Last reviewed & updated: September 16, 2021

EXA Infrastructure’s goal is to provide its clients with the best commercial service possible. To accomplish this, EXA Infrastructure has adopted this Acceptable Use Policy (“Policy”).  This Policy outlines the principles that EXA Infrastructure has adopted to govern how EXA Infrastructure’s services are used.  All EXA Infrastructure clients and all others who use EXA Infrastructure’s services ( a “Client”) must comply with this Policy. 

Clients who provide use of the EXA Infrastructure services to end users are responsible for such end users’ use of EXA Infrastructure’s services, compliance with the terms of this Policy and any breach of the Policy by such end users and must take steps to ensure compliance by their end users.  By using or accessing EXA Infrastructure’s services, Client agrees to be bound by the terms of the Policy.  If Client does not agree to comply with this Policy, it must immediately stop all use of EXA Infrastructure’s services and notify EXA Infrastructure in writing, so that it can close the Client’s account.

EXA Infrastructure reserves the right to modify, the Policy at any time, effective upon posting at Clients are responsible for monitoring this website for changes.  Use of EXA Infrastructure’s services after changes to the Policy are posted on the website shall be deemed to constitute Client’s acceptance of such new or additional terms of the Policy. 

1. Illegal Use

The EXA Infrastructure network may be used only for lawful purposes. Transmission, distribution or storage of any materials in violation of any applicable law or regulation is prohibited. This includes, without limitation:

  1. material protected by copyright, trademark, trade secret, software piracy, patents or other intellectual property right without proper authorization.
  2. engaging in activity that violates privacy, publicity or other personal rights of others.
  3. material that is obscene, abusive, defamatory, harassing, or threatening language constituting an illegal threat or violates export control laws.
  4. exploitation of vulnerabilities in hardware or software for malicious purposes such as exploitation of scripts presented on web pages (i.e., forms for answering questions or entering data).

2. System and Network Security

Violations of system or network security are prohibited, and may result in criminal and civil liability.  EXA Infrastructure will investigate incidents involving such violations and may involve and will cooperate with law enforcement, if a criminal violation is suspected.

Examples of system or network violations include, without limitation, the following:

  1. unauthorized access to or use of computers, data, systems, accounts or networks, including any attempt to probe, scan, or test the vulnerability of a system or network or an attempt to penetrate security measures of another individual’s system (known as ‘hacking’) is prohibited.
  2. unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network.
  3. interference with service to any user, host or network including, without limitation, mail-bombing, flood, deliberate attempts to overload a system and broadcast attacks.
  4. forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting or otherwise engaging in any monitoring or interception of data not intended for the Client without authorization is prohibited.
  5. engaging in or permitting any network or hosting activity that results in the blacklisting or other blockage of EXA Infrastructure IP space is prohibited.
  6. attempting to circumvent Client authentication or security of any hosts, network, or account (“cracking”) without authorization.
  7. simulating communications (“phishing”) from and/or to a website or other service of another entity in order to collect identity information, authentication credentials, or other information from the legitimate users of that entity’s service.
  8. exporting encryption software over the internet or otherwise in violation of ITAR, to points outside the United States.
  9. using malware, DNS cache poisoning or other means (“pharming”) to redirect a user to a website or other service that simulates a service offered by a legitimate entity in order to collect identity information, authentication credentials, or other information from the legitimate users of that entity’s service.
  10. activities that disrupt the use of or interfere with the ability of others to effectively use the EXA Infrastructure network, system, service, or equipment by utilizing programs, scripts, or commands to abuse a website (i.e., DDOS, SYN Floods or similar attacks).

3. Email

Sending unsolicited mail messages is prohibited including, without limitation, sending unsolicited bulk and/or commercial messages over the internet (“spamming”).  This includes receiving replies from unsolicited emails (i.e., “drop-box” accounts) or configuring any email server in such a way that it will accept third party emails for forwarding (i.e. open mail relay).  Bulk email may only be sent to recipients who have expressly requested receipt of such email messages through a “verified opt-in” process.  Clients that send bulk email messages must maintain complete and accurate records of all email subscription requested, specifically including the email and associated headers sent by every subscriber, and shall immediately provide EXA Infrastructure with such records upon request.  If a site has roaming users who wish to use a common mail server, the mail server must be configured to require user identification and authorization. 

The EXA Infrastructure services must not be used to:

  1. send messages to any individual or entity who has indicated that they do not wish to receive a message from the Client.
  2. collect or redirect responses from unsolicited messages sent from accounts on another internet hosts or messaging services which violates this policy, or the equivalent policy or any other policy of any other internet service provider or website. Moreover, unsolicited messages sent from accounts on other internet hosts or messaging services may not direct the recipient to any website or other resource that uses EXA Infrastructure’s network.
  3. purchase lists of email addresses from third parties for mailing to or from any EXA Infrastructure hosted domain, or referencing EXA Infrastructure account.
  4. distribute viruses, worms, trojan horses, flooding, mail bombing, or denial of service attacks or distributing information regarding the creation of such viruses, worms, etc. for reasons other than mitigation or.
  5. activities that disrupt the use of or interfere with the ability of others to effectively use the network or any connected network, system, service or equipment is prohibited.
  6. transmitting, distributing or storing information or material, that, as reasonably determined by EXA Infrastructure, is threatening, abusive, violates the privacy of others or which violates any applicable law or regulation, that is harmful to or interferes with EXA Infrastructure’s provision of its services, the EXA Infrastructure network or any third party’s network, equipment, applications, services or websites, that is fraudulent or contains false, deceptive or misleading statements, claims or representations (i.e., phishing), and deceptive marketing practices including, without limitation, practices that violate United States Federal Trade Commission’s guidelines for proper online marketing schemes.

4. Sending High Volume of Traffic to Autonomous System

If the traffic to and from a particular ASN exceeds 10% of Client’s monthly Committed Data Rate (CDR) then EXA makes no guarantee of performance towards packet loss and/or latency to and from that ASN.

The above is also applicable to "Transit" Autonomous systems which are used to reach the end user destinations

5. Obscene Speech or Material

Transmission, distribution or storage of any material in violation of any applicable law or regulation is prohibited.  Using EXA Infrastructure’s network to advertise, transmit, store, post, display or otherwise make available child pornography or obscene speech or materials is prohibited. EXA Infrastructure does not prohibit any material allowed by law.  EXA Infrastructure is required by law to notify law enforcement agencies when it becomes aware of the presence of child pornography on or being transmitted through EXA’s network.

6. Risk of the Internet

Some activities that Clients can perform when accessing the internet may be harmful or cause loss to Client, other people that may access Client’s services or equipment including, without limitation:

  1. downloading content (including receiving emails) from the internet which may introduce viruses or other harmful features to the Client’s computer;
  2. purchase goods or services using the internet;
  3. transmitting confidential information over the internet (such as credit card numbers or other business information); or
  4. accessing and viewing content on the internet or otherwise available through the service that may be offensive to some individuals, or inappropriate for children.

Client shall bear all risk associated with the activities referred to in this Section 6 and EXA Infrastructure does not have any liability for any claims, losses, actions, damages, suites or proceeding arising out of or otherwise relating to such activities.

Client may minimise the risk of accessing illegal or offensive content as well as managing use of the internet by using a filtering solution. EXA Infrastructure does not provide these filtering solutions as part of its services and it is the Client’s responsibility to implement these measures.

7. Additional Terms and Conditions

The use of the EXA Infrastructure network by a Client is subject to the terms and conditions of any agreements entered into by such Client with EXA Infrastructure.  This Policy is incorporated into such agreements by reference.

8. Complaints/Violations of this Policy

Any complaints regarding prohibited use of or other abuse of the EXA Infrastructure network systems, applications or information, including violations of this Policy, should be sent to Please include all applicable information that will assist EXA Infrastructure in investigating the compliant.