Last updated: April 12, 2026
This Acceptable Use Policy (“AUP”) is an integral part of the Terms of Service (“ToS”) of GlobalTeleHost Corp. (“GTHost”) available at gthost.com/terms, and applies to all subscribers (“Subscriber”, “you”, or “your”) using GTHost services (“Services”). Use of our Services constitutes acceptance of both the ToS and this AUP. In the event of any conflict between this AUP and the ToS, the ToS prevails.
1. Purpose
GTHost supports the uncensored flow of information and ideas over the Internet. We do not actively monitor Subscriber activity or exercise editorial control over Customer Content under normal circumstances. However, GTHost reserves the right to investigate and take action where activity on our network violates this AUP, the ToS, or applicable law.
The purpose of this AUP is to:
- ensure reliable and secure operation of our network and Services;
- protect our infrastructure, other Subscribers, and third parties from abuse or illegal activity;
- comply with the laws of the Province of Ontario and Canada, and applicable international law;
- maintain GTHost’s reputation as a responsible infrastructure provider;
- preserve the value of Internet resources as a conduit for free expression and exchange of information.
2. Subscriber Responsibility
Subscribers are solely responsible for:
- securing their accounts, systems, and software against unauthorized access and misuse;
- all activity conducted under their accounts or infrastructure, including activity by employees, contractors, customers, or other third parties (see Section 10 of the ToS);
- ensuring that any third-party access to Services complies with this AUP and the ToS.
Subscribers must take reasonable measures to prevent unauthorized access to their accounts or systems. Misuse by a third party does not relieve the Subscriber of responsibility under this AUP or the ToS.
3. Prohibited Uses
Subscribers may not use the Services for any unlawful, abusive, or harmful activity, whether directly or indirectly. The following list is illustrative and not exhaustive.
3.1. Illegal and Harmful Activities
- engaging in illegal activities or supporting illegal conduct under applicable Canadian, US, European, or international law;
- use of Services to harm or attempt to harm minors in any way, including child exploitation or sexual abuse material;
- transmitting material that threatens or encourages bodily harm or destruction of property;
- harassing or intimidating individuals or groups;
- fraudulent activity, including phishing, scams, pyramid or Ponzi schemes, chain letters, or other financial fraud;
- distribution, storage, or access to illegal content of any kind;
- violation of applicable export control laws or sanctions regimes, including those administered by Canada, the United States, or the European Union.
3.2. Forgery, Impersonation, and Misrepresentation
- adding, removing, or modifying identifying network header information to mislead others;
- attempting to impersonate any person or entity using forged headers or other identifying information. Use of anonymous remailers or nicknames does not constitute impersonation.
3.3. Spam and Unsolicited Communications
- sending unsolicited commercial email or bulk messages (“spam”), or hosting services primarily intended for spam distribution;
- forging email headers, spoofing sender addresses, or using other deceptive identification in electronic communications;
- operating open mail relays or proxies that facilitate spam distribution by third parties;
- email or news bombing intended to impede another person’s use of electronic mail or news services.
If GTHost receives complaints, blacklist listings, or incurs operational costs due to spam activity originating from Subscriber infrastructure, GTHost may immediately suspend or terminate the affected Services. Where GTHost incurs actual costs — including but not limited to IP delisting fees, abuse handling, and remediation expenses — GTHost reserves the right to recover such costs from the Subscriber.
3.4. Unauthorized Access and Network Abuse
- accessing or attempting to access others’ accounts, systems, or networks without authorization;
- penetrating or attempting to penetrate security measures of GTHost or third-party systems;
- probing, scanning, or testing vulnerabilities without the explicit authorization of the system or network owner;
- denial-of-service (DoS), distributed DoS (DDoS), traffic amplification, stress-testing, or other attacks that disrupt network integrity or infrastructure;
- abusive automation or bulk messaging that degrades or disrupts third-party services or infrastructure;
- operation of command-and-control (C2) infrastructure for malware, botnets, or other malicious software.
3.5. Intellectual Property and Data Violations
- unauthorized reproduction, distribution, or transmission of material that infringes copyrights, trademarks, patents, trade secrets, or other proprietary rights;
- unauthorized copying, digitization, or distribution of copyrighted content including software, images, books, or magazines;
- collecting personal data of third parties without their knowledge or consent;
- operating services primarily designed to facilitate large-scale copyright infringement.
For GTHost’s Notice and Notice obligations under the Canadian Copyright Act, see Section 16 of the ToS.
3.6. Malware and Security Threats
- intentionally distributing viruses, malware, ransomware, spyware, or any software designed to cause harm to systems, data, or users;
- using Services to facilitate ongoing attacks, intrusions, or network disruptions against third parties.
3.7. Cryptocurrency Mining
Any form of cryptocurrency mining — including but not limited to Bitcoin, Monero, Ethereum, or any other digital currency — is prohibited on VPS and non-dedicated services. On dedicated server services, cryptocurrency mining is prohibited unless explicitly permitted under a separate written agreement with GTHost. See Sections 14.3 and 14.4 of the ToS.
3.8. Resource Abuse
Sustained use of CPU, power, bandwidth, storage I/O, or other infrastructure resources at levels inconsistent with normal operational workloads, in a manner that degrades service for other Subscribers or exceeds the operational parameters of the service. See Section 14 of the ToS for detailed resource usage policies applicable to dedicated servers, VPS, and Storage Node services.
4. Enforcement
GTHost reserves the right to take any of the following actions in response to AUP violations, at its sole discretion:
- issue written warnings and request remediation;
- restrict or filter network traffic, or null-route IP addresses associated with abusive activity;
- suspend the Subscriber’s account pending investigation;
- terminate the Subscriber’s account and all associated services;
- recover actual costs incurred as a result of the violation, including remediation, delisting fees, and administrative expenses;
- report violations to law enforcement or regulatory authorities;
- take legal action.
GTHost prefers to notify Subscribers of violations and allow an opportunity to remediate. However, where activity poses an immediate risk to network integrity, other Subscribers, or third parties, GTHost may act immediately and without prior notice. See Sections 3 and 11 of the ToS.
Subscribers must respond to abuse notifications issued by GTHost within a reasonable timeframe, which may be as short as 24 hours depending on severity. Failure to respond or remediate may result in suspension or termination of the affected Services.
GTHost’s failure to enforce this AUP on any particular occasion shall not be construed as a waiver of its right to do so at any time.
GTHost is not obligated to disclose evidence, logs, or details of any investigation to the Subscriber.
5. Reporting Violations
Reports of AUP violations should be sent to: [email protected].
Please include in your report:
- the IP address or domain associated with the alleged violation;
- the date and time of the observed activity, including timezone;
- a description of the violation;
- any supporting logs, headers, or evidence.
GTHost will investigate all reports and take appropriate action. GTHost is not obligated to disclose the outcome of any investigation to the reporting party.
6. Cooperation with Legal Authorities
GTHost may disclose Subscriber information to law enforcement authorities, regulatory bodies, or governmental agencies as required by applicable law, court order, subpoena, or other lawful request. Such disclosure may occur without prior notice to the Subscriber where legally required or where immediate disclosure is necessary to prevent harm. See Section 20.2 of the ToS for the complete disclosure policy.
7. Revisions to This AUP
GTHost reserves the right to revise or update this AUP at any time. Subscribers will be notified of changes by email to the address on file. Continued use of Services after notification constitutes acceptance of the updated AUP.
8. Subscriber Acknowledgment
By using GTHost Services, the Subscriber acknowledges that they have read, understood, and agreed to this AUP and the related provisions of the ToS.