Last Updated: February 18, 2026
This Acceptable Use Policy (“Policy”) outlines the permitted and prohibited uses of the services provided by Picnic IT (“Services”). To ensure a safe, reliable, and secure environment for all our clients, compliance with this Policy is mandatory.
1. General Compliance
All clients and users must use Picnic IT Services in compliance with all applicable local, state, national, and international laws and regulations.
2. Prohibited Activities
You agree not to use, or allow others to use, the Services for any of the following:
- Illegal Activities: Engaging in, promoting, or facilitating illegal acts, including but not limited to fraud, child pornography, human trafficking, or the sale of illegal substances.
- Distribution of Malware: Uploading, hosting, or transmitting viruses, worms, Trojan horses, ransomware, or any other malicious code designed to disrupt or damage software or hardware.
- Spam and Unsolicited Communications: Sending unsolicited bulk email (SPAM), “mail bombs,” or any form of unauthorized commercial communication that violates the CAN-SPAM Act or similar global regulations.
- Intellectual Property Infringement: Hosting or distributing content that infringes upon the copyrights, trademarks, patents, or trade secrets of others.
3. System and Network Security
Security is a team sport. You are prohibited from violating or attempting to violate the security of Picnic IT’s infrastructure, including:
- Unauthorized Access: Accessing data or logging into a server/account that you are not authorized to access.
- Vulnerability Testing: Probing, scanning, or testing the vulnerability of our systems or networks without express written authorization (e.g., “Pentesting”).
- Denial of Service (DoS): Engaging in activities that interfere with or disrupt the performance of our infrastructure or the services of other clients (e.g., flooding or deliberate overloading).
4. Resource Usage & Performance
To maintain high performance for everyone, users must not consume excessive system resources (CPU, memory, or bandwidth) in a manner that negatively impacts the stability of our shared environment. We reserve the right to throttle or suspend accounts that exhibit “noisy neighbor” behavior.
5. Content Standards
Users may not host or transmit content that is:
- Defamatory, obscene, or harassing.
- Inciting violence or promoting hate speech against protected groups.
- A violation of the privacy or publicity rights of any individual.
6. Monitoring and Enforcement
While Picnic IT does not routinely monitor user content, we reserve the right to investigate potential violations of this Policy.
- Suspension/Termination: We may suspend or terminate your access to the Services immediately and without notice if we determine, in our sole discretion, that you have violated this AUP.
- Reporting: We may report any activities that suspect a violation of the law to the appropriate authorities.
7. Reporting Violations
If you become aware of any violation of this Policy, please report it immediately to: abuse@picnic-it.com
