Acceptable Use Policy (AUP)
Effective date: February 5, 2026
Introduction
This Acceptable Use Policy (“AUP”) governs your use of MatrixDomainHosting.ca services (“Services”). It is incorporated by reference into our Terms of Service. By using the Services, you agree to comply with this AUP.
Shared environments note: Many Services operate on shared infrastructure. Activity that degrades performance, threatens security, or disrupts other customers is not permitted.
1) Definitions
-
“MatrixDomainHosting”, “we”, “us”: MatrixDomainHosting.ca by NAISSCO and its operators.
-
NAISSCO: North America Integrated Systems Solutions Corp
-
“You”, “Customer”: the individual or entity using the Services.
-
“Content”: any data, files, code, email, website material, or other information hosted, transmitted, or processed using the Services.
-
“Reseller”: a Customer who provides Services (directly or indirectly) to third parties.
2) Lawful use
-
You may use the Services only for lawful purposes. You are responsible for complying with all applicable laws and regulations, including (where applicable) Canadian privacy requirements and anti-spam rules (e.g., CASL), and any registry/registrar rules for domain names.
We may cooperate with lawful requests from courts, law enforcement, or regulators where required.
3) Prohibited content
-
You may not host, store, distribute, or link to Content that:
-
is illegal, fraudulent, or used to facilitate illegal activity;
-
exploits or endangers minors (including any child sexual abuse material — immediate suspension/termination and reporting);
-
contains malware, malicious code, or instructions intended to enable wrongdoing;
-
is primarily intended for phishing, identity theft, scams, or deception;
-
infringes intellectual property rights (copyright, trademark, trade secrets) without authorization;
-
includes non-consensual intimate imagery or doxxing, or unlawfully discloses sensitive personal information;
-
is excessively obscene where unlawful, or otherwise violates applicable law.
-
4) Prohibited activities (security, abuse, and network integrity)
-
You may not use the Services to:
-
gain unauthorized access to any system, network, or account (including scanning, probing, or exploiting);
-
run denial-of-service (DoS/DDoS) attacks, botnets, or traffic amplification;
-
intercept or monitor data without permission;
-
distribute viruses, worms, trojans, ransomware, or similar harmful code;
-
operate “bulletproof hosting” or otherwise conceal abusive activity;
-
use the Services as an anonymization/proxy/VPN exit, Tor relay/exit, or similar service intended to mask identity (unless explicitly permitted in writing under a specific plan);
-
operate IRC servers, mass automation “autosurf” schemes, or similar abusive services.
-
5) Email and messaging (anti-spam rules)
-
We maintain a zero-tolerance stance for spam and email abuse. You may not:
-
send unsolicited bulk email (“spam”), whether from our servers or through our network;
-
use purchased, rented, scraped, or third-party lists;
-
send marketing email without valid consent where required (including under CASL);
-
forge headers, spoof domains, or misrepresent the sender;
-
knowingly send to high-bounce or non-existent addresses, or ignore unsubscribe requests where applicable.
Operational limits: To protect deliverability and platform stability, we may enforce limits such as hourly send caps, recipient caps, connection limits, or attachment size limits (these may vary by plan and can change over time). Attempting to bypass limits by using multiple accounts/services is prohibited.
If your activity causes IP/domain reputation damage (e.g., blacklisting) or requires investigation/remediation, we may suspend sending and charge administrative costs where permitted by law.
-
6) Resource usage and fair use
-
You must not use the Services in a way that materially impacts platform performance or other customers. Prohibited examples include:
-
sustained high CPU, RAM, disk I/O, or database load outside normal website hosting patterns;
-
running compute workloads not related to serving websites (e.g., crypto mining, large-scale data processing, rendering farms);
-
public file-sharing repositories, streaming mirrors, or “download portals” primarily distributing third-party files;
-
running game servers or long-running daemons not designed for regular or shared hosting.
If your usage exceeds what’s reasonable for your plan, we may require optimization, impose limits, throttle, or require an upgrade/migration.
-
7) Storage, backups, and archiving
-
Unless a Service is explicitly sold as storage/backup, you may not use hosting space primarily as:
-
a backup vault for third-party systems;
-
a file archive unrelated to active website operation;
-
a media repository intended mainly for bulk downloads or distribution.
Backups: If we provide backups, they are a convenience and not a guarantee. You remain responsible for maintaining your own offsite backups appropriate to your risk tolerance and compliance needs.
Email storage/archiving: Excessive mailbox storage, long-term archiving, or use as a document repository may be restricted; we may require cleanup, archiving to a dedicated solution, or a plan change.
-
8) Databases, scripts, and application security
-
You are responsible for maintaining secure software:
-
Keep CMS/core/plugins/themes updated (WordPress and popular plugins are frequent targets).
-
Remove abandoned/unsupported software.
-
Do not host “nulled”/pirated software, license bypass tools, or cracks.
We may quarantine, disable, or remove Content that presents a security risk (e.g., known exploited code), and we may suspend affected Services to protect the platform.
-
9) Resellers
-
If you are a Reseller, you are responsible for:
-
ensuring your end users comply with this AUP;
-
responding promptly to abuse complaints;
-
maintaining accurate customer contact information.
We may take action against the Reseller account for violations by end users.
-
10) Reporting abuse
-
To report abuse, contact us via our support/helpdesk or by email at abuse@matrixdomainhosting.ca (recommended). Include:
-
affected domain(s), IP(s), timestamps, logs/headers, and a clear description of the issue.
-
11) Enforcement and remedies
-
We may investigate suspected violations. If we determine (in good faith) that a violation occurred, we may take actions including:
-
removing or disabling Content;
-
throttling resources or disabling specific features (e.g., outbound email);
-
requiring configuration changes;
-
suspension or termination of Services (with or without notice depending on severity);
-
reporting to appropriate authorities where required or appropriate.
Severe violations (e.g., malware distribution, phishing, child exploitation content, active compromise) may result in immediate suspension/termination.
-
12) Changes to this AUP
- We may update this AUP from time to time. Continued use of the Services after changes become effective constitutes acceptance of the updated AUP.
13) Governing law
-
This AUP is governed by the laws of Canada and the laws of the Province/Territory of Saskatchewan, excluding conflict-of-law rules.
