Legal

Acceptable Use Policy

Last updated: February 26, 2026

Legal Entity: New Horizon Code PTY LTD (ABN: 61 634 659 804) trading as Vexion

Jurisdiction: Queensland, Australia

1. Purpose

This Acceptable Use Policy ("AUP") governs the use of all services, infrastructure, systems, networks, and related services ("Services") provided by Vexion.

This AUP exists to protect:

  • Infrastructure integrity;
  • Service availability;
  • Customer security;
  • Legal compliance;
  • Third-party systems;
  • Vexion’s operational stability.

This AUP forms a legally binding agreement between you ("Customer", "User", "you", or "your") and Vexion.

Violations of this AUP constitute a material breach of the Terms of Service.

2. Scope

This AUP applies to all use of Vexion Services, including but not limited to:

  • Game server hosting;
  • Virtual servers;
  • Network services;
  • Storage services;
  • Control panel access;
  • API access;
  • Any infrastructure operated by or on behalf of Vexion.

You are responsible for all activity conducted under your account, whether authorized or unauthorized.

3. General Prohibition

You may not use the Services to engage in, promote, facilitate, or support any activity that:

  • Violates any applicable law or regulation;
  • Violates the rights of others;
  • Threatens infrastructure integrity;
  • Disrupts service availability;
  • Creates legal exposure for Vexion.

4. Illegal Activity

You may not use the Services for any unlawful purpose, including but not limited to:

  • Hosting or distributing illegal content;
  • Facilitating criminal activity;
  • Violating intellectual property laws;
  • Operating services in violation of applicable regulations;
  • Circumventing legal restrictions.

5. Infrastructure Abuse

You may not use the Services in a manner that interferes with, disrupts, or degrades infrastructure performance or stability.

Prohibited activities include, but are not limited to:

  • Excessive CPU utilization designed to degrade performance;
  • Excessive memory utilization designed to degrade performance;
  • Excessive network utilization designed to degrade performance;
  • Resource exhaustion attacks;
  • Circumventing imposed resource limitations;
  • Attempting to destabilize infrastructure.

Vexion reserves sole discretion in determining abusive usage.

6. Network Abuse and Attack Activity

You may not use the Services to engage in or facilitate:

  • Denial-of-Service (DoS) attacks;
  • Distributed Denial-of-Service (DDoS) attacks;
  • Amplification attacks;
  • Network flooding;
  • Packet injection attacks;
  • Attack infrastructure hosting.

7. Malware and Malicious Software

You may not host, distribute, operate, or facilitate:

  • Malware;
  • Viruses;
  • Trojans;
  • Worms;
  • Ransomware;
  • Botnets;
  • Command-and-control infrastructure;
  • Exploit frameworks intended for malicious use.

8. Unauthorized Access and Intrusion

You may not attempt to gain unauthorized access to:

  • Infrastructure;
  • Systems;
  • Networks;
  • Accounts;
  • Data;
  • Services.

This includes:

  • Exploitation attempts;
  • Credential harvesting;
  • Privilege escalation attempts;
  • Unauthorized vulnerability scanning;
  • Security bypass attempts.

9. Fraud and Deception

You may not use the Services to engage in fraudulent or deceptive activity, including:

  • Payment fraud;
  • Identity fraud;
  • Phishing;
  • Impersonation;
  • Social engineering attacks.

10. Intellectual Property Violations

You may not use the Services to violate intellectual property rights, including:

  • Copyright infringement;
  • Unauthorized distribution of protected material;
  • Software piracy;
  • Hosting infringing content.

11. Proxy, Relay, and Anonymization Abuse

You may not operate services designed to facilitate abuse, including:

  • Open proxies used for abuse;
  • Anonymous relay systems used for abuse;
  • Botnet proxy infrastructure;
  • Abuse concealment infrastructure.

12. Cryptocurrency Mining

Cryptocurrency mining is prohibited unless explicitly authorized in writing by Vexion.

Unauthorized mining constitutes infrastructure abuse.

13. Security Violations

You may not:

  • Circumvent security controls;
  • Disable security mechanisms;
  • Exploit vulnerabilities;
  • Interfere with security monitoring.

14. Impact on Other Customers

You may not use the Services in a manner that negatively impacts other customers, including:

  • Resource exhaustion;
  • Network congestion;
  • Infrastructure degradation;
  • Service disruption.

15. Monitoring and Investigation

Vexion reserves the right, but not the obligation, to:

  • Monitor infrastructure usage;
  • Investigate suspected violations;
  • Review logs and activity;
  • Cooperate with law enforcement;
  • Take enforcement action.

16. Enforcement and Remedies

Vexion may take enforcement action at its sole discretion, including but not limited to:

  • Immediate suspension;
  • Immediate termination;
  • Content removal;
  • Access restriction;
  • Infrastructure isolation.

Enforcement may occur without notice.

17. Cost Recovery

You agree to reimburse Vexion for all costs resulting from violations, including:

  • Investigation costs;
  • Infrastructure repair costs;
  • Incident response costs;
  • Legal costs;
  • Administrative costs.

18. No Obligation to Monitor

Vexion has no obligation to monitor customer activity but reserves the right to do so.

19. Reporting Violations

Suspected violations may be reported to:

abuse@vexion.io

20. Amendments

Vexion may modify this AUP at any time.

Changes become effective upon publication.

Continued use of Services constitutes acceptance.

21. Survival

This AUP survives termination of Services.

22. Governing Law

This AUP is governed by the laws of Queensland, Australia.

You submit to the exclusive jurisdiction of the courts of Queensland, Australia.

23. Contact Information

New Horizon Code PTY LTD (ABN: 61 634 659 804) trading as Vexion

Suite 121 Level 14, 167 Eagle St
Brisbane QLD 4000
Australia

Legal: legal@vexion.io

Abuse: abuse@vexion.io