Request a Tailored Infrastructure Solution

Talk to Us Directly
Phone:
contact form

Request a Tailored Infrastructure Solution

Talk to Us Directly
Phone:
Please use a corporate email address
Interested in specific services?
Submit
Submit
When you submit the completed form, you agree to the use of your data in accordance with Dynascale Terms of Use and Privacy Policy.
Thanks for reaching out,
Name!
We’ve received your request and will contact you shortly at to discuss your infrastructure needs.
Done
Oops! Something went wrong while submitting the form.

Acceptable Use Policy

Last updated: July 16, 2025

These rules and regulations (“Rules”) are incorporated by reference in Customer’s Agreement. Customer’s Service Orders may be suspended or terminated for violation of these Rules in accordance with the Agreement.

1. Abuse

Customer may not use Company’s network to engage in, foster, or promote illegal, abusive, or irresponsible behavior, including:  

  1. Unauthorized access to or use of data, systems, or networks, including any attempt to probe, scan, or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the system or network owner;  
  1. Monitoring data or traffic on any network or system without express authorization of the system or network owner;
  1. Interference with service to any user of the Company’s or other network, including without limitation mail bombing, flooding, deliberate attempts to overload a system, and broadcast attacks;
  1. Use of an Internet account or computer without the owner’s authorization;
  1. Collecting or using email addresses, screen names, or other identifiers without consent of the person identified, including without limitation phishing, Internet scamming, password robbery, spidering, and harvesting;
  1. Collecting or using information without the consent of the information owner;  
  1. Use of any false, misleading, or deceptive TCP-IP packet header information in an email or newsgroup posting;
  1. Use of a Service to distribute software that covertly gathers information about a user or covertly transmits information about a user;
  1. Use of a Service for distribution of advertisement delivery software unless: (i) the user affirmatively consents to the download and installation of such software based on a clear and conspicuous notice of the nature of the software, and (ii) the software is easily removable by use of standard tools for such purpose included on major operating systems (such as Microsoft's “ad/remove” tool); or  
  1. Any conduct that can result in retaliation against the Company network or website, or Company’s employees, officers, or agents, including without limitation engaging in behavior that results in a server being the target of a denial of service attack (DoS).

2. Security

Customer must take reasonable security precautions in light of Customer’s use of Company’s Services. Customer must protect the confidentiality of its password(s), and should change its password(s) periodically. A compromised server can disrupt Company’s network and other customers. Company may take Customer’s server offline if it is accessed or manipulated by a third party without Customer’s consent.

3. Bulk or Commercial E-Mail

Customer must comply with the CAN-SPAM Act of 2003 and other laws and regulations applicable to bulk or commercial e-mails. In addition, Customer must obtain Company’s prior written consent before sending any bulk e-mail. Company will not provide consent unless Customer demonstrates all of the following to the Company’s reasonable satisfaction:

  1. Customer’s intended recipients have given their consent to receive e-mail via some affirmative means, such as an opt-in procedure;
  1. Customer’s procedures for soliciting consent include reasonable means to ensure that the person giving consent is the owner of the e-mail address for which the consent is given;
  1. Customer retains evidence of the recipient’s consent in a form that may be promptly produced on request, and Customer honors recipient’s or Company’s request to produce consent evidence within one (1) week of receipt of the request;
  1. Customer maintains procedures that provide recipients with a method to revoke their consent — such as a link in the body of an e-mail, or instructions to reply with the word “Remove” in the subject line; Customer must honor revocations of consent within 48 hours; and Customer must notify recipients that Customer will implement such revocation within 48 hours;
  1. Customer must post an e-mail address for complaints in a conspicuous place on any associated website; Customer must register that address at abuse.net, and must promptly respond to messages sent to that address;  
  1. Customer must have a privacy policy posted for each domain associated with the mailing;  
  1. Customer must have the ability to track anonymous complaints;  
  1. Customer may not obscure the source of its e-mail in any manner; and
  1. Customer’s e-mail must include the recipient’s e-mail address in the body of the message or in the “To:” line.

These policies apply to messages sent using Customer’s Service, or to messages sent from any network by Customer or any person on its behalf that directly or indirectly refer the recipient to a website, or an e-mail address hosted via Customer’s Service. In addition, Customer may not use a third-party e-mail service that does not practice similar procedures. These requirements apply to distribution lists prepared by third parties to the same extent as if the list were created by Customer.

Company may test and otherwise monitor Customer’s compliance with its requirements and may block the transmission of e-mails that violate these provisions.

4. Vulnerability Testing

Customer may not attempt to probe, scan, penetrate, or test the vulnerability of a Company system or network or to breach Company’s security or authentication measures, whether by passive or intrusive techniques, without Company’s express written consent.

5. Newsgroup, Chat Forums, Other Networks

Customer must comply with the rules and conventions for postings to any bulletin board, chat group, or other forum in which it participates, such as IRC and USENET groups, including their rules for content and commercial postings. These groups usually prohibit the posting of off-topic commercial messages, or mass postings to multiple forums. Customer must comply with the rules of any other network it accesses or participates in using Company Services.

6. Offensive Content

Customer may not publish or transmit via Company’s network or equipment any content or links to any content that Company reasonably believes:

  1. Constitutes, fosters, or promotes child abuse;
  1. Is excessively violent, incites or threatens violence, or contains harassing content or hate speech;
  1. Is unfair or deceptive under any consumer protection laws, including chain letters or pyramid schemes;
  1. Is defamatory or violates a person’s privacy;
  1. Creates a risk to a person’s or the public’s safety or health, compromises national security, or interferes with an investigation by law enforcement;  
  1. Improperly exposes trade secrets or other confidential or proprietary information of another person;
  1. Is intended to assist others in defeating copyright protections;
  1. Infringes on another person’s copyright, trade or service mark, patent, or other intellectual property right;
  1. Promotes illegal drugs, violates export control laws, relates to illegal gambling, or illegal arms trafficking;
  1. Is otherwise illegal or solicits conduct that is illegal under laws applicable to Customer or to Company; or
  1. is otherwise malicious, fraudulent, or may result in retaliation against Company by offended viewers.

Content “published or transmitted” via Company’s network or equipment includes Web content, e-mail, bulletin board postings, chat, and any other type of posting or transmission that relies on the Internet.

7. Copyrighted Material

Customer may not use Company’s network or equipment to download, publish, distribute, or otherwise copy in any manner any text, music, software, art, image, or other work protected by copyright law unless:

  1. Customer has been expressly authorized by the owner of the copyright for the work to copy the work in that manner; or
  1. Customer is otherwise permitted by established United States copyright law to copy the work in that manner.

Company may terminate the Services of copyright infringers.

8. Cooperation with Investigations and Legal Proceedings

Company may, without notice to Customer:

  1. Report to the appropriate authorities any conduct by Customer that Company believes violates applicable criminal laws; or
  1. Provide any information it has about Customer in response to a formal or informal request from a law enforcement or government agency, or in a civil action that in Company’s judgment meets the requirements for such a request.

9. Miscellaneous

  1. Customer must have valid and current information on file with its domain name registrar for any domain hosted on the Company network;  
  1. Customer may only use IP addresses assigned to it by Company staff in connection with Company services.  
  1. Company may take reasonable action to protect its IP addresses, including suspension or termination of Customer’s Services;
  1. Customer shall not engage in activities that result in IP address blocking, filtering, or other such actions by outside third parties that negatively impact Company or its other customers; and
  1. If Customer is found by Company to be in violation of any part of this Section 9, Company has immediate right to terminate Services to Customer or this Agreement.

10. Consequences of Violation of Rules

Company may without notice to Customer, suspend its Services, or remove any content transmitted via the Company’s system or network if Company discovers facts that lead it to reasonably believe Customer is using a Service in violation of these Rules. Customer must cooperate with Company’s reasonable investigation of any suspected violation of the Rules. Company will use best efforts to contact Customer prior to suspension of network access to its servers, however, prior notification by Company to Customer is not required. Customer is strictly liable for any violation of the Rules, including violations by its customers or those that occur because of Customer or its customers’ unauthorized use of the Services.

11. Disclaimer

Company is under no duty, and does not by these Rules undertake a duty, to monitor or police its customers’ activities and disclaims any responsibility for any misuse of the Company system or network. Company disclaims any obligation to any person who has not entered into an agreement with Company for Services.

Get in touch

_ Get a tailored estimate based on your unique infrastructure needs. Understand your costs
and scale with confidence.

Transform your business