Back to Legal

Acceptable Use Policy

Guidelines for appropriate use of Clarkes.Team services and platforms.

Last updated: January 1, 2026 5 min read

1 Purpose

This Acceptable Use Policy ("AUP") outlines the acceptable and prohibited uses of Clarkes.Team services. This policy applies to all clients, users, and anyone accessing systems managed or hosted by Clarkes.Team.

Who This Applies To

This policy applies to all services including server management, cloud infrastructure, WordPress hosting, and any systems we manage on your behalf.

2 General Principles

Our services must be used in a manner that is legal, ethical, and respectful of others. You are responsible for all activities under your account and must ensure compliance by anyone you authorize to access our services.

Legal

Comply with all laws

Ethical

Act with integrity

Respectful

Consider others

3 Prohibited Uses

The following activities are strictly prohibited:

3.1 Illegal Activities

  • Violating any applicable laws or regulations
  • Distributing child exploitation material
  • Facilitating illegal gambling
  • Money laundering or fraud
  • Trademark or copyright infringement

3.2 Harmful Activities

  • Distributing malware, viruses, or malicious code
  • Launching denial-of-service attacks
  • Unauthorized access to systems or data
  • Phishing or social engineering attacks
  • Spam or unsolicited bulk email

3.3 Abusive Content

  • Hosting content that promotes violence or hatred
  • Defamatory or harassing material
  • Privacy violations or doxxing
  • Deceptive practices or fraud

3.4 Resource Abuse

  • Cryptocurrency mining without authorization
  • Operating open proxies or relays
  • Excessive resource consumption affecting other clients
  • Reselling services without authorization

Zero Tolerance Policy

Violations involving illegal content, security attacks, or activities that endanger other clients will result in immediate termination without refund.

4 Security Requirements

You must:

  • Use strong, unique passwords for all accounts
  • Keep software and applications updated
  • Promptly report security incidents
  • Not share access credentials
  • Implement appropriate access controls

We're Here to Help

Need help implementing security best practices? Our team can assist with password policies, access controls, and security hardening.

5 Email Policies

If we manage your email infrastructure:

  • All email must comply with CAN-SPAM and applicable laws
  • No unsolicited bulk email (spam)
  • Valid unsubscribe mechanisms required for marketing emails
  • Accurate sender information required
  • Purchased email lists are prohibited

6 Content Responsibility

You are solely responsible for content stored or transmitted through our services. We do not pre-screen content but may remove content that violates this policy.

Backup Responsibility: While we maintain backups as part of our services, you are ultimately responsible for maintaining your own backups of critical data.

7 Enforcement

Violations of this policy may result in:

1 Warning and request for corrective action
2 Temporary suspension of services
3 Permanent termination of services
4 Reporting to law enforcement if required

We reserve the right to take immediate action without notice for severe violations that threaten the security or integrity of our systems or other clients.

8 Reporting Violations

To report a violation of this policy, contact us at abuse@clarkes.team. Please include:

  • Description of the violation
  • Relevant URLs, IP addresses, or identifiers
  • Supporting evidence (screenshots, logs, headers)
  • Your contact information

We investigate all reports promptly and will respond within 24-48 hours.

9 Policy Updates

We may update this policy as needed to address new threats, technologies, or legal requirements. Material changes will be communicated to clients via email. Continued use of services constitutes acceptance of the updated policy.

10 Contact Information

Questions about this policy: