Acceptable Use Policy

Effective Date: February 14, 2026

At MinRTT, our mission is simple: deliver rock-solid, low-latency infrastructure so you can focus on building and running your projects without interruptions. This Acceptable Use Policy exists to keep our network reliable for everyone—including you. We trust you to run legitimate workloads, and we only get involved when something truly risks the service for others. By using our services, you agree to follow these straightforward guidelines.

This Acceptable Use Policy ("AUP") governs the use of all services provided by MinRTT Inc ("we," "us," or "our"). It outlines the guidelines we all follow to maintain that reliability.

1. General Principle

You may use our services for any lawful purpose permitted under United States federal law and the laws of the State of Texas, subject to the restrictions below. We do not police legal content.

2. Prohibited Activities

The following activities are prohibited on our network:

2.1 Illegal Activities

  • Any activity that violates United States federal law or Texas state law
  • Child sexual abuse material (CSAM) or exploitation of minors in any form
  • Credible threats of violence or terrorism
  • Distribution of controlled substances in violation of applicable law
  • Fraud, identity theft, or financial crimes

2.2 Network Abuse

  • Distributed denial-of-service (DDoS) attacks or participation in botnets
  • Port scanning, vulnerability probing, or unauthorized access attempts against systems you do not own or have permission to test
  • Distribution of malware, viruses, or ransomware
  • IP address spoofing or forging packet headers
  • Interfering with the operation of our network or other customers' services

2.3 Email and Messaging Abuse

  • Sending unsolicited bulk email (spam)
  • Operating email services on behalf of third parties (e.g., email service providers, newsletter platforms for other businesses, bulk mailing services)
  • Phishing, spoofing, or impersonating others in electronic communications
  • Harvesting email addresses or other contact information without consent

Permitted email use: You may send transactional emails and newsletters to your own customers for businesses or applications you operate on our servers. For example, if you host an e-commerce store with us, you may send order confirmations and your store's newsletter to customers who have opted in. What you may not do is operate a service that sends email on behalf of other businesses or third parties.

2.4 Intellectual Property

  • Hosting content that infringes on copyrights, trademarks, or other intellectual property rights when you have received valid legal notice

We respond to valid DMCA takedown notices in accordance with 17 U.S.C. 512. We will notify you of any takedown requests and provide an opportunity to file a counter-notice where appropriate.

3. Resource Usage

Bandwidth: Each server includes a monthly bandwidth allocation as shown on your order. Usage is measured as the greater of inbound or outbound transfer, whichever is higher. If you exceed your allocation, overage charges apply at $10 per TB or partial TB. To upgrade to unmetered bandwidth or a higher allocation, please contact sales via ticket.

Network Conduct: Regardless of your bandwidth plan, the following activities may require remediation as they degrade service for other customers:

  • Generating excessive broadcast traffic or ARP floods
  • Running open resolvers, open proxies, or other services commonly exploited for amplification attacks

4. Network Protection and DDoS Mitigation

Paid DDoS Protection (Optional Add-On): We offer optional DDoS protection services as a paid add-on, featuring industry-leading enterprise-grade protection through solutions such as Cloudflare Magic Transit and other third-party scrubbing centers with terabits per second of mitigation capacity and dedicated DDoS-protected IP ranges. Servers with paid DDoS protection receive guaranteed uptime during attacks—your traffic is scrubbed and legitimate traffic continues to flow without interruption or null routing. To add DDoS protection to your server, please contact our sales team via sales ticket.

Servers Without Paid DDoS Protection: DDoS protection is not included with standard service. If you do not have paid DDoS protection and your server is targeted by an attack, the following policies apply:

Basic Filtering (Courtesy): We will automatically engage basic filtering for attacks under 100 Gbps. This filtering is extremely rudimentary—limited to dropping common reflective attack patterns—and is not comparable in any way to our paid DDoS protection services. Basic filtering is provided at no charge as a courtesy, on a best-effort basis, and should not be relied upon. We make no guarantee of effectiveness, uptime, or performance. The sole purpose is to protect other customers on our network, not to protect the targeted server. This courtesy filtering may be discontinued at any time without notice.

Null Routing: If basic filtering is insufficient to protect network stability, or if the attack exceeds 100 Gbps, the affected IP address will be null routed (blackholed). When null routing occurs, all traffic to that IP—including legitimate traffic—is dropped. This protects our network and other customers from attack congestion. Other IP addresses on your server will continue to function normally.

Null route durations follow a graduated model based on attack frequency:

  • First null route: 5 minutes
  • Second null route: 10 minutes
  • Third null route: 15 minutes
  • Subsequent null routes: Duration increases by 5 minutes each, up to a maximum of 30 minutes

Attack counters reset on a rolling 24-hour basis from each null route event. You will be notified via email and control panel when your IP is null routed, including the reason and expected duration.

Null routing is a protective measure for network stability, not a punitive action. If you require guaranteed uptime during attacks, please consider purchasing our paid DDoS protection service.

5. Security

You are responsible for securing your servers and applications. This includes:

  • Keeping software and operating systems updated
  • Using strong authentication and access controls
  • Responding promptly to security incidents or abuse reports

If your server is compromised and used to attack others or send spam, we may suspend service until the issue is resolved.

6. Abuse Reports and Complaints

We take abuse reports seriously. If we receive a complaint about your server:

  • We will forward the complaint to you for resolution
  • Minor issues: You will have reasonable time (typically 24-48 hours) to respond and remediate
  • Severe issues (ongoing attacks, CSAM, credible threats): We will contact you for immediate action and suspend service if we are unable to reach you

Repeated violations or failure to respond to abuse reports may result in service termination.

7. Legal Requests and Law Enforcement

We comply with valid legal process, including subpoenas, court orders, and lawful requests from law enforcement. Where legally permitted, we will notify you of such requests. We do not voluntarily provide customer data to third parties without legal process or your consent.

8. Enforcement

Violations of this AUP may result in:

  • Warning and request for remediation
  • Temporary suspension of service
  • Permanent termination of service
  • Reporting to law enforcement where required or appropriate

The action taken depends on the severity of the violation, your history, and your responsiveness to resolving issues.

9. Changes to This Policy

We may update this AUP from time to time. Material changes will be communicated via email or notice in your control panel. Continued use of our services after changes take effect constitutes acceptance of the updated policy.

10. Reporting Abuse

To report abuse originating from our network, please contact abuse@minrtt.com with relevant details including IP addresses, timestamps, and logs.


Questions about this policy? Submit a support ticket.