Legal

Acceptable Use Policy

Last updated: March 2026

Purpose

This Acceptable Use Policy (“AUP”) protects the security, stability, and lawful operation of Mukdi services. All customers, users, and affiliates using our network, systems, and hosted resources must comply with this AUP and all applicable laws.

Because abuse patterns evolve, we may update this policy to address new threats, regulatory requirements, and operational risks.

Prohibited Activities

The following activities are strictly prohibited:

  • Hosting, distributing, or controlling malware, ransomware, or exploit kits.
  • Phishing, credential theft, impersonation campaigns, or fraud operations.
  • Illegal content distribution, including CSAM or prohibited violent material.
  • Unauthorized access attempts, privilege escalation, or data exfiltration.
  • Operating botnets, C2 infrastructure, or traffic anonymization for abuse.
  • IP infringement where takedown evidence confirms rights violations.

Resource Usage

Customers must operate within purchased service limits and avoid workloads that degrade shared platform performance. Excessive CPU saturation, abusive I/O spikes, uncontrolled outbound traffic, and repeated crash loops may trigger protective throttling.

Where fair-use policies apply, sustained overconsumption may require plan upgrades, architecture changes, or migration to dedicated resources.

Email & Spam Policy

Unsolicited bulk email (“spam”), purchased list blasting, open relay abuse, and list harvesting are prohibited. Email operations must comply with applicable anti-spam laws, including CAN-SPAM and equivalent regional regulations.

Customers must maintain SPF, DKIM, and DMARC hygiene where relevant, monitor bounce rates, and promptly remediate compromised scripts or plugins sending abusive mail.

Security Policy

Customers are responsible for securing their applications, credentials, and server configurations. Minimum expectations include strong passwords, timely patching, firewall rules, and backup hygiene.

Failure to remediate critical security vulnerabilities after notice may result in temporary restrictions to protect broader network integrity.

Content Standards

Hosted content must comply with law, contractual obligations, and platform safety standards. Content that promotes illegal conduct, targeted harassment, or serious harm may be removed or blocked following review.

Where lawful notice-and-takedown requests are received, we process them according to jurisdictional requirements and internal evidence standards.

Enforcement

Enforcement actions are risk-based and can include warnings, rate-limits, temporary suspension, service isolation, or permanent termination. We may act immediately for high-severity abuse that threatens network security or legal compliance.

Remediation opportunities may be offered for low-severity first incidents, but repeated or malicious behavior can lead to irreversible account closure.

Reporting Violations

Report suspected violations to support@mukdi.com with detailed evidence: timestamps, URLs, source IPs, full email headers, and relevant logs. Reports with clear evidence are prioritized for faster triage.

Reach Mukdi

Contact channels

Same team across email, phone, and WhatsApp — include your client ID or domain for faster routing.