Document Info
- Version
- 1.0
- Last Updated
- Mar 29, 2026
- Reading Time
- 5 min
Table of Contents
Actions
Acceptable use policy
This Acceptable Use Policy (“AUP”) describes rules for using the WPShift platform, website, dashboard, APIs, WPShift Cloud, and related services (collectively, the “Service”).
This AUP is part of, and should be read together with, our Terms of Service.
By using the Service, you agree to comply with this AUP.
1. General principle
You may use the Service only in a lawful, responsible, and authorized manner.
You may not use the Service in a way that:
violates applicable law or regulation;
violates the rights of others;
threatens the security, integrity, availability, or stability of the Service or any third-party systems;
violates the terms or policies of any underlying provider connected to or used by the Service, including infrastructure providers such as Hetzner.
2. Prohibited content and activity
You may not use the Service to host, distribute, promote, facilitate, or operate:
malware, ransomware, spyware, trojans, viruses, worms, or other malicious code;
phishing pages, credential theft operations, or impersonation schemes;
botnets, command-and-control infrastructure, or malicious automation;
content or services that facilitate unauthorized intrusion, exploitation, or credential abuse;
illegal content or unlawful activity;
fraudulent, deceptive, or misleading schemes;
content that infringes intellectual property, privacy, publicity, or other legal rights;
spam, unsolicited bulk email, or abusive messaging activity.
3. Unauthorized security activity
You may not use the Service to perform or facilitate:
unauthorized access to systems, networks, devices, or accounts;
port scanning, vulnerability scanning, or enumeration without authorization;
denial-of-service attacks, distributed denial-of-service attacks, or traffic flooding;
credential stuffing, brute-force attacks, or password spraying;
interception of data without authorization;
attempts to evade authentication, security controls, rate limits, plan limits, or access restrictions.
Legitimate security testing is only allowed where you have clear authorization from the affected system owner and where the activity does not harm the Service or third parties.
4. Abuse of infrastructure and resources
You may not use the Service in a way that unreasonably consumes resources or threatens platform stability.
Prohibited or restricted behavior includes:
abusive CPU, memory, disk, bandwidth, or network consumption;
running workloads designed primarily for abusive automation, hidden mining, traffic manipulation, or platform degradation;
using the Service to bypass service limits, quotas, or commercial restrictions;
reselling or sharing access in a way that violates your plan or our Terms;
using WPShift Cloud or connected infrastructure in a way likely to trigger abuse complaints, blacklisting, or enforcement by upstream providers.
5. Email and messaging abuse
You may not use the Service to send or facilitate:
spam or unsolicited bulk communications;
deceptive headers or misleading sender identity information;
phishing or scam messages;
abusive cold outreach in violation of applicable law;
email practices that are likely to cause IP or domain blacklisting.
You are responsible for complying with all laws and provider requirements relating to email, messaging, opt-in, unsubscribe handling, and anti-spam compliance.
6. Illegal and regulated uses
You may not use the Service for activities that are unlawful, restricted, or prohibited under applicable law, including where relevant:
sanctions or export-control violations;
unlawful gambling;
illegal drug trafficking or prohibited goods;
child sexual abuse material or exploitation;
terrorist or extremist activity;
money laundering, fraud, or identity theft.
7. Customer responsibility
You are responsible for:
all activity conducted through your account;
the systems, websites, applications, and content you deploy or manage through the Service;
the actions of your users, team members, contractors, and anyone accessing the Service through your credentials or permissions;
ensuring that your use of the Service complies with this AUP, our Terms, and applicable law.
8. Monitoring and enforcement
WPShift may monitor use of the Service where reasonably necessary to protect the platform, investigate abuse, comply with law, or enforce this AUP.
If we reasonably believe that you have violated this AUP, we may take action including:
warning you;
removing or disabling access to content or workloads;
throttling, suspending, isolating, or terminating services;
blocking access to features, accounts, servers, or networks;
cooperating with upstream providers, payment partners, or competent authorities;
preserving and disclosing relevant information where required by law or reasonably necessary to investigate abuse.
We may act without prior notice where immediate action is reasonably necessary to protect the Service, users, third parties, or upstream providers.
9. Upstream providers
WPShift Cloud currently runs on infrastructure provided by Hetzner, and the Service may also depend on other third-party providers.
You may not use the Service in a way that would violate the applicable terms, policies, acceptable use rules, or abuse-prevention standards of any upstream provider used in connection with the Service.
WPShift may take enforcement action where reasonably necessary to comply with upstream provider obligations or prevent abuse-related disruption.
10. Reporting abuse
If you believe that someone is using the Service in violation of this AUP, you can report it to:
WPShift
Email: info@wpshift.io
Please include sufficient detail for us to investigate, such as relevant URLs, domains, IPs, timestamps, and a description of the issue.
11. Changes to this AUP
We may update this AUP from time to time by posting an updated version on our website or in the Service.
The updated version becomes effective on the date stated at the top of the policy.