Sv SericaVPN
  • Features
  • Customers
  • Pricing
  • Download
  • About Us
  • Journal
  • FAQ
Get started
  • Features
  • Customers
  • Pricing
  • Download
  • About Us
  • Journal
  • FAQ
← SericaVPN Legal

Acceptable Use Policy

Last updated: March 4, 2026

Legal documents
Privacy Policy Terms of Service Cookie Policy Refund Policy Acceptable Use Imprint

1. Purpose

This Acceptable Use Policy ("AUP") sets forth the rules and guidelines for using the Serica VPN service ("Service"). By using our Service, you agree to comply with this AUP. Violations of this policy may result in immediate termination of your account without refund and potential legal action.

We have established this policy to protect our network, our users, and the broader internet community. Our goal is to provide a secure, reliable service while respecting the rights and safety of all internet users.

2. Prohibited Activities

The following activities are strictly prohibited when using the Serica Service:

2.1 Illegal Activities

You may not use our Service to violate any applicable local, national, or international laws, including but not limited to:

  • Computer fraud and abuse (unauthorized access to systems)
  • Identity theft or impersonation
  • Money laundering or terrorist financing
  • Drug trafficking or distribution
  • Human trafficking or exploitation
  • Weapons trafficking
  • Gambling operations where prohibited by law

2.2 Harmful Content and Exploitation

The following activities involving content are strictly prohibited:

  • Child Sexual Abuse Material (CSAM): Any creation, distribution, possession, or access to material depicting child sexual abuse. This includes synthetic or AI-generated content.
  • Non-consensual intimate imagery: Distribution of private sexual images without consent ("revenge porn")
  • Extreme violence: Content depicting torture, extreme violence, or gratuitous gore for entertainment purposes
  • Bestiality: Sexual content involving animals
  • Hate speech: Content that promotes violence or hatred against individuals or groups based on race, ethnicity, religion, gender, sexual orientation, disability, or other protected characteristics

2.3 Network Abuse and Attacks

Activities that harm network infrastructure or other users:

  • Distributed Denial of Service (DDoS) attacks: Flooding networks or systems with traffic to render them unavailable
  • Port scanning: Systematic scanning of other networks to identify vulnerabilities
  • Network reconnaissance: Unauthorized probing of third-party systems
  • Spoofing: Falsifying sender information to impersonate others
  • Packet flooding: Excessive traffic generation that degrades network performance
  • Cryptocurrency mining: Using our servers for mining operations without explicit authorization

2.4 Malware and Security Threats

Distribution or deployment of malicious software:

  • Viruses, worms, trojans, and ransomware
  • Spyware, keyloggers, and surveillance software deployed without consent
  • Botnet command and control operations
  • Phishing kits and fraudulent websites
  • Exploit kits and zero-day distribution

2.5 Fraud and Deception

Activities involving fraudulent behavior:

  • Phishing: Deceptive attempts to obtain sensitive information
  • Spoofing: Impersonating legitimate services or individuals
  • Financial fraud: Credit card fraud, wire fraud, or payment scams
  • Investment scams: Ponzi schemes, pyramid schemes, or fraudulent investment opportunities
  • Fake services: Offering non-existent goods or services

2.6 Unsolicited Communications

Mass or unsolicited messaging:

  • Spam: Unsolicited commercial email in bulk quantities
  • Harassment: Coordinated campaigns of abuse or intimidation
  • Scraping: Automated collection of email addresses or personal data from websites
  • Harvesting: Collecting contact information for unsolicited marketing

2.7 Intellectual Property Violations

While we respect fair use, the following are prohibited:

  • Large-scale copyright infringement: Operating file-sharing hubs dedicated to distributing pirated content
  • Counterfeit goods: Selling fake products or operating counterfeit marketplaces
  • Trade secret theft: Stealing proprietary business information

Note: We comply with valid DMCA notices and will terminate repeat infringers.

2.8 Resource Abuse

Activities that unfairly consume resources:

  • Excessive bandwidth consumption that degrades service for other users
  • Automated account creation or credential stuffing
  • Reselling or redistributing our service without authorization
  • Using our service to provide VPN services to third parties

3. Enforcement and Reporting

3.1 Detection and Investigation

We monitor our network for signs of abuse using automated systems and user reports. While we maintain a strict no-logs policy for VPN activity, we may investigate:

  • Unusual traffic patterns indicative of attacks
  • Reports from abuse databases and security organizations
  • Law enforcement requests accompanied by valid legal process

3.2 Response to Violations

Violations of this AUP may result in:

  • Warning: First-time minor violations may receive a warning
  • Service restriction: Temporary limitation of service capabilities
  • Account suspension: Temporary disabling of account access
  • Account termination: Permanent closure without refund
  • Legal action: Referral to law enforcement or civil litigation
  • Information disclosure: As required by law or to protect our rights

3.3 No Refund for Violations

Accounts terminated for AUP violations are not eligible for refunds, regardless of remaining subscription time. This includes accounts used for any activities described in Sections 2.1 through 2.8 above.

3.4 Reporting Abuse

To report abuse originating from our network, please contact:

Email: legal@sericavpn.com
Include: Timestamp, source IP (if known), type of abuse, and any relevant logs

We investigate all credible reports and will take appropriate action within 24–48 hours.

4. Law Enforcement

Serica LLC complies with valid legal process, including subpoenas, court orders, and search warrants, when properly served in accordance with applicable law. However, due to our no-logs architecture, we typically cannot provide information about user activity.

Law enforcement inquiries should be directed to:

Email: legal@sericavpn.com
Mail: Serica LLC, 1209 Mountain Road PL NE, Suite H, Albuquerque, NM 87110, USA

5. Modifications to This Policy

We may update this Acceptable Use Policy from time to time to address new threats or legal requirements. Changes will be posted on this page with an updated effective date. Continued use of the Service after changes constitutes acceptance of the revised policy.

6. Contact Information

For questions about this Acceptable Use Policy, please contact us at legal@sericavpn.com.

Sv SericaVPN

A privacy-first VPN built for travelers, remote workers and expats. Engineered to keep your stack working in the most restricted networks on earth.

Product
  • Features
  • Pricing
  • Network
  • Download
Company
  • About
  • Journal
Support
  • Help center
  • Contact
  • Privacy
  • Terms
© 2026 SericaVPN · all rights reserved
Privacy Terms Cookies Refunds