Acceptable Use Policy

Last updated: 12.09.2025
The use of the Operator's services constitutes acceptance of these Terms.

General Principles

Users of the Operator’s network and services must use them exclusively for lawful and ethical purposes. Any activity that violates the laws of Ukraine or the EU (for example, illegal content, defamation, threats, discrimination, violation of individual rights) is strictly prohibited. The network may only be used with certified equipment: radio and telecommunication devices must bear the CE marking and comply with technical requirements to avoid “harmful interference” in the network. The Company reserves the right to amend this Policy at any time – taking into account the requirements of Ukrainian and European legislation – and to inform clients through the official website. Continued use of the services after the publication of changes shall be deemed acceptance of the new version of the Policy.

Internet and Data Transmission

  • Traffic Legitimacy – only legitimate data exchange is allowed. Any interference with network operations (port scanning, hacking, vulnerability analysis, etc.) is prohibited.

  • Network Security – DDoS attacks or any other actions that disrupt network operation are strictly forbidden. Intentional overloading or blocking of resources (denial of service) is prohibited. Unauthorized interference with computer systems is considered a criminal offense (Articles 361–363 of the Criminal Code of Ukraine).

  • Information Protection – distributing viruses, trojans, or other malicious software, as well as information about their creation or attack methods, is not allowed. Any attempts to deliver malicious software will be stopped and may result in service suspension.

  • Intellectual Property – using the network for illegal distribution of pirated software, movies, music, or other copyrighted works is prohibited. Upon receiving a lawful notice of copyright infringement, the company is obliged to block the relevant content and suspend service to the violator.

  • Privacy – automated collection or distribution of third-party personal data (mailing lists, contact databases without consent) is prohibited. Using subscriber information (phone numbers, e-mail) for unauthorized advertising or phishing is not allowed.

Hosting and VPS

  • Content of resources – it is prohibited to host illegal content on servers, including child pornography, extremist materials, infected tags, etc. In particular, according to European regulations, the distribution of child pornography or any other illegal content is strictly forbidden.

  • Malicious software – clients are prohibited from using hosting/VPS to distribute viruses, botnets, malicious scripts, or hacker tools. Any services intended for DDoS/DOS attacks, pinging bots, or mass mailings are not allowed, and any detected violations will result in immediate suspension of service.

  • Resources and load – intentional overloading of servers (e.g., mining or excessive traffic beyond the contract) that disrupts normal operation for other users is prohibited.

  • Content management – the Operator may inspect content in case of complaints or suspicious activity. If violations are found (copyright infringement, fraud, etc.), the provider may suspend or terminate the offender's service until the situation is clarified.

Telephony

  • Advertising calls and SMS – telephony is allowed only with the subscriber's consent. The new “Law on Electronic Communications” defines spam as mass messaging without the recipient's consent – more than 5 messages are considered illegal. According to the legislation, the Operator does not send advertising calls or SMS without explicit subscriber consent. Companies planning telemarketing must sign an agreement with the Operator and use only approved numbers. Subscribers can file a complaint about a spam call, after which the Operator blocks the spammer's number.

  • Honest information – marketing or survey calls must start with a clear introduction of the company and the purpose of the call. Number spoofing or mass automated calling without consent is prohibited.

  • Telephony confidentiality – recording phone conversations or transferring personal subscriber data to third parties without justified grounds is prohibited. Exceptions include requests from law enforcement or government agencies within their powers and with a court decision when required by law.

Prohibited Activities

  • Spam and Unsolicited Advertising – sending unsolicited promotional messages (via email, SMS, VoIP) without the recipient's prior consent is strictly prohibited.

  • DDoS Attacks and Hacks – organizing or facilitating cyberattacks (DDoS/DOS, server and network breaches) is prohibited and punishable by law.

  • Malware – distributing viruses, trojans, spyware, or information about their creation is prohibited.

  • Copyright Infringement – using or providing unauthorized software, movies, music, books, or other copyrighted content for download is prohibited.

  • Privacy Violations – unauthorized collection or disclosure of personal data of other users is prohibited.

  • Obscene or Illegal Content – posting or transmitting materials containing child pornography or other content prohibited by law (extremist texts, violent imagery, etc.) is strictly prohibited.

  • Non-Certified Equipment – connecting non-certified devices to the network or using illegal equipment (without CE marking) is prohibited.

  • Other Illegal Activities – conducting fraudulent schemes, financial pyramids, telecom or internet scams, and any other illegal activities are prohibited (data theft, phishing, attacks on bank cards, etc.).

Monitoring and Response

The Company reserves the right to monitor the use of its services and networks to prevent violations. In case of detection or notification of a violation (“Abuse”), the provider may block the relevant accounts or connections, remove illegal content, and temporarily or permanently suspend service to the violator. If necessary, the Operator cooperates with government authorities and law enforcement agencies, providing them with information about the violator in accordance with legal requirements.

Policy Changes

This Policy may be amended or supplemented in accordance with changes in the legislation of Ukraine and the EU. Any updates will be announced on the provider's official website.

© 2025 MIIT LLC All rights reserved.