Acceptable Use Policy
GhostHosts provides hosting infrastructure for legitimate use. The following activities are prohibited.
Prohibited Activities
- Distributing malware, viruses, or ransomware
- Phishing, credential theft, or identity fraud
- Sending spam or unsolicited bulk email
- Hosting child exploitation material
- DDoS attacks or network abuse
- Cryptocurrency mining on shared hosting plans
- Violating copyright or intellectual property laws
- Any activity that violates applicable local or international law
Enforcement
Violations may result in immediate suspension or termination of service without refund. We may report illegal activity to relevant authorities when required by law.
Resource Limits
Shared hosting accounts that consistently exceed their resource allocation may be throttled or asked to upgrade. VPS customers have dedicated resources and are not subject to shared resource limits.