Acceptable Use Policy

Effective date: May 7, 2026

This Acceptable Use Policy (“AUP”) governs use of redu.cloud, a cloud infrastructure service operated by Redu Cloud Ltd (Company No. 17013438, registered office: 71-75 Shelton Street, Covent Garden, London, United Kingdom, WC2H 9JQ) (“we”, “us”, “our”). This AUP is incorporated by reference into our Terms of Service.

You agree to comply with this AUP when accessing or using the Services. Failure to comply may result in restriction, suspension, termination of Services, removal or disabling of resources, refusal of future access, and, where required or appropriate, reporting to law enforcement, regulators, network operators, payment providers, card networks, banking partners, or affected third parties.

1. General Principles

You must use the Services responsibly and in compliance with applicable laws, regulations, contracts, licenses, and industry standards. You are responsible for all activity originating from your account, projects, users, API keys, credentials, workloads, and resources, including actions by anyone you authorize or anyone who gains access through your systems.

You must not use the Services in a way that harms the Platform, other customers, third parties, networks, systems, data, payment systems, card networks, IP reputation, domain reputation, network reputation, or our reputation.

2. Prohibited Activities

The following activities are strictly prohibited:

  • Illegal activities: Hosting, transmitting, distributing, storing, processing, or facilitating content or activity that violates applicable laws or regulations, including intellectual property infringement, unlawful personal data processing, or content that is illegal in the relevant jurisdiction.
  • Fraud, deception, and scams: Phishing, social engineering, impersonation, fake login pages, scam operations, card testing, credential stuffing, ad fraud, click fraud, affiliate fraud, chargeback abuse, or services designed to deceive or unlawfully obtain funds, credentials, personal data, access tokens, payment details, or account access.
  • Malware and exploitation: Creating, distributing, hosting, storing, or operating malware, botnets, ransomware, spyware, keyloggers, droppers, cryptojacking scripts, exploit kits, exploit frameworks, or command-and-control infrastructure.
  • Unauthorized access: Attempting to gain unauthorized access to systems, networks, accounts, APIs, devices, or data; bypassing authentication or authorization; or probing for vulnerabilities without authorization.
  • Network abuse and disruption: Distributed denial-of-service attacks, traffic flooding, spoofing, reflection/amplification, abusive crawling, abusive scraping, route abuse, port scanning that targets third parties without authorization, or any activity that disrupts the integrity, availability, performance, or reputation of the Services or networks of others.
  • Spam and unsolicited messaging: Sending bulk or unsolicited email, SMS, messages, notifications, or other communications; operating open relays or spam services; using the Services to support spam campaigns; or any activity that materially increases abuse complaints, bounce rates, mail reputation issues, or blocklisting risk.
  • Email sending without approval: High-volume email sending, newsletter sending, transactional mail platforms, cold outreach systems, or similar mail workloads require prior written approval unless we explicitly provide an approved email sending feature. We may block, rate limit, or restrict outbound email traffic to protect platform and IP reputation.
  • Abuse of resources, credits, or evasion: Activities intended to evade usage limits, quotas, billing mechanisms, promotional credits, startup program credits, identity checks, abuse controls, rate limits, or restrictions, including creating multiple accounts to circumvent limits or eligibility rules.
  • Cryptocurrency mining: Mining cryptocurrencies, operating mining pools, running proof-of-work workloads, or operating similar resource-intensive token generation workloads without explicit written permission from us. We may permit such workloads only in limited cases and may revoke permission.
  • Harm to minors: Content or activity that exploits or harms minors. We have zero tolerance for this activity and may take immediate action and report to appropriate authorities or reporting bodies where required or permitted by law.
  • Regulated or high-risk activities without approval: Using the Services to offer or support regulated financial services, gambling, betting, high-risk payment flows, medical or life-critical services, or other regulated activities unless you hold all required licenses and have our prior written approval where applicable.
  • Interference with platform security: Interfering with security controls, abusing APIs, attempting to compromise the Platform, attempting privilege escalation, attacking management systems, or reverse engineering platform components beyond what mandatory law permits.
  • Illegal content distribution: Hosting, distributing, indexing, or facilitating access to clearly illegal content, stolen personal data, credential dumps, non-consensual intimate content, pirated content, or services primarily intended to facilitate cybercrime or illegal distribution.
  • AI, automation, and scraping abuse: Using the Services for abusive automation, credential attacks, bot activity, spam generation, fake account creation, evasion of third-party controls, unauthorized scraping, or automated activity that violates third-party terms, laws, or security controls.
  • Payment processor, banking, and card network rule circumvention: Using the Services in a way that causes us, our payment processors, banking partners, acquiring banks, or card networks to violate their rules, policies, risk requirements, or compliance obligations.
  • Reputation harm: Using the Services in a way that causes IP addresses, domains, network ranges, autonomous systems, payment accounts, or related infrastructure to be blocklisted, reputation-damaged, suspended, restricted, or subject to repeated abuse complaints.

3. Security Responsibilities

You are responsible for securing your applications, operating systems, access credentials, API keys, SSH keys, secrets, data, and workloads. This includes implementing reasonable safeguards such as firewalls, least-privilege access controls, secure key management, encryption where appropriate, timely patching, backups, monitoring, logging, and secure configuration.

You are responsible for the consequences of compromised credentials, misconfigured workloads, exposed services, insecure software, or vulnerable applications deployed by you.

3.1 Vulnerability testing and security research

You may not perform penetration testing, vulnerability scanning, stress testing, load testing, denial-of-service simulation, or security research against the Platform, our infrastructure, or other customers without our prior written permission.

You may perform reasonable security testing of your own applications and workloads where it does not affect the Platform, other customers, third-party systems, network reputation, or service stability. You must not test against third-party systems without authorization.

If you discover a vulnerability, please report it responsibly to office@redu.cloud and avoid public disclosure until we have had a reasonable opportunity to investigate and remediate.

4. Monitoring, Abuse Prevention, and Enforcement

We may review usage patterns, metadata, logs, alerts, traffic signals, abuse reports, payment signals, and security events to maintain platform security, prevent abuse, investigate incidents, enforce this AUP, comply with legal obligations, and protect other customers and third parties. Any monitoring is performed in accordance with our Privacy Policy.

We may take action we reasonably consider necessary to protect the Services, customers, third parties, payment systems, networks, and platform integrity, including rate limiting, blocking, filtering, quarantining, disabling public access, disabling ports, restricting protocols, restricting destinations, restricting APIs, suspending resources, deleting resources, revoking credits, refusing service, or terminating accounts.

We may block, filter, rate limit, or restrict inbound or outbound network traffic, including specific ports, protocols, destinations, or traffic patterns, where needed to protect platform security, network reputation, email deliverability, service stability, payment-processing risk, legal compliance, or third parties.

4.1 Notice and urgency

Where practical, we may provide notice and an opportunity to remedy. However, we may take immediate action without prior notice if we reasonably believe there is ongoing abuse, a security risk, suspected fraud, chargeback risk, legal risk, sanctions risk, compliance risk, harm to third parties, risk to platform stability, or a need to comply with law or authority requests.

4.2 Evidence preservation

Where abuse, fraud, security incidents, payment disputes, or legal issues are suspected, we may preserve relevant logs, metadata, account records, billing records, and resource information as needed to investigate, enforce our policies, protect our rights, respond to disputes, or comply with legal obligations.

5. Incident Response and Cooperation

In the event of suspected abuse, compromise, payment fraud, security incidents, or policy violations, you agree to cooperate with reasonable requests for information and remediation. This may include patching vulnerable systems, rotating keys, disabling compromised services, removing prohibited content, restricting access, providing logs, or confirming corrective actions.

For urgent abuse, security, fraud, payment, legal, or platform stability issues, we may require you to respond and begin remediation within the timeframe we specify, depending on severity. If you do not respond or remediate in time, we may take protective action, including disabling access to affected Resources.

Failure to cooperate, repeated violations, or failure to remediate may result in additional enforcement actions, including suspension or termination.

6. Reporting Abuse

If you become aware of abuse, security vulnerabilities, or policy violations involving redu.cloud, please report them to office@redu.cloud.

Please include relevant details where available, such as IP addresses, timestamps, URLs, logs, screenshots, account identifiers, affected systems, and a short description of the suspected issue.

7. Sanctions, Export Controls, and Restricted Parties

You must not use the Services in violation of applicable sanctions, export control, anti-terrorism, or anti-money laundering laws. You must not use the Services if you are subject to applicable sanctions, located in a comprehensively sanctioned jurisdiction where providing the Services would be prohibited, or acting on behalf of a restricted party.

You must not use the Services to develop, operate, or support activities that would require export authorization unless you have obtained all required approvals and we have agreed in writing where applicable.

8. Additional Business Verification

To protect the Platform and reduce fraud, abuse, sanctions, chargeback, payment-processing, and compliance risk, we may apply risk-based checks before enabling payments, increasing quotas, lifting limits, approving startup program credits, approving high-risk workloads, or allowing certain network activity.

These checks may include requiring a valid payment method, basic business details for invoicing, confirmation of domain email, company or project information, intended usage details, or additional verification for high-risk use cases. We will request only what is reasonably necessary in the circumstances.

9. Restricted Industries and High-Risk Uses

The Services are not intended for certain high-risk uses. We may restrict, refuse, suspend, or require prior written approval for use cases that create elevated legal, fraud, safety, payment, security, or reputation risk, including non-exhaustive examples such as:

  • Illegal drugs marketplaces or facilitation of illegal drug distribution
  • Unlicensed gambling, betting, lottery, or casino operations
  • Unlicensed financial services or “get rich quick” scams
  • High-risk investment schemes or deceptive financial promotions
  • Adult content businesses that materially increase fraud, abuse, or chargeback risk
  • Services primarily designed to facilitate cybercrime
  • Bulk proxy services, residential proxy services, VPN resale, or traffic resale without approval
  • Mass account creation, CAPTCHA-solving, bot farms, or evasion services
  • Life-critical, emergency, or safety-critical systems without explicit written approval
  • Businesses, workloads, or customer activity that would violate or create unacceptable risk under the rules of our payment processors, banking partners, acquiring banks, card networks, infrastructure providers, or network providers

10. Startup Program and Promotional Credits

Promotional credits, trial credits, startup program credits, and other incentives may only be used for legitimate testing, development, deployment, or production workloads that comply with this AUP and our Terms of Service.

We may revoke credits, deny issuance, suspend accounts, or require repayment of improperly obtained benefits if we reasonably believe there is fraud, abuse, duplicate account creation, false information, violation of eligibility rules, prohibited workloads, or attempts to circumvent program restrictions.

11. Changes to this Policy

We may update this AUP from time to time. Changes will be posted on this page with an updated effective date. Continued use of the Services after the effective date constitutes acceptance of the updated AUP.

12. Relationship to Other Policies

This AUP should be read together with our Terms of Service, Privacy Policy, and Refund Policy. In the event of a conflict, the Terms of Service shall prevail.

13. Contact

For abuse reports, security issues, or questions about this AUP, contact office@redu.cloud.