Unlawful or Harmful Use

The QTS Network may only be used for lawful purposes and in a manner that is not harmful to other users. Transmission, distribution, or storage of any material in violation of any applicable law, regulation, right, or license is prohibited. This includes, but is not limited to, material protected by copyright, trademark, trade secret, patent or other intellectual property right, which is distributed, stored, or transmitted without proper authorization, material covered by any export control law, and material which is obscene, defamatory, libelous, threatening, or harassing in nature.

Under no circumstances is a user of the QTS Network authorized to engage in any activity that is illegal under local, state, federal or international law while utilizing the QTS Network.

System/Network Security Issues

Any violation or attempted violation of any system or network security element is prohibited, and may result in criminal and civil liability. QTS will investigate incidents involving such violations and will cooperate with law enforcement if a criminal violation is suspected. Examples of system or network security violations include, but are not limited to, the following:

  1. Unauthorized access to or use of data, computers, servers, systems, networks, or virtual networks, including any attempt to probe, scan, or test the vulnerability of a system or network or to breach or circumvent security or authentication measures without express authorization of the owner of the system or network.
  2. Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network.
  3. Interference with service to any user, host, or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system, and broadcast attacks.
  4. Forging of any TCP-IP packet header or any part of the header information in an e-mail or a newsgroup posting. 
  5. Intentionally introducing malicious code, including, but not limited to, viruses, worms, Trojan horses, e-mail bombs, spyware, adware and keyloggers.
  6. Intentionally revealing one’s account password to others or allowing use of one’s account by others.

Electronic Messaging, E-mail and Advertising

Causing unsolicited messages ("Spam") of any sort to be transmitted via a Critical technology, including, but not limited to, e-mail, text messages, instant messages or voice mail, is prohibited. This prohibition includes, without limitation, unsolicited commercial messages, unsolicited advertising, or unsolicited informational announcements. This prohibition applies equally to Spam sent through or via the QTS Network and to Spam sent over other networks, but which directs the recipient to sites hosted by or accessed through the use of the QTS Network.

A user shall not use another site's mail server to relay mail without the express permission of the site. The use of any electronic messaging for the purpose of soliciting e-mail for any e-mail address other than that of the poster's account or service, or with the intent to harass, annoy, or e-mail-bomb, or for the purpose of collecting e-mail addresses or IP header information is prohibited. The forging of message header information is prohibited. A user may not permit its server to be used as a relay for Spam.

QTS may block mail that violates this AUP. In addition, mail services may be suspended or terminated for violation of this AUP in accordance with the applicable QTS Services Agreement.

A user may not (nor cause any third party to) use the QTS Network or services to perform any illegal activities (including without limitation defaming, abusing, harassing, stalking, threatening or otherwise violating the legal rights (such as rights of privacy) of others) or immoral activities or any of the following types of activities, without limitation:

  1. transmitting information that infringes any patent, trademark, trade secret, copyright or other proprietary rights of any third party;
  2. transmitting any material that contains software viruses, Trojan horses, worms, time bombs, cancelbots, or any other computer code, files, or programs which may interrupt, destroy or limit the functionality of any computer software or hardware or telecommunications equipment;
  3. impersonating anyone or any entity, falsely stating or otherwise misrepresenting your affiliation with a person or entity;
  4. transmitting email messages, files or other data that result or may result in blacklisting, service interruption, complaints, regulatory investigations or other conditions that may negatively affect the security of the QTS Network or the ability of QTS Network users to send and receive email messages or other content;
  5. interfering with or disrupting the website;
  6. disrupting the activities or enjoyment of the website for other users; or
  7. collecting, or storing personal data about other users or posting any content that 

Content "published or transmitted" via QVI Cloud Network or equipment includes Web content, email, bulletin board postings, chat and any other type of posting or transmission that relies on the Internet. Users must promptly act to address any violations of the above prohibitions by its users.

Social Media Policy – External

QTS's goal for QTS’s online communities is to connect with customers to promote mutually sharing of information about events and news related to QTS, to keep customers apprised of industry trends and to get feedback on how QTS can continuously improve services.

QTS wants QTS's communities to foster open discussions, and as such, has a few guidelines for community members to follow. By interacting with QTS using our social media channels, the user agrees to:

QTS reserves the right to block/remove individuals who falsely portray themselves as QTS employees on social networking sites or otherwise violate this AUP.

Cloud Network Restrictions

Use of the QVI Cloud Network is subject to the following obligations and conditions:

  1. User must have valid and current information on file with a user's domain name registrar for any domain hosted on the QVI Cloud Network;
  2. Only IP addresses assigned to a user by QTS may be used in connection with the QVI Cloud Network; 
  3. If the QVI Cloud Network IP numbers assigned to a user's account are listed on an abuse database, customer will be in violation of this AUP and the QVI Cloud Network may take reasonable action to protect its IP numbers, including suspension and/or termination of service, regardless of whether the IP numbers were listed as a result of user's actions;
  4. QTS may quarantine or delete any data stored on a shared system if the data is infected with a virus, or is otherwise corrupted, and has the potential to infect or corrupt the system or other customers' data that is stored on the same system.
  5. You may not use any shared system provided by QTS in a way that unnecessarily interferes with the normal operation of the shared system, or that consumes a disproportionate share of the resources of the system

Customers will not receive credits under the QVI Cloud Network SLAs for interruptions of service resulting from AUP violations.

Information Collection

Collecting information traversing the cloud* environment in a manner prohibited by law or applicable privacy policies is prohibited. This includes:

  1. Collecting or using email addresses, screen names or other identifiers without the consent of the person identified (including, without limitation, phishing, Internet scamming, password robbery, spidering, and harvesting);
  2. Collecting or using information without the consent of the owner of the information;
  3. Collecting information in violation of an applicable privacy policy, law or regulation.

*Non-applicable to collocation environments

Other Abuse

The QTS Network may not be used to engage in, foster, or promote illegal, abusive, or irresponsible behavior, including:

  1. Use of the service for distribution of advertisement delivery software unless: (i) the user affirmatively consents to the download and installation of such software based on a clear and conspicuous notice of the nature of the software, and (ii) the software is easily removable by use of standard tools for such purpose included on major operating systems (such as Microsoft's "ad/remove" tool);
  2. Any conduct that is likely to result in retaliation against the QTS Network or website, or QTS's employees, officers or other agents, including engaging in behavior that results in any server being the target of a denial of service attack (DoS); or
  3. Use in a way that unnecessarily interferes with the normal operation of the QTS Network and services generally. In such circumstances, QTS may require user to repair abnormalities in user's code if the operation of the code unnecessarily conflicts with other customers' use of their services.


Complaints regarding possible violations of the QTS Acceptable Use Policy should be sent to