Abuse Policy

  • Monday, 23rd February, 2026
  • 11:29am

Abuse Policy

Last Updated: February 5, 2026

At PDTHosting, we maintain a zero-tolerance policy toward abuse to protect our infrastructure, clients, and network reputation.

By using our services, you agree to comply with this Abuse Policy and our Terms of Service.


Prohibited Activities

The following activities are strictly prohibited:

Email Abuse

  • Sending spam or unsolicited bulk email

  • Purchased or scraped mailing lists

  • Phishing emails

  • Email bombing

  • Exceeding allowed email sending limits

⚠ Shared hosting accounts are limited to system-defined hourly email limits. Abuse will result in suspension.


Malware & Hacking

  • Hosting malware, trojans, ransomware

  • Phishing pages

  • Credential harvesting

  • Brute-force tools

  • Exploit scripts

Immediate suspension applies.


Illegal Content

  • Copyright infringement

  • Pirated software

  • Fraudulent websites

  • Scams or impersonation

  • Child exploitation material

Such content results in permanent termination and possible legal reporting.


Resource Abuse

  • Excessive CPU or RAM usage

  • Mining cryptocurrency on shared hosting

  • Running unauthorized background processes

  • Distributed attacks (DDoS participation)

Accounts may be limited, suspended, or terminated.


Network Abuse

  • Port scanning

  • IP reputation damage

  • Hosting open proxies

  • Botnet activity

Strictly prohibited.


Reporting Abuse

If you wish to report abuse, contact:

Email: abuse@pdthosting.com

Please include:

  • Domain name

  • IP address (if available)

  • Detailed description

  • Evidence or screenshots


Enforcement Actions

Depending on severity, we may:

  • Issue warning notice

  • Temporarily suspend service

  • Permanently terminate account

  • Remove content without notice

  • Report to authorities (if required)

No refunds are issued for terminated accounts due to abuse violations.


⚠ Important Notice

Account holders are responsible for:

  • Securing their scripts and CMS

  • Using strong passwords

  • Updating applications regularly

  • Monitoring their email usage

Compromised accounts sending spam will still be treated as abuse.


Zero-Tolerance Commitment

To protect all clients and maintain network stability, we enforce this policy strictly.

 

« Back