Acceptable Use Policy

Last Updated: January 2025

1. Introduction

This Acceptable Use Policy ("AUP") governs your use of services provided by Epiture (operating under Pluxcon Co., Ltd.). This policy applies to all customers utilizing our IP Transit, Colocation, and System Integration services.

By using our services, you agree to comply with this AUP and all applicable local, national, and international laws and regulations. Violation of this policy may result in suspension or termination of services without prior notice.

2. Prohibited Activities

2.1 Illegal Activities

You may not use our services to:

  • Distribute, host, or transmit content that infringes intellectual property rights
  • Engage in activities that violate applicable laws in the Republic of Korea or internationally
  • Distribute or promote illegal goods, services, or activities
  • Engage in child exploitation, human trafficking, or other severe criminal activities

2.2 Network Abuse

The following network activities are strictly prohibited:

  • Launching Distributed Denial of Service (DDoS) or Denial of Service (DoS) attacks
  • Port scanning, vulnerability scanning, or network probing without explicit authorization
  • Packet sniffing or monitoring network traffic not destined for your systems
  • Attempting to gain unauthorized access to other networks, systems, or accounts
  • Operating open DNS resolvers or other services that facilitate network abuse
  • BGP route hijacking or improper route announcements
  • IP address spoofing or source address falsification

2.3 Email and Messaging Abuse

  • Sending unsolicited bulk email (spam) or unsolicited commercial email
  • Operating email services without proper authentication (SPF, DKIM, DMARC)
  • Phishing, email spoofing, or fraudulent email practices
  • Harvesting email addresses without consent
  • Operating or facilitating spam distribution networks

2.4 Malicious Content and Activities

  • Distributing malware, viruses, trojans, ransomware, or other malicious software
  • Operating command and control (C2) servers for botnets or malware
  • Hosting or distributing cryptomining malware
  • Engaging in cryptojacking or unauthorized use of computing resources
  • Operating proxy services designed to circumvent security measures

2.5 Resource Abuse

  • Excessive bandwidth consumption that impacts other customers
  • Running processes that monopolize server resources (CPU, memory, disk I/O)
  • Operating cryptocurrency mining on shared infrastructure without authorization
  • Exceeding allocated resource limits without upgrading service plans

2.6 Security Violations

  • Attempting to circumvent security or authentication measures
  • Accessing facilities, systems, or data without proper authorization
  • Sharing authentication credentials with unauthorized parties
  • Failing to maintain reasonable security practices for hosted systems
  • Knowingly hosting compromised systems without remediation efforts

3. Acceptable Use

Epiture services are intended for legitimate business and personal use, including but not limited to:

  • Web hosting and application services
  • Email services with proper authentication and anti-spam measures
  • Data storage and backup solutions
  • Development and testing environments
  • Authorized security research and penetration testing (with prior written approval)
  • Content delivery and streaming services
  • Database hosting and management

Security research, vulnerability scanning, or penetration testing requires prior written authorization from Epiture. Contact abuse@epiture.net for approval.

4. IP Transit Specific Policies

  • BGP announcements must be authorized and properly documented
  • Customers must not announce IP space they do not own or have authorization to use
  • Route filtering and bogon filtering must be properly configured
  • Customers are responsible for abuse originating from their IP space
  • IP addresses must be utilized efficiently in accordance with RIR policies

5. Colocation Specific Policies

  • Physical access to facilities requires proper authorization and identification
  • Equipment must be installed according to facility specifications and guidelines
  • Power consumption must not exceed allocated limits
  • Cooling and environmental requirements must be maintained
  • Customers must not interfere with other customers' equipment or operations
  • Safety and fire regulations must be strictly followed

6. Monitoring and Enforcement

6.1 Monitoring Rights

Epiture reserves the right to monitor network traffic, resource usage, and system logs to ensure compliance with this AUP and to maintain service quality and security. We do not routinely monitor the content of customer data but may do so when investigating abuse complaints or security incidents.

6.2 Enforcement Actions

Violations of this AUP may result in the following actions:

  • Warning: First-time or minor violations may receive a written warning
  • Temporary Suspension: Service may be suspended pending investigation or remediation
  • Permanent Termination: Severe or repeated violations may result in immediate service termination
  • Legal Action: Criminal activities may be reported to law enforcement authorities
  • Financial Liability: Customers may be held responsible for costs incurred due to AUP violations

6.3 Notification Process

When possible, Epiture will notify customers of AUP violations via email to the registered administrative contact. However, in cases of severe abuse or security threats, services may be suspended immediately without prior notice to protect our network and other customers.

7. Abuse Reporting

If you believe that Epiture services are being used in violation of this AUP, please report it immediately to our abuse team:

Email: abuse@epiture.net

Please include relevant details such as IP addresses, timestamps, log files, and a description of the abuse. All reports are investigated promptly.

Our abuse team typically responds to reports within 24 hours during business days. Critical security issues are handled with higher priority.

8. Customer Responsibilities

Customers are responsible for:

  • Ensuring all users of their services comply with this AUP
  • Implementing and maintaining appropriate security measures
  • Promptly addressing abuse complaints and taking corrective action
  • Keeping contact information current and monitoring abuse notifications
  • Monitoring systems for signs of compromise or unauthorized use
  • Backing up critical data and configurations

9. Legal Compliance

All services must be used in compliance with:

  • Laws and regulations of the Republic of Korea
  • International telecommunications and internet governance regulations
  • Applicable privacy and data protection laws (including GDPR where applicable)
  • Export control regulations
  • Industry-specific regulations relevant to your use case

10. Peering and Interconnection

For customers with BGP peering arrangements:

  • Peering sessions must be configured according to agreed parameters
  • Route announcements must comply with Epiture's routing policies
  • Customers must maintain 24/7 network operations contacts
  • BGP communities and route tags must be used appropriately
  • Changes to routing policies require advance notification

11. Updates to This Policy

Epiture reserves the right to modify this AUP at any time. Material changes will be communicated to customers via email or through our customer portal. Continued use of services after policy updates constitutes acceptance of the revised terms.

The current version of this policy is always available at https://epiture.net/legal/aup

By using Epiture services, you acknowledge that you have read, understood, and agree to be bound by this Acceptable Use Policy.