📄 Terms and Conditions
Hyper ICT Oy
Effective Date: 04/15/2026
Company Information:
Hyper ICT Oy
Business ID: 3394765-5
Address: Soukankaari 11 G 63, 02360 Espoo, Finland
1. Introduction
These Terms and Conditions govern the use of all services provided by Hyper ICT Oy, including but not limited to IPv4 leasing, IP resource management, routing-related support, and associated technical services.
By requesting, purchasing, using, or continuing to use our services, the customer agrees to be bound by these Terms in full.
If the customer does not agree with these Terms, the customer must not use our services.
2. Nature of the Service
Hyper ICT Oy provides IPv4 leasing and related services as a specialized service provider and authorized representative of IP resources made available through LIR members and associated partners.
The service grants the customer a limited, temporary, revocable, and non-transferable right to use the assigned IP resources strictly under these Terms.
The customer acknowledges that:
- ownership of the IP resources does not transfer to the customer,
- the customer acquires only a right of use,
- such right may be restricted, suspended, or terminated under these Terms.
3. No Ownership Rights
All IP addresses remain the property or controlled resources of their lawful holder or assigning entity.
Nothing in these Terms shall be interpreted as a sale, transfer of ownership, transfer of title, or permanent assignment of IP resources to the customer.
The customer shall not claim ownership, beneficial ownership, or permanent control over any assigned IP address.
4. Customer Responsibility
The customer is fully and solely responsible for all activities, traffic, content, services, routing behavior, and technical operations associated with the assigned IP resources.
This responsibility includes, without limitation:
- servers and applications,
- websites and hosted services,
- customers, end users, or downstream users,
- email systems,
- routing and BGP announcements,
- any third-party usage authorized by the customer.
The customer remains responsible even if the activity was performed by its client, contractor, employee, downstream user, or any third party using the assigned IP resources.
5. Lawful Use Only
The customer may use the services only for lawful purposes and in full compliance with:
- Finnish law,
- applicable EU law,
- telecommunications and internet regulations,
- intellectual property laws,
- all applicable abuse-handling and network-security standards.
Any unlawful, abusive, deceptive, harmful, or reputation-damaging use is strictly prohibited.
6. Strict Prohibition on Spam and Bulk Email
The use of assigned IP resources for spam, unsolicited communications, or bulk messaging is strictly prohibited.
This prohibition includes, without limitation:
- unsolicited bulk email,
- cold email campaigns,
- mass mailing,
- marketing campaigns sent to large recipient lists,
- automated email blasts,
- newsletter campaigns without proper consent,
- transactional or promotional email systems operated in a manner that generates complaints,
- snowshoe spam,
- rotating IP use for sending email,
- any email practice likely to lead to blacklisting or complaints.
Unless explicitly approved by the Company in writing, the customer may not use the assigned IP resources for bulk email delivery of any kind.
Any spam complaint, listing, or indication of abusive mailing activity may lead to immediate enforcement action by the Company without prior notice.
7. Email Authentication and Mail System Requirements
Where email-related use is expressly approved in writing by the Company, the customer must ensure proper and valid technical configuration at all times, including where applicable:
- reverse DNS,
- SPF,
- DKIM,
- DMARC,
- proper HELO/EHLO identity,
- abuse handling procedures,
- list hygiene and consent-based sending.
Failure to maintain proper email configuration shall be treated as a material breach of these Terms.
The Company is under no obligation to allow continued service for any email-related activity that creates complaints, risk, or reputational harm.
8. Strict Prohibition on Hacking and Unauthorized Access
The customer shall not use the services for any unauthorized, intrusive, deceptive, or hostile activity.
Prohibited activities include, without limitation:
- hacking,
- unauthorized access,
- credential attacks,
- brute-force attacks,
- exploitation attempts,
- vulnerability abuse,
- privilege escalation,
- account takeover attempts,
- bypassing security controls,
- unauthorized penetration testing,
- unauthorized scanning of systems or services.
Any such activity constitutes a material breach and may result in immediate suspension or termination without notice.
9. Strict Prohibition on Network Attacks
The customer shall not use the assigned IP resources to conduct, participate in, facilitate, or support any form of network attack.
This includes, without limitation:
- Distributed Denial of Service (DDoS) attacks,
- Denial of Service (DoS) attacks,
- reflection attacks,
- amplification attacks,
- flood attacks,
- protocol abuse,
- service disruption attempts,
- traffic manipulation,
- IP spoofing,
- malicious packet generation,
- command-and-control activity.
The Company applies a zero-tolerance policy to such conduct.
10. Scanning, Enumeration, and Reconnaissance
The customer may not use the services for unauthorized scanning, fingerprinting, enumeration, or reconnaissance of networks, servers, applications, or services.
This includes:
- port scanning,
- vulnerability scanning,
- mass internet scanning,
- service probing,
- header manipulation for reconnaissance,
- repeated login attempts,
- enumeration of accounts or services.
Any scanning activity performed without clear written authorization from the target system owner is prohibited.
11. Malware, Botnets, and Malicious Software
The customer may not use the services to host, distribute, control, transmit, or facilitate:
- malware,
- ransomware,
- spyware,
- trojans,
- viruses,
- worms,
- malicious scripts,
- command-and-control systems,
- botnet infrastructure,
- droppers,
- exploit kits.
The operation, support, or facilitation of compromised systems or infected endpoints is strictly prohibited.
12. Phishing, Fraud, and Deceptive Conduct
The customer shall not use the services for phishing, impersonation, fraud, scams, or deceptive online conduct.
This includes, without limitation:
- credential harvesting,
- fake login pages,
- impersonation of brands or services,
- payment fraud,
- invoice fraud,
- social engineering infrastructure,
- deceptive redirects,
- malicious landing pages,
- fake support or fake financial services.
Any evidence or reasonable suspicion of such activity may result in immediate suspension or termination.
13. Copyright and Intellectual Property Violations
The customer must respect all applicable copyright, trademark, and intellectual property laws.
The customer may not use the assigned IP resources to host, distribute, facilitate access to, or otherwise support:
- pirated software,
- unauthorized streaming services,
- unlicensed media distribution,
- copyrighted content made available without authorization,
- file-sharing services used primarily for infringement,
- websites or services designed to facilitate copyright infringement.
Upon receiving a valid complaint or notice relating to copyright infringement, the customer must immediately remove or disable access to the infringing content.
Failure to act immediately shall constitute a material breach of these Terms.
14. Illegal, Harmful, or High-Risk Content
The customer may not use the services for illegal, abusive, harmful, or high-risk content or operations, including content or services involving:
- fraud,
- phishing,
- piracy,
- malware,
- unlawful gambling where prohibited by law,
- unlawful financial schemes,
- criminal marketplaces,
- stolen data,
- data leaks,
- illegal surveillance,
- harassment infrastructure.
The Company reserves the sole right to determine whether certain activity presents unacceptable legal, operational, or reputational risk.
15. Routing and BGP Restrictions
The customer may use assigned IP resources only in authorized routing arrangements and only as permitted by the Company and the relevant upstream resource holder.
The customer may not:
- originate unauthorized routes,
- announce the resources through unauthorized ASNs,
- create conflicting or misleading route visibility,
- engage in route hijacking,
- bypass agreed routing structure,
- continue announcing routes after service termination.
The customer must immediately withdraw announcements upon request by the Company.
16. RPKI and ROA Control
The Company retains full and exclusive authority to manage, modify, revoke, replace, or withdraw RPKI and ROA-related records associated with the assigned IP resources.
The customer acknowledges and agrees that the Company may, at its sole discretion:
- create ROA records,
- modify ROA records,
- revoke existing ROA records,
- set origin authorization to AS0,
- take any action necessary to protect network integrity and resource reputation.
The customer has no vested right to maintain any particular ROA configuration.
17. Blacklisting and Immediate Protective Action
If any assigned IP address, subnet, or related resource is listed, flagged, reported, or otherwise identified by any blacklist, reputation service, abuse-monitoring service, or similar organization, the Company may take immediate action without prior notice.
This includes, without limitation, blacklisting, flagging, or reporting by:
- Spamhaus,
- SpamCop,
- Barracuda,
- SURBL,
- UCEPROTECT,
- or any similar service, organization, or monitoring platform.
In such cases, the Company may immediately and without prior notice:
- remove related BGP route announcements,
- revoke or modify ROA records,
- set ROA origin to AS0,
- suspend the affected IP resources,
- terminate the relevant service.
The customer expressly agrees that:
- no prior warning is required,
- no advance notice is required,
- no compensation is payable,
- no refund is payable,
- service restoration is not guaranteed.
The Company is not obligated to wait for the customer’s response before taking technical protective action.
18. Abuse Complaints and Mandatory Response
The customer must respond to all abuse complaints within a maximum of 24 hours from notice by the Company, and sooner where the matter is urgent.
The customer must:
- investigate immediately,
- stop the abusive activity immediately,
- provide evidence of mitigation if requested,
- cooperate fully with the Company.
If the customer fails to respond adequately or in time, the Company may take immediate enforcement action, including suspension, route withdrawal, ROA revocation, AS0 action, or termination.
Repeated abuse complaints, repeated poor responses, or repeated risk to reputation may result in permanent denial of future service.
19. No Refund in Abuse or Blacklist Cases
The customer acknowledges and agrees that where enforcement action is taken due to abuse, blacklisting, spam activity, malicious conduct, complaints, legal risk, or reputational risk, the Company shall have no obligation to issue any refund, partial refund, credit, or compensation.
This applies even if the action is immediate and taken without notice.
20. No Guarantee of IP Reputation or Deliverability
The Company does not guarantee:
- inbox placement,
- email deliverability,
- blacklist-free status,
- reputation score,
- acceptance by Google, Microsoft, Yahoo, or any other provider,
- uninterrupted use for any specific purpose.
All deliverability, blacklist, reputation, and third-party acceptance risks remain solely with the customer.
21. Subleasing, Resale, and Transfer Prohibited
The customer may not, without prior written approval from the Company:
- resell the assigned IP resources,
- sublease them,
- transfer them,
- assign them to third parties outside the customer’s own organization,
- make them available as a separate commercial resource.
Any unauthorized redistribution or commercial reallocation shall constitute a material breach of these Terms.
22. Payment Terms
All services are provided on a prepaid basis unless expressly agreed otherwise in writing.
The customer must pay all invoices in full and on time.
If payment is late (More than 3 days after due date in invoice), the Company may, at its sole discretion and without prior notice:
- suspend the service,
- revoke technical configurations,
- remove route support,
- terminate the service.
All fees paid after activation are non-refundable unless the Company expressly agrees otherwise in writing.
23. Suspension and Termination Rights
The Company may suspend, restrict, or terminate any service immediately and without prior notice if, in the Company’s sole judgment:
- the customer violates these Terms,
- abuse risk exists,
- blacklist risk exists,
- spam-related activity exists,
- a complaint is received,
- legal risk exists,
- operational or reputational harm may occur,
- payment is overdue,
- trust in the customer is materially reduced.
The Company is not required to keep the service active while investigating complaints or risks.
24. No Obligation to Continue Service
The Company reserves the right to refuse, suspend, restrict, or discontinue service at its discretion where risk, abuse, compliance, or business considerations justify such action.
Nothing in these Terms obligates the Company to continue service where the Company considers the customer, use case, or traffic pattern unsuitable.
25. Monitoring and Investigation
The Company reserves the right to monitor service-related indicators, abuse signals, blacklist status, routing behavior, and operational risk for the purpose of protecting network integrity, business reputation, and compliance.
The Company may investigate suspicious activity and may request explanations, logs, technical details, or mitigation evidence from the customer.
Refusal to cooperate may be treated as a breach of these Terms.
26. Limitation of Liability
To the maximum extent permitted by law, the Company shall not be liable for:
- loss of business,
- loss of profits,
- loss of revenue,
- loss of goodwill,
- loss of data,
- service interruption,
- blacklist-related consequences,
- third-party refusals or restrictions,
- indirect, incidental, special, or consequential damages.
The customer uses the services at its own risk.
27. Indemnification
The customer agrees to indemnify, defend, and hold harmless Hyper ICT Oy, its officers, partners, contractors, and affiliates from and against any claims, losses, liabilities, damages, costs, or expenses arising out of or related to:
- the customer’s use of the services,
- abuse complaints,
- blacklisting,
- spam activity,
- illegal content,
- copyright infringement,
- network attacks,
- third-party claims caused by the customer.
This includes reasonable legal and administrative costs.
28. Amendments
The Company may modify these Terms at any time.
Updated Terms become effective upon publication on the website or upon being otherwise communicated to the customer.
Continued use of the services after such update constitutes acceptance of the revised Terms.
29. Governing Law
These Terms shall be governed by and interpreted in accordance with the laws of Finland.
Any dispute arising out of or in connection with these Terms shall be subject to the applicable jurisdiction in Finland, unless mandatory law requires otherwise.
30. Contact
For general inquiries:
info@hyper-ict.com
For abuse-related matters:
abuse@hyper-ict.com
Website:
https://hyper-ict.com