Infrastructure Misuse & Abuse Policy
CONVESIO INFRASTRUCTURE MISUSE & PLATFORM ABUSE POLICY
Last Updated: March 5, 2026
Purpose
Convesio is committed to maintaining a secure, reliable, and high-performance infrastructure for all customers. This Infrastructure Misuse & Platform Abuse Policy describes prohibited activities that may threaten the integrity, availability, or security of the Convesio platform and related services.
This policy supplements Convesio’s Terms of Service, Master Services Agreement, and Acceptable Use Policy (AUP). Violations of this policy may result in investigation, service suspension, or termination as outlined in those agreements.
Scope
This policy applies to all users of Convesio services, including:
Customers
Authorized Users
Partners and agencies
Any individual or entity accessing the Convesio platform or infrastructure
Customers are responsible for all activity conducted under their accounts and for ensuring that their users comply with this policy.
Prohibited Infrastructure Misuse
Users may not use the Convesio platform in any way that interferes with, disrupts, or attempts to compromise the integrity, performance, or security of the platform or other users.
Prohibited activities include, but are not limited to:
Unauthorized Access
Attempting to gain unauthorized access to systems, networks, accounts, or data
Circumventing authentication, access controls, or security mechanisms
Attempting to probe, scan, or test system vulnerabilities without authorization
Malicious Software or Malware
Hosting, distributing, or executing malicious software, including viruses, worms, ransomware, or trojans
Operating command-and-control infrastructure for malicious activity
Using the platform to compromise other systems or networks
Network Abuse
Conducting denial-of-service (DoS) or distributed denial-of-service (DDoS) attacks
Generating traffic intended to degrade or disrupt services
Using automated tools to overload systems or infrastructure
Resource Abuse
Excessive or abusive consumption of compute, network, or storage resources that materially impacts platform stability
Operating unauthorized cryptocurrency mining or similar high-resource workloads
Using infrastructure for purposes unrelated to the intended services offered by Convesio
Fraudulent or Deceptive Activity
Hosting phishing infrastructure or fraudulent websites
Distributing spam, scams, or deceptive communications
Supporting payment fraud, card testing, or other financial abuse
Circumvention of Platform Safeguards
Attempting to bypass monitoring, rate limits, or abuse detection systems
Manipulating or interfering with platform security controls
Concealing malicious activity through obfuscation or proxy infrastructure
Monitoring and Enforcement
To protect platform integrity and customer environments, Convesio may implement monitoring, logging, and automated detection systems designed to identify misuse or abuse of the platform.
If potential violations are detected, Convesio may:
Investigate suspicious activity
Limit or suspend services
Require corrective action
Terminate accounts or services when necessary
Cooperate with law enforcement where required by law
Convesio may take these actions without prior notice when necessary to protect the security, availability, or integrity of the platform.
Reporting Abuse
Suspected infrastructure misuse or security concerns may be reported to Convesio by contacting:
Convesio investigates all credible abuse reports and takes appropriate action to protect the platform and its users.
Policy Updates
Convesio may update this Infrastructure Misuse & Platform Abuse Policy from time to time to reflect evolving security practices, regulatory requirements, or platform capabilities. Updates will be posted on the Convesio website and will become effective upon publication.
For additional details regarding platform use and restrictions, please refer to the Convesio Acceptable Use Policy, Terms of Service, and applicable service agreements.