Acceptable Usage Policy

Last Updated: 26 February 2026

This Acceptable Usage Policy ("AUP") governs the use of all services provided by Leapswitch Networks Pvt. Ltd. ("Leapswitch", "we", "us", or "our"), with its registered office at Office 410, Spectra Commercial, Pratik Nagar, Paud Road, Pune 411038, Maharashtra, India. This AUP is incorporated by reference into our Terms of Service and applies to all customers, resellers, and their end-users.

Leapswitch provides services to clients worldwide and has the responsibility to protect each client and provide them with the best services available. This AUP is designed to ensure we can fulfil that responsibility.

Leapswitch will be the sole arbiter as to what constitutes a violation of these provisions. We reserve the right to update this AUP at any time; material changes will be communicated to customers via email with at least 15 days' notice.

1. General

Services provided by Leapswitch may be used for lawful purposes only. Transmission, storage, or presentation of any information, data, or material in violation of any applicable law is prohibited, including but not limited to:

  • The laws of India, including the Information Technology Act, 2000, the Indian Penal Code, the Protection of Children from Sexual Offences Act, 2012 (POCSO), and the Digital Personal Data Protection Act, 2023.
  • The laws of the United States of America, including applicable federal, state, and local laws, for services delivered from US datacenter locations.
  • The laws of the European Union and applicable member state laws for services delivered from European datacenter locations.
  • Any applicable international laws, treaties, and sanctions regimes.

The subscriber agrees to indemnify and hold harmless Leapswitch from any claims resulting from the use of the service which damages the subscriber or any other party.

2. Prohibited Content

The following content is strictly prohibited on all Leapswitch services:

  • Child Sexual Abuse Material (CSAM) or any content that sexually exploits or endangers minors — see Section 8 for reporting obligations.
  • Copyrighted media distributed without authority from the copyright holder.
  • Unlicensed software, cracking tools, serial key generators, or tools designed to circumvent digital rights management.
  • Content promoting or facilitating terrorism, violent extremism, or radicalisation.
  • Content inciting violence, hatred, or discrimination based on race, religion, ethnicity, gender, sexual orientation, disability, or other protected characteristics.
  • Fraudulent content, phishing pages, pyramid schemes, Ponzi schemes, or High Yield Investment Programs (HYIPs) and related monitors or toplists.
  • Malware, ransomware, spyware, trojans, rootkits, keyloggers, viruses, or any other malicious software.
  • Botnets, command-and-control (C2) infrastructure, or tools designed for unauthorised access to computer systems.
  • Non-consensual intimate imagery, including deepfakes or AI-generated synthetic intimate content.
  • Content protected by trade secret or other statute.
  • Material that facilitates identity theft, credential theft, or social engineering attacks.

Links to prohibited content, as defined above, are also prohibited.

Adult Content: Legal adult content is permitted on dedicated server and VPS product lines only, subject to all applicable laws. Adult content is not permitted on shared or reseller hosting.

3. Network Abuse

Any attempts to undermine or cause harm to Leapswitch equipment, network, operations, or clientele is strictly prohibited. Leapswitch will pursue legal action to the fullest extent for all abuse or violation. The following activities are prohibited:

  • Denial of Service Attacks: Initiating or participating in Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks, whether targeting Leapswitch infrastructure, other customers, or external networks.
  • Unauthorised Scanning: Port scanning, vulnerability scanning, or penetration testing of any system without explicit written authorisation from the system owner.
  • IP Spoofing: Forging or manipulating TCP/IP packet headers, email headers, or any part of a message to disguise the origin of transmitted data.
  • BGP Abuse: Unauthorised announcement of IP address space, BGP hijacking, or route manipulation.
  • DNS Abuse: DNS amplification attacks, DNS cache poisoning, or operating open DNS resolvers used for amplification attacks.
  • Network Interference: Any activity that degrades, disrupts, or interferes with the services of other Leapswitch customers or external networks, including packet flooding, bandwidth saturation, and protocol abuse.
  • Unauthorised Access: Attempting to gain unauthorised access to any system, network, account, or data belonging to Leapswitch or any third party.
  • Traffic Interception: Monitoring, intercepting, or capturing network traffic not intended for your system without proper authorisation.

4. Bulk Email and Anti-Spam

Spamming (unsolicited bulk email) from the Leapswitch network, or spamvertising (advertising sites hosted on the Leapswitch network via unsolicited email) is strictly prohibited.

Legitimate bulk email must meet all of the following criteria:

  • The recipient has confirmed their willingness to receive messages by responding to a verification email or otherwise verifiably confirming permission (double opt-in). Evidence of consent must be retained and available upon request.
  • Messages include valid headers, a functioning unsubscribe mechanism, and information on how the recipient's address was obtained.
  • All bulk email senders must publish privacy policies associated with the sending domains.
  • Compliance with the CAN-SPAM Act (for messages to US recipients), the EU ePrivacy Directive (for messages to EU recipients), and India's applicable regulations.
  • If Leapswitch requests evidence of recipient consent, this request must be honoured within 24 hours.

Failure to meet the acceptable criteria for bulk mail may lead to immediate termination. If such actions cause mail servers or IP address ranges on the Leapswitch network to be blacklisted, Leapswitch reserves the right to terminate the customer's account and levy remediation charges for the cost of delisting.

5. Cryptocurrency Mining

Cryptocurrency mining, proof-of-work computation, or any form of blockchain mining is prohibited on all Leapswitch services unless expressly authorised in writing by Leapswitch management. This includes but is not limited to:

  • Mining software running on CPUs, GPUs, or any other hardware components.
  • Browser-based mining scripts (e.g., Coinhive or similar) embedded in websites hosted on our infrastructure.
  • Proof-of-stake validation or other consensus mechanisms that consume excessive resources.

Unauthorised cryptocurrency mining will result in immediate service suspension and may result in termination without refund. Leapswitch reserves the right to charge for excess resource consumption caused by unauthorised mining activity.

6. AI and Machine Learning Workloads

Leapswitch welcomes legitimate AI/ML workloads on our GPU and dedicated server infrastructure. However, the following requirements apply:

  • AI/ML workloads must comply with all applicable laws and regulations, including data protection laws, intellectual property rights, and export control regulations.
  • Training datasets must be lawfully obtained and must not contain CSAM, non-consensual intimate imagery, or other prohibited content as defined in this AUP.
  • AI-generated content hosted on or distributed through Leapswitch infrastructure must comply with applicable content regulations, including disclosure requirements for synthetic media.
  • You are solely responsible for ensuring that your AI/ML workloads comply with export control regulations applicable to the hardware and software you are using.

7. Service-Specific Restrictions

Shared and Reseller Hosting

In addition to the general prohibitions above, the following activities are prohibited on shared hosting and reseller hosting accounts due to their shared resource nature:

  • IRC servers or related services (IRC bots, bouncers, etc.).
  • Game servers, voice servers (e.g., TeamSpeak, Mumble), and related applications.
  • Streaming media servers or proxy servers.
  • Scripts commonly used for abuse, attacks, or network flooding.
  • Any application that consumes excessive CPU, memory, disk I/O, or network resources to the detriment of other customers on the shared server.

Dedicated Servers and VPS

Customers with dedicated servers and VPS have greater freedom in the applications they run, as they have dedicated resources. Game servers, voice servers, and IRC services are permitted on dedicated and VPS products, provided they:

  • Comply with all applicable laws and the general prohibitions in this AUP.
  • Do not generate excessive abuse complaints or network abuse.
  • Do not negatively impact the network or other customers.

8. Child Sexual Abuse Material (CSAM) and POCSO Compliance

Leapswitch maintains a zero-tolerance policy toward Child Sexual Abuse Material (CSAM) and any content that sexually exploits or endangers children.

In compliance with the Protection of Children from Sexual Offences Act, 2012 (POCSO) and the POCSO Rules:

  • Any CSAM discovered on our infrastructure will be immediately disabled and reported to the Special Juvenile Police Unit (SJPU) or local police, and to the National Cyber Crime Reporting Portal (cybercrime.gov.in) as required under Rule 11 of the POCSO Rules.
  • Evidence will be preserved and handed over to law enforcement as required by law.
  • The account will be immediately terminated without refund.

In compliance with the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 (as amended in 2023), CSAM content will be taken down within 2 hours of identification.

If you encounter CSAM on any Leapswitch service, report it immediately to abuse@leapswitch.com.

9. Sanctions Compliance

You represent and warrant that:

  • You are not located in, or a national or resident of, any country or territory subject to comprehensive sanctions imposed by the United Nations, the United States (OFAC), the European Union, or India.
  • You are not listed on any sanctions list maintained by the aforementioned authorities.
  • You will not use Leapswitch services to conduct transactions with or provide services to sanctioned entities or individuals.
  • You will not use Leapswitch services in violation of any applicable export control laws or regulations.

10. Resource Usage and Bandwidth

Resource Usage

Leapswitch will be the sole arbiter as to what constitutes a violation of resource usage limitations. To maintain the integrity of our shared infrastructure, cloud server or VPS services that utilise excessive system resources may be required to upgrade, or Leapswitch may relocate the service to a different server and/or IP address to reduce load.

Bandwidth

Overage fees will apply to any service utilising more than its assigned bandwidth allocation, except for services with unmetered bandwidth. Overages will be calculated based on the overall amount of data transferred (in GB) during a monthly period, unless a service is sold based on Mbps, in which case the industry-standard 95th percentile method will be used unless otherwise specified in the service contract.

You are responsible for all bandwidth usage and any corresponding overage fees, including usage resulting from a compromised or hacked service. Leapswitch may require a deposit if your usage significantly exceeds standard bandwidth allocation.

Filtering

Leapswitch reserves the right to block, filter, or throttle ports and/or IP address ranges at its discretion for security and network integrity purposes. This may include blocking known-malicious ports, denying access from known-abusive IP ranges, rate-limiting traffic types, or prioritising critical traffic (e.g., VoIP).

11. CERT-In Incident Reporting

In compliance with CERT-In Directions (Direction No. 20(3)/2022-CERT-In), Leapswitch and its customers are subject to the following obligations:

  • Mandatory Reporting: Cyber security incidents must be reported to CERT-In within 6 hours of becoming aware of them. Leapswitch will report incidents affecting its infrastructure. You are responsible for reporting incidents affecting your hosted applications and services.
  • Cooperation: You must cooperate with Leapswitch in investigating security incidents and provide relevant information and access as needed.
  • Log Maintenance: You are responsible for maintaining logs of your systems and applications hosted on Leapswitch infrastructure. Leapswitch maintains infrastructure-level logs for a rolling 180-day period as mandated.

12. Policy Violations and Enforcement

Monitoring

Leapswitch may, at any time, monitor systems for data or activity indicating potential policy violations. Such monitoring is conducted in accordance with applicable law and our Privacy Policy.

Warnings

The Leapswitch Abuse Department will make reasonable efforts to contact customers via email when a possible violation is identified. These alerts are a courtesy. Responses to such alerts are required within 24 hours. Failure to respond may lead to service suspension. Repeated failure to respond may result in termination.

Suspension and Termination

If any terms or conditions of this AUP are violated, the customer risks service suspension or termination. Leapswitch reserves the right to suspend or remove any account without prior notice in cases of severe or imminent harm. If Leapswitch terminates an account for violating this AUP, the customer will forfeit any rights to a refund. No refunds for advance payments will be granted for terminated accounts.

Unauthorised Usage

If your service is compromised by unauthorised parties and used for abuse or violations, you are responsible for stopping all affected applications until the source of the problem is found and corrected. Leapswitch may disable services until the investigation is complete.

You are responsible for maintaining a secure system, monitoring your services, and ensuring that resource usage remains within the levels outlined in your service contract.

Abusive Conduct

Leapswitch may, at its discretion, suspend or terminate service of any client who is abusive or harassing toward Leapswitch or its employees. Examples include but are not limited to:

  • Verbal abuse — threatening, intimidating, or hostile communications.
  • Ongoing disregard for warnings or notices.
  • Spamming Leapswitch email addresses, ticket systems, or staff.
  • Continuous involvement in DDoS activity, compromised services, or other ongoing prohibited usage.
  • Issuing chargebacks or bouncing payments without prior communication.
  • Activity that affects the services of other Leapswitch customers.

13. Reporting Violations

If you become aware of any violation of this AUP, please report it to our Abuse Department:

Email: abuse@leapswitch.com
For CSAM reports, also report to: cybercrime.gov.in

This AUP should be read in conjunction with our Terms of Service and Privacy Policy.