.
3.2 Network and Infrastructure Abuse
Don't use our network to attack things. No DDoS attacks, no unauthorized port scanning, no IP spoofing, no BGP/route hijacking, no packet capture of other people's traffic. Don't burn so much bandwidth you affect other customers.
3.3 Communication and Spam Abuse
No spam (email, SMS, social media). No phishing. No address harvesting. No spoofing or impersonation. No automated engagement-manipulation across platforms.
3.4 Resource Abuse and Service Exploitation
No crypto mining on shared infrastructure. No GPU/ASIC mining on plans that don't allow it. Don't intentionally burn CPU/memory/I/O to game us. Don't make multiple accounts to dodge limits. Don't resell or sub-lease our services without authorization. Don't try to slip past rate limits or security controls.
3.5 VPS-Specific Restrictions
VPS gives you root and we can't see what you're running, but these are still off-limits: open/anonymous proxies, TOR exit nodes, unlawful VPN services, illegal P2P/torrent, darknet markets, unlicensed gambling, illegal adult content.
You're responsible for your VPS security. Patches, monitoring, compliance — that's all you. If your VPS gets compromised and abused, the consequences flow through to your account.
3.6 Game/Server Hosting Content Guidelines
No hate symbols or speech. No harassment, doxxing, stalking, or targeted abuse. No content glorifying real-world violence. No game cheats/exploits that violate the game's terms.
Proxies are restricted: you can't use our infrastructure to proxy traffic to external hosting providers. Velocity proxies (a Minecraft thing) are only allowed if both source and destination are on Lagless/Elcro.
3.7 Artificial Intelligence and Automated Content
If you're running AI on our services, follow the law (EU AI Act, etc.). Don't train on copyrighted material you don't have rights to. Don't run deceptive deepfake operations. Don't make automated decisions affecting people without proper transparency/consent.
4. Content Oversight and Monitoring
- No continuous proactive monitoring; we investigate based on reports or legal requests.
- Limited automated detection may flag potential violations for human review.
- We follow DMCA procedures for copyright claims and applicable legal processes.
In Simpler Terms
We don't watch your content 24/7 — we react to reports and legal requests. We do have some automated systems that flag obvious red flags for human review. We follow standard DMCA procedure for copyright claims.
5. Enforcement Framework and Penalties
- Minor: Warning and reasonable time to remediate.
- Moderate: Feature/account limitations, temporary suspension, added verification.
- Severe: Immediate suspension/termination, data deletion, and potential legal referral.
No refunds for terminations due to AUP violations.
In Simpler Terms
Minor stuff: we warn you and give you time to fix it. Moderate stuff: account limits, suspension, extra verification. Severe stuff: immediate termination, data deletion, possibly law enforcement.
If we terminate you for an AUP violation, no refund.
6. Resource Usage and Fair Use
- Usage should be proportional to the plan tier and not degrade others' performance.
- High-bandwidth/CPU tasks should be optimized or scheduled during low-usage periods.
- Excessive or abusive consumption may result in limits, throttling, or suspension.
In Simpler Terms
Use what your plan covers. Don't hog so much that other customers suffer. If you've got high-bandwidth or CPU-intensive tasks, schedule them off-peak when possible. Sustained abuse leads to throttling or suspension.
7. Database Usage Policy
Primary Use Requirement
Database resources must primarily support applications, games, or services hosted with Lagless. They are not intended as a general purpose external database service.
Prohibited External Database Usage
- Hosting databases for services primarily hosted elsewhere.
- Providing database services to third parties as a resale or standalone offering.
- Using databases as primary storage for apps on competing platforms.
- Primarily backing up external services into our database resources.
Monitoring & Enforcement
- We may monitor usage patterns and connections to detect policy violations.
- Violations may lead to suspension, data removal, and account review without refund.
In Simpler Terms
Database resources we provide are for services running on Lagless — not as a general external database for apps hosted somewhere else. Don't use us as your offsite database for a competitor's hosting. Don't resell database access. Don't make us your primary backup destination for external services. We monitor connection patterns and we will catch this.
8. Third-Party Integration and API Usage
- Comply with third-party terms, licensing, and rate limits.
- Automation must include throttling, retries, and robust error handling.
- Integrations must not compromise security, privacy, or platform stability.
In Simpler Terms
If you're integrating with third-party APIs, follow their rules — their rate limits, their licensing, their terms. Build proper retry/error handling. Don't let your integrations break our security or stability.
9. Reporting and Investigation
- Report abuse/security: support@lagless.gg (subject: "AUP Violation Report").
- DMCA: dmca@lagless.gg. Legal: legal@lagless.gg.
- Include description, evidence, affected services/IPs/domains, and timelines.
- We acknowledge within 24 hours and may contact impacted customers for response.
In Simpler Terms
Report abuse to: support@lagless.gg (subject: "AUP Violation Report") DMCA: dmca@lagless.gg Legal: legal@lagless.gg
Include evidence, affected services/IPs, and timelines. We acknowledge within 24 hours.
10. Legal and Regulatory Compliance
- Comply with applicable laws where you operate and where services are provided.
- Export/sanctions: comply with EAR, OFAC, and other trade restrictions.
- Respect industry regulations where applicable (e.g., PCI DSS, HIPAA, FERPA).
- International privacy obligations (e.g., GDPR/CCPA) may apply to your usage.
In Simpler Terms
Follow the laws of where you live, where you operate, and where your customers are. Comply with US export laws and OFAC sanctions. If your industry has specific rules (PCI for payments, HIPAA for healthcare, FERPA for education) — that's on you. Same for international privacy laws like GDPR and CCPA.
11. Updates to this AUP
We may update this AUP to address new threats, legal changes, or operational needs. Material changes that affect your obligations will be communicated with advance notice when practicable. Continued use constitutes acceptance of updates.
In Simpler Terms
We can update this policy when we need to (new threats, new laws, etc.). For meaningful changes that affect what you can do, we'll give notice when we can. Continuing to use the service after we update means you agree to the new version.
12. Customer Responsibilities
- Maintain secure configurations, access controls, and timely patching for your services.
- Ensure your users comply with this AUP; you are responsible for their actions.
- Promptly remediate vulnerabilities, misconfigurations, or abuse originating from your services.
- Operate only licensed software and respect third-party IP rights and platform rules.
- Back up critical data and verify restore processes appropriate to your business needs.
In Simpler Terms
You're responsible for: keeping your services patched and secure, making sure your end users follow this AUP, fixing vulnerabilities and abuse coming from your services fast, only running licensed software, and keeping your own backups. What your users do = your responsibility.
13. Abuse of Services and Support
- Abusive, harassing, or threatening behavior toward staff or users is prohibited.
- Excessive, frivolous, or bad-faith support requests may be rate-limited or refused.
- Automated account creation, referral fraud, or affiliate abuse is prohibited.
- False or bad-faith abuse reports may result in account actions.
In Simpler Terms
Don't be abusive or threatening to our staff or other users. Don't spam our support team with frivolous tickets. No automated account creation, no referral fraud, no affiliate fraud. Don't file fake abuse reports against other people — we treat that as bad-faith and it can result in account action against you.
14. Email, Messaging, and Network Policy
- Bulk email requires opt-in, functional unsubscribe, and compliance with anti-spam laws (e.g., CAN-SPAM).
- Open relays, open resolvers, or misconfigured services that enable abuse are prohibited.
- DNS, domain, or certificate impersonation or manipulation is prohibited.
- Port scanning is allowed only within your own assets with explicit authorization.
- Running public mail infrastructure may require prior approval and additional controls.
In Simpler Terms
If you're sending bulk email, you need real opt-in, working unsubscribe, and CAN-SPAM compliance. No open relays, open DNS resolvers, or misconfigured public services — those get exploited and we'll shut them down.
Don't impersonate other domains, websites, or certificates. Port scanning is only allowed on your own assets with documented authorization. Running real public mail infrastructure may need approval first.
15. Security Research and Disclosure
- Good-faith security research on your own assets is permitted if it does not impact others.
- Do not access data you do not own, degrade services, or violate laws during research.
- Report vulnerabilities to security@lagless.gg with sufficient details to reproduce.
- We may offer coordinated disclosure timelines; exploitation is strictly prohibited.
In Simpler Terms
If you're doing security research on your own stuff and it doesn't affect others, that's fine. Don't access data that isn't yours. Don't degrade our services or anyone else's. Don't break the law. Found a vulnerability in OUR systems? Email security@lagless.gg with reproduction details — we'll work with you on responsible disclosure. Exploiting it instead of reporting it is grounds for termination.
16. Sanctions, Export, and Restricted Uses
- Do not use services in, by, or for sanctioned countries, persons, or entities (e.g., OFAC lists).
- Comply with export controls (e.g., EAR) for software, encryption, and technical data.
- No use for development, design, or production of prohibited weapons or surveillance of protected classes.
In Simpler Terms
You can't use our services if you're in a sanctioned country, on a sanctions list, or working for a sanctioned entity. Follow US export controls (EAR) for any software/encryption/technical data you transfer. No use for weapons development or surveillance of protected classes.
17. Data Preservation and Law Enforcement
- We may preserve data and cooperate with law enforcement upon receipt of valid legal process.
- In emergencies involving imminent harm, we may act swiftly to restrict content or access.
- We may suspend or remove content to mitigate ongoing harm or legal risk.
In Simpler Terms
If we get valid legal process (subpoena, warrant, etc.), we'll preserve data and cooperate. In genuine emergencies involving imminent harm, we may act fast to restrict content or access without waiting on the usual process.
18. Financial Data and High-Risk Activities
- Processing payment cards requires PCI DSS compliance; storing raw PANs is prohibited.
- High-risk financial services (e.g., unlicensed money services, HYIP schemes) are prohibited.
- Do not represent our services as emergency services or mission-critical life support systems.
In Simpler Terms
Processing payment card data requires PCI DSS compliance — that's a hard requirement, and storing raw card numbers is forbidden. No unlicensed money services or high-risk financial schemes (HYIPs, etc.). Don't market our services as emergency services or life-critical infrastructure — we're not designed for that.
19. Indemnification and Liability Reminder
Your obligations under this AUP are in addition to the Terms of Service, including any indemnification and limitation of liability provisions therein. Violations may result in charges, suspension, termination, or legal action.
In Simpler Terms
This AUP doesn't replace the Terms of Service — it adds to them. The indemnification (Section 18 of ToS) and liability cap (Section 19 of ToS) still apply. Violations can lead to charges, suspension, termination, or legal action.
20. Precedence; Severability; Survival
- If this AUP conflicts with the Terms of Service, the Terms of Service control.
- If any provision is unenforceable, the remainder remains in effect to the maximum extent permitted.
- Sections concerning enforcement, cooperation, liability, and compliance survive termination.
In Simpler Terms
If anything in this AUP contradicts the Terms of Service, the Terms of Service win. If any single rule in here gets ruled unenforceable, the rest still apply. Some sections (enforcement, legal cooperation, liability, compliance) keep applying even after your account ends.
21. Contact
- Abuse/Security: support@lagless.gg (subject: "AUP Violation Report")
- DMCA: dmca@lagless.gg
- Legal/Compliance: legal@lagless.gg
- Security Reports: security@lagless.gg
In Simpler Terms
- Abuse / Security: support@lagless.gg (subject: "AUP Violation Report")
- DMCA: dmca@lagless.gg
- Legal / Compliance: legal@lagless.gg
- Security Reports: security@lagless.gg
Questions about this page? Get in touch →
© Elcro Digital Services, LLC


