{"id":52,"date":"2025-12-18T00:16:10","date_gmt":"2025-12-18T00:16:10","guid":{"rendered":"https:\/\/gh-fs.com\/site\/?page_id=52"},"modified":"2025-12-19T01:44:55","modified_gmt":"2025-12-19T01:44:55","slug":"acceptable-use","status":"publish","type":"page","link":"https:\/\/gh-fs.com\/index.php\/acceptable-use\/","title":{"rendered":"Acceptable Use"},"content":{"rendered":"<h1>Acceptable Use Policy<\/h1>\n<p><strong>Last updated:<\/strong> 2025-12-18<\/p>\n<p>This Acceptable Use Policy applies to the use of our website and any hosting, IT, network or support services provided by GH-FS.<\/p>\n<h2>Prohibited activities<\/h2>\n<ul>\n<li>Illegal activity, fraud or phishing.<\/li>\n<li>Malware distribution, exploitation attempts or unauthorized access.<\/li>\n<li>Spam, mass unsolicited messages or abuse of communication systems.<\/li>\n<li>Content that violates copyright, privacy or the rights of others.<\/li>\n<\/ul>\n<h2>Security<\/h2>\n<p>You must not attempt to probe, scan or test the vulnerability of our systems, networks, servers or client infrastructure without written permission.<\/p>\n<p>We expect reasonable security behaviour when using hosting platforms, remote access solutions or any managed services.<\/p>\n<h2>Enforcement<\/h2>\n<p>We may suspend, restrict or refuse service where we reasonably believe this policy is violated, or where activity causes operational, legal or security risk.<\/p>\n<h2>Reporting a problem<\/h2>\n<p>If you believe there is a security issue or abuse affecting GH-FS systems, please contact us via:<\/p>\n<p><a href=\"https:\/\/gh-fs.com\/index.php\/contact\/\">https:\/\/gh-fs.com\/index.php\/contact\/<\/a><\/p>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Acceptable Use Policy Last updated: 2025-12-18 This Acceptable Use Policy applies to the use of our website and any hosting, IT, network or support services provided by GH-FS. Prohibited activities Illegal activity, fraud or phishing. Malware distribution, exploitation attempts or unauthorized access. Spam, mass unsolicited messages or abuse of communication systems. Content that violates copyright, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-52","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/gh-fs.com\/index.php\/wp-json\/wp\/v2\/pages\/52","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gh-fs.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/gh-fs.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/gh-fs.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gh-fs.com\/index.php\/wp-json\/wp\/v2\/comments?post=52"}],"version-history":[{"count":5,"href":"https:\/\/gh-fs.com\/index.php\/wp-json\/wp\/v2\/pages\/52\/revisions"}],"predecessor-version":[{"id":314,"href":"https:\/\/gh-fs.com\/index.php\/wp-json\/wp\/v2\/pages\/52\/revisions\/314"}],"wp:attachment":[{"href":"https:\/\/gh-fs.com\/index.php\/wp-json\/wp\/v2\/media?parent=52"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}