Acceptable Use Policy

1 day ago

Acceptable Use Policy (AUP)

Finch Technology Enterprise (FinchTech) Revision date: 16.04.2026

1. GOALS AND SCOPE

1.1. Purpose: This AUP specifies actions considered abusive and prohibited by FinchTech. It is designed to ensure the security, reliability, and privacy of our network and the systems of others. 1.2. Law of the Land: FinchTech follows a "Law of the Land" stance. All content and activities must abide by the laws of Malaysia and the country where the specific service is hosted (e.g., USA/Las Vegas nodes). 1.3. Incorporation: This AUP is incorporated by reference into the FinchTech Terms & Conditions. Continued use of FinchTech services constitutes acceptance of this policy.


2. RESPONSIBILITIES

2.1. Client Liability: Each Customer is responsible for all activity originating from their account, whether authorized by the Customer or the result of a compromise. 2.2. Content Responsibility: FinchTech does not proactively monitor the data traversing our network (VPN/VLESS traffic). However, if we are notified of illegal activity, we will act in accordance with Malaysian law.


3. PROHIBITED NETWORK ACTIVITIES

3.1 SPAM (Unsolicited Email)

  • FinchTech has zero tolerance for Spam.

  • Sending unsolicited bulk email or maintaining an open SMTP relay is strictly prohibited.

  • Outbound SMTP (Port 25) is blocked by default on all VPS and Proxy nodes to maintain the reputation of our IP blocks.

  • If your activity results in an IP being blacklisted, a RM400.00 de-listing fee applies.

3.2 Hacking & Network Scanning

  • Any attempt to probe, scan, or test the vulnerability of a system or network (Port Scanning) without authorization is prohibited.

  • Use of FinchTech services to launch DDoS attacks, distribute Malware/Viruses, or host "Botnet" C&C servers will result in immediate termination without refund.

3.3 IP Spoofing & Anonymous Proxies

  • IP Spoofing or impersonating other computer systems is prohibited.

  • While we provide VPN/VLESS services for privacy, using our infrastructure to create a secondary "Anonymous Proxy" for the purpose of malicious activity or bypassing legal sanctions is prohibited.


4. PROHIBITED CONTENT

4.1 Illegal Materials

  • Child Pornography: Zero tolerance. Any discovery will result in an immediate ban and a report to the PDRM (Royal Malaysia Police).

  • Terrorism: Use of services to promote terrorist activities, host extremist forums, or store related media is strictly prohibited.

  • Copyright Infringement: Hosting or distributing pirated software, movies, or music in violation of the Copyright Act 1987 (Malaysia) or DMCA is not allowed.

4.2 Fraud & Offensive Material

  • Hosting "Phishing" sites, fake banking portals, or fraudulent investment schemes is prohibited.

  • Any material that threatens bodily harm or destruction of property is not allowed.


5. RESOURCE ABUSE (KVM & SHARED SERVICES)

5.1 Resource Overload: * On shared KVM slices, Customers may not utilize 25% or more of system resources (CPU/IO) for longer than 90 seconds.

  • Sustained high-load activities like Crypto Mining or Video Transcoding on shared nodes are prohibited.

5.2 Storage Abuse:

  • Hosting accounts and VPS slices are for active service use. Using FinchTech infrastructure as a secondary backup/storage vault for non-service related files is not permitted.

5.3 Torrents:

  • Running BitTorrent trackers or clients is prohibited on Shared/Proxy nodes. Legal torrenting is permitted only on Dedicated KVM Slices with an "Exit Policy" ticket on file.


6. DDOS ATTACK POLICY

6.1 Incoming Attacks:

  • If a Customer IP is targeted by a DDoS attack, it will be null-routed for 24-48 hours to protect the rest of the network.

  • Recurring attacks on the same service will result in permanent suspension. FinchTech does not provide "DDoS-Friendly" hosting unless specifically subscribed to a protected plan.

6.2 Outgoing Attacks:

  • Any server found sending outgoing DDoS packets will be terminated immediately and permanently.


7. ANONYMITY NETWORKS (TOR & I2P)

7.1 Exit Nodes:

  • FinchTech supports Freedom of Speech. You may run Tor/I2P Relay or Bridge nodes.

  • If you run an Exit Node, you must open a support ticket to inform us.

  • Exit Nodes must have Reverse DNS applied and must block SMTP ports (25, 465, 587) and IRC ports to curb abuse complaints.


8. REMEDIAL ACTION & TERMINATION

8.1 Investigation: FinchTech reserves the right to disable any service to investigate suspected AUP violations. 8.2 Failure to Respond: Failure to respond to an abuse ticket within 24 hours may result in service termination. 8.3 Decisions are Final: Termination for malicious AUP violations (Spam, Hacking, Fraud) is final and no refunds will be issued.


9. REPORTING VIOLATIONS

To report abuse originating from our network (FinchTech/dash.finchtech.my), please contact our abuse department: