Fair Use Policy and Resource Limits

Knowledgebase / Fair Use Policy and Resource Limits

Fair Use Policy and Resource Limits

0 found helpful (0 votes) ...
Back to Knowledgebase

The fair use policy protects the quality and stability of services for all customers. It applies to all TPC Hosting plans.

Shared hosting limitations

Shared hosting plans run on servers with multiple customers. To ensure a fair environment for everyone:

  • Continuously running background processes are not permitted
  • Cron jobs may not run at intervals shorter than 5 minutes
  • CGI scripts are not permitted

Resource monitoring

Shared hosting plans do not have published hard limits on CPU, memory, or I/O. However, TPC Hosting monitors resource usage across all shared servers. If your usage noticeably degrades performance for other customers, we will:

  1. Contact you and request that you optimise your application or reduce consumption
  2. Temporarily throttle or suspend the account if the issue is not resolved
  3. Recommend a VPS plan better suited to your workload if needed

VPS — prohibited network activities

VPS customers must not use TPC Hosting infrastructure for any form of network abuse, including:

  • Originating or participating in DoS/DDoS attacks
  • Running open mail relays or open DNS resolvers
  • Conducting port scanning against any system without the owner's written permission
  • Generating outbound attack traffic (brute-force, exploit probing, credential stuffing)
  • Operating public proxy servers or VPN exit nodes without prior written approval from TPC Hosting

If abusive outbound traffic is detected from your VPS, TPC Hosting may null-route or suspend the server immediately to protect the network.

Prohibited activities on all plans

  • Running IRC bots, torrent trackers, or online game servers
  • Operating web scraping infrastructure or automated bot networks
  • Attempting unauthorised access to any system or network
  • Uploading malicious or virus-infected files
  • Harvesting email addresses or personal information without consent

Enforcement

Violations are handled through a graduated process: warning → suspension → termination. Severe violations (outbound attacks, phishing, malware) may result in immediate suspension without prior notice.


Was this article helpful?



Still need help?

Open a support ticket →

On This Page