Abuse Policy

    • (EU Law–Compliant, Law Enforcement Cooperation Focus)

      Last Updated: 15.01.2026

      This Abuse Policy defines prohibited activities, monitoring practices, enforcement procedures, and cooperation with law enforcement authorities for all services provided by Podaon SIA (“the Company”, “we”, “our”).
      This Policy is binding for all customers, users, and any third parties acting on their behalf.

      This Policy is governed by and interpreted in accordance with applicable European Union law, including but not limited to:
      • Regulation (EU) 2022/2065 – Digital Services Act (DSA)
      • Regulation (EU) 2016/679 – General Data Protection Regulation (GDPR)
      • Directive 2013/40/EU – Attacks Against Information Systems
      • Directive 2001/29/EC – Copyright (InfoSoc Directive)
      • Directive 2000/31/EC – E-Commerce Directive
      • Applicable national criminal laws of EU Member States
  • 01 ZERO-TOLERANCE POLICY FOR ILLEGAL ACTIVITIES
    ZERO-TOLERANCE POLICY FOR ILLEGAL ACTIVITIES
    • The Company applies a zero-tolerance policy toward any illegal use of its services.
      Any activity that violates EU law or the laws of any EU Member State is strictly prohibited, including but not limited to criminal, civil, or regulatory offenses.
  • 02 STRICTLY PROHIBITED ACTIVITIES
    STRICTLY PROHIBITED ACTIVITIES
    • The following activities are strictly forbidden and will result in immediate action, including suspension, termination, and legal reporting:

      2.1. Cybercrime & Hacking
      • Unauthorized access to systems or data
      • Brute-force attacks, credential stuffing, and password cracking
      • Exploit development or distribution
      • DDoS/traffic flooding attacks
      • Port scanning against third-party systems
      • Malware deployment or command & control infrastructure
    • 2.2. Malware & Malicious Software
      • Creation, storage, hosting, or distribution of:
        • Viruses, worms, trojans
        • Ransomware
        • Spyware or stalkerware
        • Botnets
        • Rootkits or backdoors
    • 2.3. Fraud & Financial Crime
      • Phishing, vishing, smishing
      • Fake payment platforms
      • Investment scams
      • Carding, skimming, or financial credential theft
      • Cryptocurrency fraud and laundering
      • Fake KYC platforms
    • 2.4. Illegal Content
      • Child sexual abuse material (CSAM)
      • Human trafficking material
      • Extreme violent content
      • Terrorist propaganda or recruitment
      • Hate crime material
      • Illicit drug marketplaces
      • Weapon sales (where prohibited)
      • Any content illegal under EU or Member State law
    • 2.5. Copyright & Intellectual Property Violations
      • Hosting or distributing:
        • Pirated software
        • Cracked applications
        • Stolen databases
        • Copyrighted media without legal authorization
      • Operation of illegal IPTV services
      • Warez, torrent trackers, and link farms
    • 2.6. Spam & Mass Messaging
      • Bulk email spam
      • SMS spam gateways
      • Automated forum posting
      • Unauthorized marketing campaigns
    • 2.7. Anonymization for Criminal Purposes
      • Hosting services intended to conceal illegal activity
      • Criminal proxy services
      • Darknet infrastructure facilitating crime
    • 2.8. Cryptocurrency Abuse
      • Unauthorized crypto mining
      • Mining malware
      • Fraudulent token launches
      • Rug-pull operations
  • 03 ACTIVE MONITORING & TECHNICAL CONTROL
    ACTIVE MONITORING & TECHNICAL CONTROL
    • The Company reserves the right to:
      • Monitor network traffic for abuse indicators
      • Analyze logs for criminal behavior
      • Use automated threat detection systems
      • Block suspicious traffic without prior notice
      • Disable services posing immediate security threats
    • Monitoring is conducted in full compliance with GDPR and the Digital Services Act and is limited strictly to abuse prevention and legal compliance.
  • 04 IMMEDIATE ENFORCEMENT ACTIONS
    IMMEDIATE ENFORCEMENT ACTIONS
    • If abuse or illegal activity is detected, the Company may immediately:
      • Suspend or terminate services without notice
      • Isolate servers or networks
      • Block IP addresses
      • Disable domains
      • Remove illegal content
      • Freeze customer accounts
      • Preserve system data for investigations
    • No refunds are issued in cases involving illegal activities.
  • 05 MANDATORY COOPERATION WITH LAW ENFORCEMENT
    MANDATORY COOPERATION WITH LAW ENFORCEMENT
    • The Company fully and proactively cooperates with law enforcement and judicial authorities in all EU Member States and internationally, including but not limited to:
      • Police
      • Cybercrime units
      • Prosecutors
      • CERTs
      • Financial intelligence units
    • Financial intelligence units
      • Disclose subscriber data
      • Disclose IP address logs
      • Disclose billing and access records
      • Preserve digital evidence
      • Provide forensic data
      • Allow lawful seizure of servers and storage systems
    • This disclosure is performed strictly under GDPR Article 6(1)(c) (legal obligation) and Article 6(1)(f) (legitimate interest) and DSA enforcement rules.
  • 06 DATA RETENTION FOR INVESTIGATIONS
    DATA RETENTION FOR INVESTIGATIONS
    • The Company retains:
      • Network logs
      • Access records
      • Administrative actions
      • Security incident data
    • Data is stored in compliance with EU data protection rules and is disclosed only to authorized authorities upon valid legal request.
  • 07 CUSTOMER RESPONSIBILITY
    CUSTOMER RESPONSIBILITY
    • The customer is fully and solely responsible for:
      • All content hosted
      • All traffic generated
      • All actions performed through their services
      • Actions of their employees, clients, resellers, and users
    • The customer must:
      • Ensure compliance with all EU laws
      • Maintain proper security measures
      • Prevent unauthorized access
      • Immediately report any suspected breach or abuse
  • 08 FAILURE TO COOPERATE
    FAILURE TO COOPERATE
    • Failure to:
      • Respond to abuse reports
      • Remove illegal content upon request
      • Provide accurate identity or billing data

      May result in:
      • Permanent service termination
      • Immediate reporting to law enforcement
      • Blacklisting of customer identity and infrastructure
  • 09 FALSE IDENTITY & KYC VIOLATIONS
    FALSE IDENTITY & KYC VIOLATIONS
    • Providing:
      • False personal information
      • Fake company registration
      • Stolen identity documents
    • is considered fraud and will be reported to law enforcement authorities.
  • 10 REPORTING ABUSE
    REPORTING ABUSE
    • To report abuse or illegal content hosted on our infrastructure, please use our dedicated abuse reporting form:

      https://www.zomro.com/abuse

      Alternatively, you may send reports to:

      Email: abuse@zomro.com
      Emergency Law Enforcement Channel: police@zomro.com

      Abuse reports must include:
      • Source IP
      • Time and date (UTC)
      • Logs or screenshots
      • Description of incident
    • All valid reports are investigated without delay.
  • 11 LIMITATION OF LIABILITY
    LIMITATION OF LIABILITY
    • The Company shall not be liable for damages arising from:
      • Suspension of illegal services
      • Data removal for legal compliance
      • Law enforcement actions
      • Evidence preservation
  • 12 POLICY UPDATES
    POLICY UPDATES
    • This Policy may be updated at any time to reflect:
      • Continued use of services constitutes acceptance of the updated Policy
      • Regulatory obligations
      • Cybersecurity threats
    • Continued use of services constitutes acceptance of the updated Policy